Sample records for key observation point

  1. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  2. Practical Point-to-Point Free-Space Quantum Key Distribution over 1/2 KM

    SciTech Connect (OSTI)

    Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.; Lamoreaux, S.K.; Morgan, G.L.; Peterson, C.G.

    1999-02-01T23:59:59.000Z

    We have demonstrated point-to-point single-photon quantum key distribution (QKD) over a free-space optical path of {approximately}475 m under daylight conditions. This represents an increase of >1,000 times farther than any reported point-to-point demonstration, and >6 times farther than the previous folded path daylight demonstration. We expect to extend the daylight range to 2 km or more within the next few months. A brief description of the system is given here. The QKD transmitter, a.k.a. ''Alice'' (Fig. 1), consists of three thermoelectrically cooled diode lasers, a single interference filter (IF), two optical attenuators, two linear polarizers, two non-polarization beam-splitters (BSs), and a 27x beam expander. The two data-lasers' (dim-lasers') wavelengths are temperature controlled and constrained by the IF to {approximately}773 {+-} 0.5 nm, while the transmitted wavelength of the bright-laser (timing-laser) is {approximately}768 nm; the data-lasers are configured to emit a weak pulse of approximately 1 ns duration. The transmitter incorporates no active polarization switching--a first in QKD.

  3. Key Science Observations of AGNs with KaVA Array

    E-Print Network [OSTI]

    Kino, Motoki; Zhao, Guang-Yao; Sohn, Bong Won

    2015-01-01T23:59:59.000Z

    KaVA (KVN and VERA Array) is a new combined VLBI array with KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). First, we briefly review the imaging capabilities of KaVA array which actually achieves more than three times better dynamic range than that achieved by VERA alone. The KaVA images clearly show detailed structures of extended radio jets in AGNs. Next, we represent the key science program to be led by KaVA AGN sub working group. We will conduct the monitoring observations of Sgr A* and M87 because of the largeness of their central super-massive black hole angular sizes. The main science goals of the program are (i) testing magnetically-driven-jet paradigm by mapping velocity fields of the M87 jet, and (ii) obtaining tight constraints on physical properties of radio emitting region in Sgr A*.

  4. AGN fueling: the observational point of view

    E-Print Network [OSTI]

    F. Combes

    2002-10-10T23:59:59.000Z

    Observations at multiple wavelengths are reviewed to search for evidence for fueling mechanisms in galaxies, both for nuclear starbursts and AGN activity. Although it is undisputed that dynamical perturbations such as bars or tidal interactions accumulate gas in the central regions and sometimes trigger nuclear starbursts, the evidence remains scarce that these are necessary to fuel AGNs. Interpretations in terms of time-scales, feed-back, and black hole evolution are discussed. It is suggested that the AGN phase corresponds to the early-type phases of galaxies.

  5. REDUCED-ORDER OBSERVER-BASED POINT-TO-POINT AND TRAJECTORY CONTROLLERS FOR ROBOT MANIPULATORS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 REDUCED-ORDER OBSERVER-BASED POINT-TO-POINT AND TRAJECTORY CONTROLLERS FOR ROBOT MANIPULATORS M-degrees-of-freedom robot manipulator. Keywords: Robot manipulators; exponential reduced-order observers; controller design, FRANCE Abstract: This paper presents a design procedure for a reduced-order observer-based controller

  6. Microsoft PowerPoint - GNEP PARTNERS CANDIDATE PARTNERS AND OBSERVERS...

    Broader source: Energy.gov (indexed) [DOE]

    Forum (GIF) 3. Euratom Attending Candidate Partner and Observer Countries 1. Argentina 2. Belgium 3. Brazil 4. Canada 5. Czech 6. Egypt 7. Finland 8. Germany 9. Italy 10....

  7. Blind and pointed Sunyaev-Zel'dovich observations with the Arcminute Microkelvin Imager

    E-Print Network [OSTI]

    Shimwell, Timothy William

    2011-11-08T23:59:59.000Z

    Blind and Pointed Sunyaev-Zel’dovich Observations with the Arcminute Microkelvin Imager Timothy William Shimwell Cavendish Astrophysics and Churchill College University of Cambridge A dissertation submitted to the University of Cambridge... and use these to characterise the analysis. I then, for the first time, apply the analysis to data from the AMI blind cluster survey. I identify several previously unknown SZ decrements. Finally, I conduct pointed observations towards a high luminosity sub...

  8. Web Site: http://www.coop-program.engr.uga.edu/ms.html UGA Cooperative Engineering Program Development Key Points and Notes.docx

    E-Print Network [OSTI]

    Arnold, Jonathan

    Web Site: http://www.coop-program.engr.uga.edu/ms.html UGA Cooperative Engineering Program;Web Site: http://www.coop-program.engr.uga.edu/ms.html UGA Cooperative Engineering Program Development Development Key Points and Notes.docx Latest Update: October 3, 2012 Mission Statement: The UGA Engineering

  9. Key Points of STFC and EPSRC's Fusion for Energy EPSRC and STFC Councils have agreed a revised strategy for fusion for energy

    E-Print Network [OSTI]

    Key Points of STFC and EPSRC's Fusion for Energy Strategy EPSRC and STFC Councils have agreed a revised strategy for fusion for energy research: 1) EPSRC and STFC will support fusion research as a long and demonstrating leadership to realise the goal of fusion energy. 2) EPSRC will develop a long term base funding

  10. Multimessengers from core-collapse supernovae: multidimensionality as a key to bridge theory and observation

    E-Print Network [OSTI]

    Kei Kotake; Tomoya Takiwaki; Yudai Suwa; Wakana Iwakami Nakano; Shio Kawagoe; Youhei Masada; Shin-ichiro Fujimoto

    2012-04-24T23:59:59.000Z

    Core-collapse supernovae are dramatic explosions marking the catastrophic end of massive stars. The only means to get direct information about the supernova engine is from observations of neutrinos emitted by the forming neutron star, and through gravitational waves which are produced when the hydrodynamic flow or the neutrino flux is not perfectly spherically symmetric. The multidimensionality of the supernova engine, which breaks the sphericity of the central core such as convection, rotation, magnetic fields, and hydrodynamic instabilities of the supernova shock, is attracting great attention as the most important ingredient to understand the long-veiled explosion mechanism. Based on our recent work, we summarize properties of gravitational waves, neutrinos, and explosive nucleosynthesis obtained in a series of our multidimensional hydrodynamic simulations and discuss how the mystery of the central engines can be unraveled by deciphering these multimessengers produced under the thick veils of massive stars.

  11. L1448-MM OBSERVATIONS BY THE HERSCHEL KEY PROGRAM, ''DUST, ICE, AND GAS IN TIME'' (DIGIT)

    SciTech Connect (OSTI)

    Lee, Jinhee; Lee, Jeong-Eun [Department of Astronomy and Space Science, Kyung Hee University, Yongin-shi, Kyungki-do 449-701 (Korea, Republic of); Lee, Seokho [Astronomy Program, Department of Physics and Astronomy, Seoul National University, Seoul 151-742 (Korea, Republic of); Green, Joel D.; Evans, Neal J. II [Department of Astronomy, University of Texas at Austin, 2515 Speedway, Stop C1400, Austin, TX 78712-1205 (United States); Choi, Minho [Korea Astronomy and Space Science Institute, 776 Daedeokdaero, Yuseong, Daejeon 305-348 (Korea, Republic of); Kristensen, Lars [Harvard-Smithsonian Center for Astrophysics, MS78, Cambridge, MA 02138 (United States); Dionatos, Odysseas; Jørgensen, Jes K., E-mail: jeongeun.lee@khu.ac.kr [Centre for Star and Planet Formation, Natural History Museum of Denmark, University of Copenhagen, Øster Voldgade 5-7, 1350 Copenhagen (Denmark); Collaboration: DIGIT Team

    2013-11-01T23:59:59.000Z

    We present Herschel/Photodetector Array Camera and Spectrometer (PACS) observations of L1448-MM, a Class 0 protostar with a prominent outflow. Numerous emission lines are detected at 55 1000 K) environment, indicative of a shock origin. For OH, IR-pumping processes play an important role in the level population. The molecular emission in L1448-MM is better explained with a C-shock model, but the atomic emission of PACS [O I] and Spitzer/Infrared Spectrograph [Si II] emission is not consistent with C-shocks, suggesting multiple shocks in this region. Water is the major line coolant of L1448-MM in the PACS wavelength range, and the best-fit LVG models predict that H{sub 2}O and CO emit (50%-80%) of their line luminosity in the PACS wavelength range.

  12. Observation of the critical end point in the phase diagram for hot and dense nuclear matter

    E-Print Network [OSTI]

    Lacey, Roy A

    2014-01-01T23:59:59.000Z

    Excitation functions for the Gaussian emission source radii difference ($R^2_{\\text{out}} - R^2_{\\text{side}}$) obtained from two-pion interferometry measurements in Au+Au ($\\sqrt{s_{NN}}= 7.7 - 200$ GeV) and Pb+Pb ($\\sqrt{s_{NN}}= 2.76$ TeV) collisions, are studied for a broad range of collision centralities. The observed non-monotonic excitation functions validate the finite-size scaling patterns expected for the deconfinement phase transition and the critical end point (CEP), in the temperature vs. baryon chemical potential ($T,\\mu_B$) plane of the nuclear matter phase diagram. A Finite-Size Scaling (FSS) analysis of these data indicate a second order phase transition with the estimates $T^{\\text{cep}} \\sim 165$~MeV and $\\mu_B^{\\text{cep}} \\sim 100$~MeV for the location of the critical end point. The critical exponents ($\

  13. VERITAS Observations of the Unidentified Point Source HESS J1943+213

    E-Print Network [OSTI]

    ,

    2015-01-01T23:59:59.000Z

    The H.E.S.S. Galactic plane scan has revealed a large population of Galactic very high energy (VHE; E > 100 GeV) emitters. The majority of the galactic sources are extended and can typically be associated with pulsar wind nebulae (35%) and supernova remnants (21%), while some of the sources remain unidentified (31%). A much smaller fraction of point-like sources (5 in total, corresponding to 4%) are identified as gamma-ray binaries. Active galactic nuclei located behind the Galactic plane are also a potential source class. An active galaxy could be identified in the VHE regime by a point like extension, a high variability amplitude (up to a factor of 100) and a typically soft spectrum (due to absorption by the extra-galactic background light). Here we report on VERITAS observations of HESS J1943+213, an unidentified point source discovered to emit above 470 GeV during the extended H.E.S.S. Galactic plane scan. This source is thought to be a distant BL Lac object behind the Galactic plane and, though it exhibi...

  14. A Serendipitous Deep Cluster Survey from ROSAT--PSPC pointed observations

    E-Print Network [OSTI]

    P. Rosati

    1995-09-09T23:59:59.000Z

    We present a deep X-ray selected sample of galaxy clusters which has been created from a serendipitous search in ROSAT-PSPC deep pointed observations at high galactic latitude. This survey, hereafter known as the ROSAT Deep Cluster Survey (RDCS), is being carried out utilizing a wavelet-based detection algorithm which, unlike other detection methods, is not biased against extended, low surface brightness sources. It is a flux-diameter limited sample that extends the X-ray flux limit of previous cluster surveys by more than one order of magnitude ($F_X \\ge 1\\cdot 10^{-14}\\rm erg\\, cm^{-2}s^{-1}$). The first results of the on-going optical follow-up program indicate a high success rate of identification. At the present, 38 clusters out of 80 candidates have been identified on a 26 deg$^2$ surveyed area. Recently measured redshifts confirm the nature of these systems as low-moderate redshift groups ($z\\simeq 0.2-0.3$) and intermediate to high redshift clusters ($z\\simeq 0.4-0.7$). We show X-ray and optical images of several clusters identified to date, discuss the X-ray properties of the sample and present preliminary results on the redshift distribution. The final sample will include $\\sim 100$ clusters covering and area of $\\sim 40$ deg$^2$.

  15. Observation of a Dirac point in microwave experiments with a photonic crystal modeling graphene

    E-Print Network [OSTI]

    S. Bittner; B. Dietz; M. Miski-Oglu; P. Oria Iriarte; A. Richter; F. Schaefer

    2010-05-25T23:59:59.000Z

    We present measurements of transmission and reflection spectra of a microwave photonic crystal composed of 874 metallic cylinders arranged in a triangular lattice. The spectra show clear evidence of a Dirac point, a characteristic of a spectrum of relativistic massless fermions. In fact, Dirac points are a peculiar property of the electronic band structure of graphene, whose properties consequently can be described by the relativistic Dirac equation. In the vicinity of the Dirac point, the measured reflection spectra resemble those obtained by conductance measurements in scanning tunneling microscopy of graphene flakes.

  16. High-speed observation of the piston effect near the gas-liquid critical point Yuichi Miura,1

    E-Print Network [OSTI]

    High-speed observation of the piston effect near the gas-liquid critical point Yuichi Miura,1-critical fluid on acoustic time scales using an ultrasensitive interferometer. A sound emitted by very weak sounds are emitted from a heater and how applied heat is transformed into mechanical work. Our

  17. The nuclear symmetry energy and other isovector observables from the point of view of nuclear structure

    E-Print Network [OSTI]

    G. Colo'; X. Roca-Maza; N. Paar

    2015-04-08T23:59:59.000Z

    In this contribution, we review some works related with the extraction of the symmetry energy parameters from isovector nuclear excitations, like the giant resonances. Then, we move to the general issue of how to assess whether correlations between a parameter of the nuclear equation of state and a nuclear observable are robust or not. To this aim, we introduce the covariance analysis and we discuss some counter-intuitive, yet enlightening, results from it.

  18. The nuclear symmetry energy and other isovector observables from the point of view of nuclear structure

    E-Print Network [OSTI]

    Colo', G; Paar, N

    2015-01-01T23:59:59.000Z

    In this contribution, we review some works related with the extraction of the symmetry energy parameters from isovector nuclear excitations, like the giant resonances. Then, we move to the general issue of how to assess whether correlations between a parameter of the nuclear equation of state and a nuclear observable are robust or not. To this aim, we introduce the covariance analysis and we discuss some counter-intuitive, yet enlightening, results from it.

  19. BRIGHT POINTS AND JETS IN POLAR CORONAL HOLES OBSERVED BY THE EXTREME-ULTRAVIOLET IMAGING SPECTROMETER ON HINODE

    SciTech Connect (OSTI)

    Doschek, G. A.; Landi, E.; Warren, H. P. [Space Science Division, Naval Research Laboratory, Washington, DC 20375 (United States); Harra, L. K., E-mail: george.doschek@nrl.navy.mi [Mullard Space Science Laboratory, University College London, Holmbury St. Mary, Dorking, Surrey, RH5 6NT (United Kingdom)

    2010-02-20T23:59:59.000Z

    We present observations of polar coronal hole bright points (BPs) made with the Extreme-ultraviolet Imaging Spectrometer (EIS) on the Hinode spacecraft. The data consist of raster images of BPs in multiple spectral lines from mostly coronal ions, e.g., Fe X-Fe XV. The BPs are observed for short intervals and thus the data are snapshots of the BPs obtained during their evolution. The images reveal a complex unresolved temperature structure (EIS resolution is about 2''), with the highest temperature being about 2 x 10{sup 6} K. Some BPs appear as small loops with temperatures that are highest near the top. But others are more point-like with surrounding structures. However, the thermal time evolution of the BPs is an important factor in their appearance. A BP may appear quite different at different times. We discuss one BP with an associated jet that is bright enough to allow statistically meaningful measurements. The jet Doppler speed along the line of sight is about 15-20 km s{sup -1}. Electron densities of the BPs and the jet are typically near 10{sup 9} cm{sup -3}, which implies path lengths along the line of sight on the order of a few arcsec. We also construct differential emission measure curves for two of the best observed BPs. High spatial resolution (significantly better than 1'') is required to fully resolve the BP structures.

  20. Mid-Infrared Observations of Normal Star-Forming Galaxies: The Infrared Space Observatory Key Project Sample

    E-Print Network [OSTI]

    Daniel A. Dale; Nancy A. Silbermann; George Helou

    2000-05-04T23:59:59.000Z

    We present mid-infrared maps and preliminary analysis for 61 galaxies observed with the ISOCAM instrument aboard the Infrared Space Observatory. Many of the general features of galaxies observed at optical wavelengths---spiral arms, disks, rings, and bright knots of emission---are also seen in the mid-infrared, except the prominent optical bulges are absent at 6.75 and 15 microns. In addition, the maps are quite similar at 6.75 and 15 microns, except for a few cases where a central starburst leads to lower 6.75/15 ratios in the inner region. We also present infrared flux densities and mid-infrared sizes for these galaxies. The mid-infrared color 6.75/15 shows a distinct trend with the far-infrared color 60/100. The quiescent galaxies in our sample (60/100 < 0.6) show 6.75/15 near unity, whereas this ratio drops significantly for galaxies with higher global heating intensity levels. Azimuthally-averaged surface brightness profiles indicate the extent to which the mid-infrared flux is centrally concentrated, and provide information on the radial dependence of mid-infrared colors. The galaxies are mostly well resolved in these maps: almost half of them have < 10% of their flux in the central resolution element. A comparison of optical and mid-infrared isophotal profiles indicates that the optical flux at 4400 Angstroms near the optical outskirts of the galaxies is approximately eight (seven) times that at 6.75 microns (15 microns), comparable with observations of the diffuse quiescent regions of the Milky Way.

  1. Abstract--The real-time reconstruction of the plasma magnetic equilibrium in a Tokamak is a key point to access

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Abstract--The real-time reconstruction of the plasma magnetic equilibrium in a Tokamak is a key current density in a Tokamak and its equilibrium. In order to meet the real-time requirements a C on the JET tokamak, either by comparison with `off-line' equilibrium codes or real time software computing

  2. MENINGOCOCCAL DISEASE INFORMATION OVERVIEW/KEY POINTS

    E-Print Network [OSTI]

    Singh, Jaswinder Pal

    and in the community? You can help prevent the spread of illnesses by: Covering your mouth and nose when coughing or sneezing. Cover your mouth and nose with a tissue when coughing or sneezing. It may prevent those around

  3. Observed Asymptotic Differences in Energies of Stable and Minimal Point Configurations on $\\mathbb{S}^2$ and the Role of Defects

    E-Print Network [OSTI]

    M. Calef; W. Griffiths; A. Schulz; C. Fichtl; D. Hardin

    2013-10-02T23:59:59.000Z

    Observations suggest that configurations of points on a sphere that are stable with respect to a Riesz potential distribute points uniformly over the sphere. Further, these stable configurations have a local structure that is largely hexagonal. Minimal configurations differ from stable configurations in the arrangement of defects within the hexagonal structure. This paper reports the asymptotic difference between the average energy of stable states and the lowest reported energies. We use this to infer the energy scale at which defects in the hexagonal structure are manifest. We report results for the Riesz potentials for s=0, s=1, s=2 and s=3. Additionally we compare existing theory for the asymptotic expansion in N of the minimal $N$-point energy with experimental results. We report a case of two distinct stable states that have the same Voronoi structure. Finally, we report the observed growth of the number of stable states as a function of N.

  4. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  5. Observations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for RenewableSpeeding accessSpeeding access(SC)Gas and OilPhaseObservation of aof

  6. DISCOVERY OF A DYNAMICAL COLD POINT IN THE HEART OF THE SAGITTARIUS dSph GALAXY WITH OBSERVATIONS FROM THE APOGEE PROJECT

    SciTech Connect (OSTI)

    Majewski, Steven R.; Hasselquist, Sten; Nidever, David L., E-mail: srm4n@virginia.edu, E-mail: sh6cy@virginia.edu [Department of Astronomy, University of Virginia, Charlottesville, VA 22904-4325 (United States); and others

    2013-11-01T23:59:59.000Z

    The dynamics of the core of the Sagittarius (Sgr) dwarf spheroidal (dSph) galaxy are explored using high-resolution (R ? 22, 500), H-band, near-infrared spectra of over 1000 giant stars in the central 3 deg{sup 2} of the system, of which 328 are identified as Sgr members. These data, among some of the earliest observations from the Sloan Digital Sky Survey III/Apache Point Observatory Galactic Evolution Experiment (APOGEE) and the largest published sample of high resolution Sgr dSph spectra to date, reveal a distinct gradient in the velocity dispersion of Sgr from 11 to 14 km s{sup –1} for radii >0.°8 from center to a dynamical cold point of 8 km s{sup –1} in the Sgr center—a trend differing from that found in previous kinematical analyses of Sgr over larger scales that suggests a more or less flat dispersion profile at these radii. Well-fitting mass models with either cored and cusped dark matter distributions can be found to match the kinematical results, although the cored profile succeeds with significantly more isotropic stellar orbits than required for a cusped profile. It is unlikely that the cold point reflects an unusual mass distribution. The dispersion gradient may arise from variations in the mixture of populations with distinct kinematics within the dSph; this explanation is suggested (e.g., by detection of a metallicity gradient across similar radii), but not confirmed, by the present data. Despite these remaining uncertainties about their interpretation, these early test data (including some from instrument commissioning) demonstrate APOGEE's usefulness for precision dynamical studies, even for fields observed at extreme airmasses.

  7. observations l'aide de ma formule, on trouve pour les trois points les constantes sui vantes, dont l'accord est beaucoup plus satisfai-

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    nodales analogues à celles de Chladni ; le centre est un point nodal. 2° Ces figures n'ont jamais un

  8. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  9. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  10. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  11. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  12. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  13. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  14. Keys to Successful Feedback - John Settle PowerPoint Presentation |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Keyof

  15. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  16. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  17. Partial Observers

    E-Print Network [OSTI]

    Thomas Marlow

    2006-10-20T23:59:59.000Z

    We attempt to dissolve the measurement problem using an anthropic principle which allows us to invoke rational observers. We argue that the key feature of such observers is that they are rational (we need not care whether they are `classical' or `macroscopic' for example) and thus, since quantum theory can be expressed as a rational theory of probabilistic inference, the measurement problem is not a problem.

  18. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  19. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  20. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  1. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  2. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  3. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  4. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  5. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  6. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  7. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  8. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  9. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  10. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  11. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  12. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  13. A starting point | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    starting point A starting point Released: May 28, 2012 Scientists hone in on size and environmental influence of the quantum dots used in hybrid solar cells Understanding the...

  14. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  15. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  16. Optimal External Memory Planar Point Enclosure

    E-Print Network [OSTI]

    Arge, Lars

    /O­e#ciently. This problem has important applications in e.g. spatial and temporal databases, and is dual to the important databases; for example, if we have a database where each object is associated with a time span and a key corresponds to a point enclosure query. Also, in spatial databases, irregular planar objects are often

  17. Optimal External Memory Planar Point Enclosure

    E-Print Network [OSTI]

    Samoladas, Vasilis

    /O-eÃ?ciently. This problem has important applications in e.g. spatial and temporal databases, and is dual to the important databases; for example, if we have a database where each object is associated with a time span and a key corresponds to a point enclosure query. Also, in spatial databases, irregular planar objects are often

  18. PowerPoint Presentation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of low, medium, and high densities (4500 RPM) Sedimentation in centrifugal microfluidics Key Advantages * Fast: Sample-to-answer in <15 min * Inexpensive: <0.10 per...

  19. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  20. CRYSTALLOGRAPHIC POINT AND SPACE

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    CRYSTALLOGRAPHIC POINT AND SPACE GROUPS Andy Elvin June 10, 2013 #12;Contents Point and Space no reflection axes #12;Cube and Octahedron are dual Symmetries under Oh #12;Space Groups Subgroups of E(3) Point Group + Translation { R | 0 }{ E | t }a = { R | t }a = Ra + t 230 Space Groups 73 symmorphic space

  1. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  2. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  3. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  4. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  5. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  6. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  7. US Green Building Council Keys Branch Presents: Designing Mosquito Free Cisterns

    E-Print Network [OSTI]

    Watson, Craig A.

    US Green Building Council Keys Branch Presents: Designing Mosquito Free Cisterns For Contractors their return to popularity. Overview of the City of Key Wests' BPAS Ordinance and Green Building. By Allison Design, Inc., ARCSA AP The role of Green Sustainability Organizations and the potential "Tipping Point

  8. Microsoft PowerPoint - DOE O 413 3B Brief v9 with key points in notes [Read-Only]

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment3311, 3312),Microgrid Set-Top Box Proceeding March 7, 2012 PageFour

  9. Microsoft PowerPoint - DOE O 413 3B Brief v9 with key points in notes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartment ofMarginalPaulMicrosoftBSQ-300 EntireSeptember

  10. Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs

    E-Print Network [OSTI]

    Prasanna, Viktor K.

    Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs Kiran Kumar Matam, prasanna}@usc.edu Abstract--Energy efficiency has emerged as one of the key performance metrics in scientific computing. In this work, we evaluate the energy efficiency of floating point matrix multipli

  11. PowerPoint Presentation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    drug delivery device. Commercial Applications Point of Care DiagnosticsHome Health Care Sports Medicine Infectious Disease Treatment Defense of the...

  12. PowerPoint Presentation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for cancer and infectious disease biomarkers in human biological samples * Point-of-Care diagnostics amenable to health clinics and field sensing applications * Integrated...

  13. Web points of interest

    E-Print Network [OSTI]

    Web points of interest ... JUGGLING CLUB; The Lafayette Citizens Band Home Page; Harold Boas' incredible list of math and life resources on the WEB.

  14. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  15. Indirect L to T point optical transition in bismuth nanowires

    E-Print Network [OSTI]

    Levin, A. J.

    An indirect electronic transition from the L point valence band to the T point valence band has been previously observed in Bi nanowires oriented along the [011? 2] crystalline direction (used by Black et al. and by Reppert ...

  16. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  17. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  18. PowerPoint Presentation

    Energy Savers [EERE]

    be formatted to fit on 8.5 x 11 inch paper with margins not less than one inch on every side. Use Times New Roman typeface, a black font color, and a font size of 12 point or...

  19. UCL INSTITUTE FOR RISK AND DISASTER REDUCTION WHY CANCUN MARKS A KEY TURNING POINT

    E-Print Network [OSTI]

    Guillas, Serge

    was underlined most recently by an International Energy Agency (IEA) report last month on the trend of increasing- Committee of the Committee on Climate Change; and China's scientific agencies and seriously begin of political, economic and technical approaches to climate change policy across the world, it may now

  20. ICEIWG Key Points and Action Items - Denver, CO - August 25, 2011 |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy ChinaofSchaefer To:Department ofOral TestimonyEnergy Hydrogen5 ,INTRO SWPA

  1. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  2. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  3. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  4. The ROSAT HRI Point Spread Function

    E-Print Network [OSTI]

    Peter Predehl; Almudena Prieto

    2001-09-28T23:59:59.000Z

    A sample of the brightest point-like sources observed with the ROSAT-HRI were analysed to asses on the intrinsic shape of the ROSAT-HRI Point Spread Function (PSF). Almost all of the HRI observations collected during the ROSAT lifetime are found to be artificially broadened by factors up two ~2 due to residual errors in the ROSAT aspect solution. After correction by departing pointing positions, the width of the core of the PSF is found to be less than 5 arcsec (half energy width, HEW). On the basis of these results, an improved analytical representation of the ROSAT-HRI PSF is provided. However, for most of the new observations the source countrate is too weak to allow reliable recovering pf the ROSAT-HRI resolution. Therefore, a series of examples (data, correction, and theoretical PSF) are given in order to help the ROSAT user in determining whether "his/her source" is extended or not.

  5. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  6. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  7. PowerPoint ?????????

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Cherenkov radiation - Daily linac operation - observation of dispersion - - Compton scattering experiment - Pick-up of a microbunch from microbunch train etc....

  8. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  9. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  10. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  11. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  12. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  13. Structured Codes Improve the Bennett-Brassard-84 Quantum Key Rate

    E-Print Network [OSTI]

    Graeme Smith; Joseph M. Renes; John A. Smolin

    2008-04-28T23:59:59.000Z

    A central goal in information theory and cryptography is finding simple characterizations of optimal communication rates subject to various restrictions and security requirements. Ideally, the optimal key rate for a quantum key distribution (QKD) protocol would be given by {\\em single-letter formula} involving a simple optimization over a single use of an effective channel. We explore the possibility of such a formula for one of the simplest and most widely used QKD protocols--Bennett-Brassard-84 (BB84) with one way classical post-processing. We show that a conjectured single-letter key-rate formula is false, uncovering a deep ignorance about asymptotically good private codes and pointing towards unfortunate complications in the theory of QKD. These complications are not without benefit--with added complexity comes better key rates than previously thought possible. We improve the threshold for secure key generation from a bit error rate of 0.124 to 0.129.

  14. Air Observe System

    E-Print Network [OSTI]

    Alexander Bolonkin

    2007-01-10T23:59:59.000Z

    This manuscript contains a description and basic principles for observing inaccessible areas using low cost, easily deployed equipment. The basic premise is to suspend a tiny video camera at an altitude of 10 - 200 meters over the area to be surveyed. The TV camera supports at altitude by wind or balloon. The technical challenges regard the means by which the camera is suspended. Such a system may be used by military or police forces or by civil authorities for rescue missions or assessment of natural disasters. The method may be further developed for military applications by integrating the surveillance task with deployment of munitions. Key words: air observer, air suspended system, low altitude video observer.

  15. Nanotexturing of surfaces to reduce melting point.

    SciTech Connect (OSTI)

    Garcia, Ernest J.; Zubia, David (University of Texas at El Paso El Paso, TX); Mireles, Jose (Universidad Aut%C3%94onoma de Ciudad Ju%C3%94arez Ciudad Ju%C3%94arez, Mexico); Marquez, Noel (University of Texas at El Paso El Paso, TX); Quinones, Stella (University of Texas at El Paso El Paso, TX)

    2011-11-01T23:59:59.000Z

    This investigation examined the use of nano-patterned structures on Silicon-on-Insulator (SOI) material to reduce the bulk material melting point (1414 C). It has been found that sharp-tipped and other similar structures have a propensity to move to the lower energy states of spherical structures and as a result exhibit lower melting points than the bulk material. Such a reduction of the melting point would offer a number of interesting opportunities for bonding in microsystems packaging applications. Nano patterning process capabilities were developed to create the required structures for the investigation. One of the technical challenges of the project was understanding and creating the specialized conditions required to observe the melting and reshaping phenomena. Through systematic experimentation and review of the literature these conditions were determined and used to conduct phase change experiments. Melting temperatures as low as 1030 C were observed.

  16. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  17. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  18. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  19. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  20. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  1. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  2. Strategic Focus Points

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssues DOE's NuclearSpurringSteam Systems SteamR.Strategic Focus Points

  3. A point of order 8

    E-Print Network [OSTI]

    Semjon Adlaj

    2011-10-03T23:59:59.000Z

    A formula expressing a point of order 8 on an elliptic curve, in terms of the roots of the associated cubic polynomial, is given. Doubling such a point yields a point of order 4 distinct from the well-known points of order 4 given in standard references such as "A course of Modern Analysis" by Whittaker and Watson.

  4. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  5. St Andrews Recycling Points Recycling Points are situated locally to

    E-Print Network [OSTI]

    St Andrews, University of

    St Andrews Recycling Points Recycling Points are situated locally to allow you to recycle the following materials: To find your nearest Recycling Point please visit www.fifedirect.org.uk/wasteaware or call the Recycling Helpline on 08451 55 00 22. R&A GOLF CLUB OLD COURSE HOTEL UNIVERSITY NORTH HAUGH

  6. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  7. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  8. Sensitive detection of somatic point mutations in impure and heterogeneous cancer samples

    E-Print Network [OSTI]

    Cibulskis, Kristian

    Detection of somatic point substitutions is a key step in characterizing the cancer genome. However, existing methods typically miss low-allelic-fraction mutations that occur in only a subset of the sequenced cells owing ...

  9. Submission Format for IMS2004 (Title in 18-point Times font)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 relates module voltage and current at three key points on the I-V curve (open circuit, short circuit, and maximum power) to effective irradiance and cell temperature. The...

  10. Multiscaling at Point J: Jamming is a Critical Phenomenon J. A. Drocco,1

    E-Print Network [OSTI]

    Weeks, Eric R.

    There has been a surge of activity in jamming phe- nomena for T 0 systems such as granular materials, foams be relevant to the physics near the glass transition. A key question is whether Point J is a true continuous

  11. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  12. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  13. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  14. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  15. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  16. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  17. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  18. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  19. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  20. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  1. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  2. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  3. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  4. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  5. Secret Key Agreement Using Correlated Sources over the Generalized Multiple Access Channel

    E-Print Network [OSTI]

    Salimi, Somayeh

    2012-01-01T23:59:59.000Z

    A secret key agreement setup between three users is considered in which each of the users 1 and 2 intends to share a secret key with user 3 and users 1 and 2 are eavesdroppers with respect to each other. The three users observe i.i.d. outputs of correlated sources and there is a generalized discrete memoryless multiple access channel (GDMMAC) from users 1 and 2 to user 3 for communication between the users. The secret key agreement is established using the correlated sources and the GDMMAC. In this setup, inner and outer bounds of the secret key capacity region are investigated. Moreover, for a special case where the channel inputs and outputs and the sources form Markov chains in some order, the secret key capacity region is derived. Also a Gaussian case is considered in this setup.

  6. apache point observatory: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sky observatory's largest telescope is the versatile ARC 3.5-m, which Telescope, Dan LongAPO APOLLO and 3.5-m Observations One synoptic study is the APOLLO (Apache PointApache...

  7. Strongly coupled plasmas and the QCD critical point

    E-Print Network [OSTI]

    Athanasiou, Christiana

    2011-01-01T23:59:59.000Z

    In this thesis, we begin by studying selected fluctuation observables in order to locate the QCD critical point in heavy-ion collision experiments. In particular, we look at the non-monotonic behavior as a function of the ...

  8. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  9. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  10. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  11. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  12. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  13. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  14. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  15. Center Manifold Analysis of a PointVortex Model of Vortex Shedding with Control

    E-Print Network [OSTI]

    Protas, Bartosz

    of the point vortex F¨oppl system with linear feedback control. The F¨oppl system was used in an earlier system. Key words: point vortices, flow control, dynamical systems, wake flows PACS: 47.15.Hg, 47.27.Rc, 47.27.Vf 1 Introduction Integration of rigorous methods of Modern Control Theory with Computational

  16. Florida Nuclear Profile - Turkey Point

    U.S. Energy Information Administration (EIA) Indexed Site

    Turkey Point" "Unit","Summer capacity (mw)","Net generation (thousand mwh)","Summer capacity factor (percent)","Type","Commercial operation date","License expiration date"...

  17. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  18. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  19. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  20. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  1. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  2. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  3. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  4. Key Neutrino behavior observed at Daya Bay (The College of William and

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your Home as ReadyAppointed toCAMD TargetsKevinAna Moore

  5. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  6. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  7. Points

    Broader source: Energy.gov (indexed) [DOE]

    2,540,631 East Lansing, MI Vehicle Technologies The wave disc engine, a gas-fueled electric generator that is five times more efficient than traditional engines for...

  8. A Critical Point for Science?

    E-Print Network [OSTI]

    Josephson, B D

    2008-03-05T23:59:59.000Z

    , taboo ideas become arespectable part of science? Occult Sciences Tripos? CU Institute of Astrology? Telepathy, ‘memory of water’, ‘cold fusion’?Scientific theology, intelligent design? Mar. 5, 2008/CUPS A Critical Point for Science / Brian Josephson 32...

  9. Experimental observation of 3-D, impulsive reconnection events in a laboratory plasma

    SciTech Connect (OSTI)

    Dorfman, S.; Ji, H.; Yamada, M.; Yoo, J.; Lawrence, E.; Myers, C.; Tharp, T. D. [Center for Magnetic Self-Organization, Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543 (United States)] [Center for Magnetic Self-Organization, Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543 (United States)

    2014-01-15T23:59:59.000Z

    Fast, impulsive reconnection is commonly observed in laboratory, space, and astrophysical plasmas. In this work, impulsive, local, 3-D reconnection is identified for the first time in a laboratory current sheet. The two-fluid, impulsive reconnection events observed on the Magnetic Reconnection Experiment (MRX) [Yamada et al., Phys Plasmas 4, 1936 (1997)] cannot be explained by 2-D models and are therefore fundamentally three-dimensional. Several signatures of flux ropes are identified with these events; 3-D high current density regions with O-point structure form during a slow buildup period that precedes a fast disruption of the reconnecting current layer. The observed drop in the reconnection current and spike in the reconnection rate during the disruption are due to ejection of these flux ropes from the layer. Underscoring the 3-D nature of the events, strong out-of-plane gradients in both the density and reconnecting magnetic field are found to play a key role in this process. Electromagnetic fluctuations in the lower hybrid frequency range are observed to peak at the disruption time; however, they are not the key physics responsible for the impulsive phenomena observed. Important features of the disruption dynamics cannot be explained by an anomalous resistivity model. An important discrepancy in the layer width and force balance between the collisionless regime of MRX and kinetic simulations is also revisited. The wider layers observed in MRX may be due to the formation of flux ropes with a wide range of sizes; consistent with this hypothesis, flux rope signatures are observed down to the smallest scales resolved by the diagnostics. Finally, a 3-D two-fluid model is proposed to explain how the observed out-of-plane variation may lead to a localized region of enhanced reconnection that spreads in the direction of the out-of-plane electron flow, ejecting flux ropes from the layer in a 3-D manner.

  10. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-06-09T23:59:59.000Z

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  11. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  12. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  13. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  14. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  15. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  16. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  17. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  18. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  19. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  20. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  1. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  2. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  3. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  4. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  5. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  6. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  7. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  8. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  9. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  10. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  11. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  12. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  13. Aspects of Key Largo woodrat ecology

    E-Print Network [OSTI]

    McCleery, Robert Alan; Lopez, Roel R.

    2004-09-30T23:59:59.000Z

    or climax hammock habitat (DOI 1973, Brown 1978, Hersh 1978, Barbour and Humphrey 1982, Goodyear 1985, U. S. Fish and Wildlife Service [USFWS] 1999). These conclusions stemmed from observations of high densities of woodrat stick-nests within mature... hammock (Brown ____________ The format and style follow the Journal of Wildlife Management. 2 1978, Hersh 1978, Barbour and Humphrey 1982). Other studies have reported the KLWR will use hammock forests in varying degrees of succession (Goodyear...

  14. Biology 221 -Fall 2011 Exam number KEY Part 1 (short answer) worth 2 -4 points each (20 % of grade)

    E-Print Network [OSTI]

    Clifton, Ken

    above (circle one)? 2 (3 pts) a) What is the average depth of the ocean? 3,800 m ? b) How deep are the deepest oceanic trenches 11,000 m ? c) In what ocean do most trenches occur Pacific ? 3 (2 pts) Describe depth does this color typically penetrate in clear seawater? 10 m . 5 (2 pts) a) Graph the general

  15. CenterPoint November 2009

    E-Print Network [OSTI]

    Hemmers, Oliver

    CenterPoint November 2009 The Center for Academic Enrichment & Outreach Newsletter ONLINE ARTICLES (which is housed in the Center for Academic Enrichment and Outreach (CAEO)) assisted parents is committed to working with families and students to provide challenging academic classes, as well as social

  16. End points for facility deactivation

    SciTech Connect (OSTI)

    Szilagyi, A.P. [Dept. of Energy, Germantown, MD (United States); Negin, C.A. [Oak Technologies, Washington Grove, MD (United States); Stefanski, L.D. [Westinghouse Hanford, Richland, WA (United States)

    1996-12-31T23:59:59.000Z

    DOE`s Office of Nuclear Material and Facility Stabilization mission includes deactivating surplus nuclear facilities. Each deactivation project requires a systematic and explicit specification of the conditions to be established. End Point methods for doing so have been field developed and implemented. These methods have worked well and are being made available throughout the DOE establishment.

  17. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  18. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  19. Femtosecond photoelectron point projection microscope

    SciTech Connect (OSTI)

    Quinonez, Erik; Handali, Jonathan; Barwick, Brett [Department of Physics, Trinity College, 300 Summit St., Hartford, Connecticut 06106 (United States)] [Department of Physics, Trinity College, 300 Summit St., Hartford, Connecticut 06106 (United States)

    2013-10-15T23:59:59.000Z

    By utilizing a nanometer ultrafast electron source in a point projection microscope we demonstrate that images of nanoparticles with spatial resolutions of the order of 100 nanometers can be obtained. The duration of the emission process of the photoemitted electrons used to make images is shown to be of the order of 100 fs using an autocorrelation technique. The compact geometry of this photoelectron point projection microscope does not preclude its use as a simple ultrafast electron microscope, and we use simple analytic models to estimate temporal resolutions that can be expected when using it as a pump-probe ultrafast electron microscope. These models show a significant increase in temporal resolution when comparing to ultrafast electron microscopes based on conventional designs. We also model the microscopes spectroscopic abilities to capture ultrafast phenomena such as the photon induced near field effect.

  20. Field's Point Wastewater Treatment Facility (Narragansett Bay...

    Open Energy Info (EERE)

    Field's Point Wastewater Treatment Facility (Narragansett Bay Commission) Jump to: navigation, search Name Field's Point Wastewater Treatment Facility (Narragansett Bay Commission)...

  1. Starting Points | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    (M&O) Contract Competition Starting Points Starting Points Kansas City Plant Related Web Pages Summary Kansas City Plant Home Page Kansas City Plant Contracts DOE Directives...

  2. Video Lessons, PowerPoints, and Outlines

    E-Print Network [OSTI]

    POWERPOINT PRESENTATIONS, VIDEO LESSONS AND OUTLINES ... 6/11. Lesson 1 PowerPoint (Part A) · Lesson 1 PowerPoint (Part B) · Lesson 1 Video.

  3. Design and construction of a learning end-point sensor

    E-Print Network [OSTI]

    Aguirre, Luis Arturo

    1988-01-01T23:59:59.000Z

    of Advisory Committee: Oren Masory The objective of this thesis is to develop a learning end-point sensor-based robotic system that locates holes placed perpendicular to the surface of 3D panels. The sensor uses strain gages bonded to cantilever beams typed... manipulator while teaching the position and orientation of a set of holes on the real 3-D panel. TABLE OF CONTENTS Page I. INTRODUCTION . A. Automation the Key for Success. B. Problems in Automation C, Programming Industrial Robots by Teaching . . . D...

  4. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  5. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  6. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  7. Quantum Jet Theory, Observer Dependence, and Multi-dimensional Virasoro algebra

    E-Print Network [OSTI]

    T. A. Larsson

    2009-09-15T23:59:59.000Z

    We review some key features of Quantum Jet Theory: observer dependence, multi-dimensional Virasoro algebra, and the prediction that spacetime has four dimensions.

  8. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  9. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  10. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  11. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  12. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  13. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  14. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  15. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  16. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  17. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  18. Warmstarting the Homogeneous and Self-Dual Interior Point Method ...

    E-Print Network [OSTI]

    2012-03-29T23:59:59.000Z

    negligible computational cost. This is a ... Department of Management Science and Engineering ... A problem often incurred, however, is a relatively costly .... generating the hsd-model is by construction a feasible point for the problem, so ...... Here, ¯r denotes the mean of observed historical realizations of r and R is the

  19. Bonus points The National Access Scheme

    E-Print Network [OSTI]

    Chen, Ying

    Bonus points The National Access Scheme ANU offers bonus points for nationally strategic senior secondary subjects, and in recognition of difficult circumstances that students face in their studies. Bonus) will be awarded. Bonus points to do not apply to programs with an ATAR cut-off of 98 or higher. Bonus Points

  20. Complete Chaotic Mixing in an Electro-osmotic Flow by Destabilization of Key Periodic Pathlines

    E-Print Network [OSTI]

    R. Chabreyrie; C. Chandre; P. Singh; N. Aubry

    2011-02-07T23:59:59.000Z

    The ability to generate complete, or almost complete, chaotic mixing is of great interest in numerous applications, particularly for microfluidics. For this purpose, we propose a strategy that allows us to quickly target the parameter values at which complete mixing occurs. The technique is applied to a time periodic, two-dimensional electro-osmotic flow with spatially and temporally varying Helmoltz-Smoluchowski slip boundary conditions. The strategy consists of following the linear stability of some key periodic pathlines in parameter space (i.e., amplitude and frequency of the forcing), particularly through the bifurcation points at which such pathlines become unstable.

  1. The ISO/NASA Key Project on AGN Spectral Energy Distributions (Characteristics of the ISO Data)

    E-Print Network [OSTI]

    Eric J. Hooper; Belinda J. Wilkes; Kim K. McLeod; Martin S. Elvis; Chris D. Impey; Carol J. Lonsdale; Matt A. Malkan; Jonathan C. McDowell

    1999-02-05T23:59:59.000Z

    The U.S. ISO Key Project on quasar spectral energy distributions seeks to better understand the very broad-band emission features of quasars from radio to X-rays. A key element of this project is observations of 72 quasars with the ISOPHOT instrument at 8 bands, from 5 to 200 microns. The sample was chosen to span a wide range of redshifts and quasar types. This paper presents an overview of the analysis and reduction techniques, as well as general trends within the data set (comparisons with IRAS fluxes, uncertainties as a function of background sky brightness, and an analysis of vignetting corrections in chopped observing mode). A more detailed look at a few objects in the sample is presented in Wilkes et al. 1999, astro-ph/9902084.

  2. 1 Introduction The Global Stratotype Section and Point (GSSP) of the

    E-Print Network [OSTI]

    Tong, Jinnan

    Key Lab of Geological Process and Mineral Resources, China University of Geosciences, Wuhan, Hubei1 Introduction The Global Stratotype Section and Point (GSSP) of the Permian-Triassic Boundary (PTB of geological history symbolized by profound global changes and the strongest Phanerozoic mass extinction. Until

  3. OSCILLATORY FLOW NEAR A STAGNATION POINT M. G. BLYTH AND P. HALL

    E-Print Network [OSTI]

    Blyth, Mark

    frequency limits. Key words. stagnation point, boundary layer, steady streaming AMS subject classification such as acoustic noise impinging on the boundary layer around a translating bluff body. More generally, while the high frequency case exhibits a double boundary layer structure similar to that first discussed

  4. Modeling Residential Urban Areas from Dense Aerial LiDAR Point Clouds

    E-Print Network [OSTI]

    Shahabi, Cyrus

    Modeling Residential Urban Areas from Dense Aerial LiDAR Point Clouds Qian-Yi Zhou and Ulrich models for residential areas from aerial LiDAR scans. The key differ- ence between downtown area modeling and residential area modeling is that the latter usually contains rich vegetation. Thus, we propose a robust

  5. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  6. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  7. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  8. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  9. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  10. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  11. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  12. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  13. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  14. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  15. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  16. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  17. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  18. H-D Substitution in Interstellar Solid Methanol: A Key Route for D Enrichment

    E-Print Network [OSTI]

    Akihiro Nagaoka; Naoki Watanabe; Akira Kouchi

    2005-03-28T23:59:59.000Z

    Deuterium enrichment of interstellar methanol is reproduced experimentally for the first time via grain-surface H-D substitution in solid methanol at an atomic D/H ratio of 0.1. Although previous gas-grain models successfully reproduce the deuterium enrichments observed in interstellar methanol molecules (D/H of up to 0.4, compared to the cosmic ratio of $\\sim 10^{-5})$, the models exclusively focus on deuterium fractionation resulting from the successive addition of atomic hydrogen/deuterium on CO. The mechanism proposed here represents a key route for deuterium enrichment that reproduces the high observed abundances of deuterated methanol, including multiple deuterations.

  19. Far-infrared Point Sources

    E-Print Network [OSTI]

    B. Guiderdoni

    1999-03-08T23:59:59.000Z

    The analysis of the submm anisotropies that will be mapped by the forthcoming MAP and PLANCK satellites requires careful foreground subtraction before measuring CMB fluctuations. Among these, the foreground due to IR/submm thermal radiation from dusty sources was poorly known until recent observational breakthroughs began unveiling the properties of these objects. We hereafter briefly review the observational evidence for a strong evolution of IR/submm sources with respect to the local universe explored by IRAS. We present the basic principles of a new modeling effort where consistent spectral energy distributions of galaxies are implemented into the paradigm of hierarchical clustering with the fashionable semi-analytic approach. This model provides us with specific predictions in IR/submm wavebands, that seem to reproduce the current status of the observations and help assessing the capabilities of forthcoming instruments to pursue the exploration of the deep universe at IR/submm wavelengths. Finally, the ability of the PLANCK High Frequency Instrument all-sky survey to produce a catalogue of dusty sources at submm wavelengths is briefly described.

  20. CX Lyrae 2008 Observing Campaign

    E-Print Network [OSTI]

    de Ponthiere, Pierre; Hambsch, Franz-Josef

    2012-01-01T23:59:59.000Z

    The Blazhko effect in CX Lyr has been reported for the first time by Le Borgne et al. (2007). The authors have pointed out that the Blazhko period was not evaluated accurately due to dataset scarcity. The possible period values announced were 128 or 227 days. A newly conducted four-month observing campaign in 2008 (fifty-nine observation nights) has provided fourteen times of maximum. From a period analysis of measured times of maximum, a Blazhko period of 62 +/- 2 days can be suggested. However, the present dataset is still not densely sampled enough to exclude that the measured period is still a modulation of the real Blazhko period. Indeed the shape of the (O-C) curve does not repeat itself exactly during the campaign duration.

  1. Anticorrelation between Surface and Subsurface Point Defects...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    between Surface and Subsurface Point Defects and the Impact on the Redox Chemistry of TiO2(110). Anticorrelation between Surface and Subsurface Point Defects and the...

  2. Inflection point inflation within supersymmetry

    SciTech Connect (OSTI)

    Enqvist, Kari [Physics Department and Helsinki Institute of Physics, FI-00014 University of Helsinki (Finland); Mazumdar, Anupam; Stephens, Philip, E-mail: kari.enqvist@helsinki.fi, E-mail: a.mazumdar@lancaster.ac.uk, E-mail: p.stephens@lancaster.ac.uk [Physics Department, Lancaster University, Lancaster, LA1 4YB (United Kingdom)

    2010-06-01T23:59:59.000Z

    We propose to address the fine tuning problem of inflection point inflation by the addition of extra vacuum energy that is present during inflation but disappears afterwards. We show that in such a case, the required amount of fine tuning is greatly reduced. We suggest that the extra vacuum energy can be associated with an earlier phase transition and provide a simple model, based on extending the SM gauge group to SU(3){sub C} × SU(2){sub L} × U(1){sub Y} × U(1){sub B?L}, where the Higgs field of U(1){sub B?L} is in a false vacuum during inflation. In this case, there is virtually no fine tuning of the soft SUSY breaking parameters of the flat direction which serves as the inflaton. However, the absence of radiative corrections which would spoil the flatness of the inflaton potential requires that the U(1){sub B?L} gauge coupling should be small with g{sub B?L} ? 10{sup ?4}.

  3. AN INTERIOR POINT METHOD FOR MATHEMATICAL PROGRAMS ...

    E-Print Network [OSTI]

    Abstract. Interior point methods for nonlinear programs (NLP) are adapted for solution of mathematical programs with complementarity constraints (MPCCs).

  4. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  5. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  6. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  7. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  8. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  9. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  10. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  11. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  12. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  13. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  14. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  15. Differential Point Rendering Aravind Kalaiah Amitabh Varshney

    E-Print Network [OSTI]

    Varshney, Amitabh

    Differential Point Rendering Aravind Kalaiah Amitabh Varshney University of Maryland1 Abstract. We present a novel point rendering primitive, called Differential Point (DP), that captures the local-based models. This information is used to efficiently render the surface as a collection of local neighborhoods

  16. Level Set Implementations on Unstructured Point Cloud

    E-Print Network [OSTI]

    Duncan, James S.

    Level Set Implementations on Unstructured Point Cloud by HO, Hon Pong A Thesis Submitted;Level Set Implementations on Unstructured Point Cloud by HO, Hon Pong This is to certify that I have implementations on unstructured point cloud 15 3.1 Level set initialization

  17. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  18. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  19. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  20. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  1. Critical point analysis of phase envelope diagram

    SciTech Connect (OSTI)

    Soetikno, Darmadi; Siagian, Ucok W. R. [Department of Petroleum Engineering, Institut Teknologi Bandung, Jl. Ganesha 10, Bandung 40132 (Indonesia); Kusdiantara, Rudy, E-mail: rkusdiantara@s.itb.ac.id; Puspita, Dila, E-mail: rkusdiantara@s.itb.ac.id; Sidarto, Kuntjoro A., E-mail: rkusdiantara@s.itb.ac.id; Soewono, Edy; Gunawan, Agus Y. [Department of Mathematics, Institut Teknologi Bandung, Jl. Ganesha 10, Bandung 40132 (Indonesia)

    2014-03-24T23:59:59.000Z

    Phase diagram or phase envelope is a relation between temperature and pressure that shows the condition of equilibria between the different phases of chemical compounds, mixture of compounds, and solutions. Phase diagram is an important issue in chemical thermodynamics and hydrocarbon reservoir. It is very useful for process simulation, hydrocarbon reactor design, and petroleum engineering studies. It is constructed from the bubble line, dew line, and critical point. Bubble line and dew line are composed of bubble points and dew points, respectively. Bubble point is the first point at which the gas is formed when a liquid is heated. Meanwhile, dew point is the first point where the liquid is formed when the gas is cooled. Critical point is the point where all of the properties of gases and liquids are equal, such as temperature, pressure, amount of substance, and others. Critical point is very useful in fuel processing and dissolution of certain chemicals. Here in this paper, we will show the critical point analytically. Then, it will be compared with numerical calculations of Peng-Robinson equation by using Newton-Raphson method. As case studies, several hydrocarbon mixtures are simulated using by Matlab.

  2. If physics is an information science, what is an observer?

    E-Print Network [OSTI]

    Chris Fields

    2012-02-11T23:59:59.000Z

    Interpretations of quantum theory have traditionally assumed a "Galilean" observer, a bare "point of view" implemented physically by a quantum system. This paper investigates the consequences of replacing such an informationally-impoverished observer with an observer that satisfies the requirements of classical automata theory, i.e. an observer that encodes sufficient prior information to identify the system being observed and recognize its acceptable states. It shows that with reasonable assumptions about the physical dynamics of information channels, the observations recorded by such an observer will display the typical characteristics predicted by quantum theory, without requiring any specific assumptions about the observer's physical implementation.

  3. Shor-Preskill Type Security-Proofs for Concatenated Bennett-Brassard 1984 Quantum Key Distribution Protocol

    E-Print Network [OSTI]

    W. -Y. Hwang; K. Matsumoto; H. Imai; J. Kim; H. -W. Lee

    2002-10-31T23:59:59.000Z

    We discuss long code problems in the Bennett-Brassard 1984 (BB84) quantum key distribution protocol and describe how they can be overcome by concatenation of the protocol. Observing that concatenated modified Lo-Chau protocol finally reduces to the concatenated BB84 protocol, we give the unconditional security of the concatenated BB84 protocol.

  4. Zero point energy on extra dimension: Noncommutative Torus

    E-Print Network [OSTI]

    S. Fabi; B. Harms; G. Karatheodoris

    2007-04-25T23:59:59.000Z

    In this paper we calculate the zero point energy density experienced by observers on M^4 due to a massless scalar field defined throughout M^4 x T^2_F, where T^2_F are fuzzy extra dimensions. Using the Green's function approach we calculate the energy density for the commutative torus and the fuzzy torus. We calculate then the energy density for the fuzzy torus using the Hamiltonian approach. Agreement is shown between Green's function and Hamiltonian approaches.

  5. Verification of exceptional points in the collapse dynamics of Bose-Einstein condensates

    E-Print Network [OSTI]

    Jonas Brinker; Jacob Fuchs; Jörg Main; Günter Wunner; Holger Cartarius

    2014-11-20T23:59:59.000Z

    In Bose-Einstein condensates with an attractive contact interaction the stable ground state and an unstable excited state emerge in a tangent bifurcation at a critical value of the scattering length. At the bifurcation point both the energies and the wave functions of the two states coalesce, which is the characteristic of an exceptional point. In numerical simulations signatures of the exceptional point can be observed by encircling the bifurcation point in the complex extended space of the scattering length, however, this method cannot be applied in an experiment. Here we show in which way the exceptional point effects the collapse dynamics of the Bose-Einstein condensate. The harmonic inversion analysis of the time signal given as the spatial extension of the collapsing condensate wave function can provide clear evidence for the existence of an exceptional point. This method can be used for an experimental verification of exceptional points in Bose-Einstein condensates.

  6. GRADE NUMBER OF CREDITS FACTOR QUALITY POINTS HOW TO COMPUTE A GRADE POINT AVERAGE

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    .00 = __________ TOTALS: _________ __________ CREDITS QUALITY PTS. Divide total credits into total quality pointsGRADE NUMBER OF CREDITS FACTOR QUALITY POINTS HOW TO COMPUTE A GRADE POINT AVERAGE A _________ x 4 and the result is the grade point average (GPA). QUALITY PTS. = GPA ____________ = CREDITS

  7. TEG: A High-Performance, Scalable, Multi-Network Point-to-Point Communications Methodology

    E-Print Network [OSTI]

    Lumsdaine, Andrew

    TEG: A High-Performance, Scalable, Multi-Network Point-to-Point Communications Methodology T University Abstract. TEG is a new component-based methodology for point-to-point mes- saging. Developed as part of the Open MPI project, TEG provides a configurable fault-tolerant capability for high

  8. Quantiles as Optimal Point Predictors Tilmann Gneiting

    E-Print Network [OSTI]

    Washington at Seattle, University of

    on the Bank of England's density forecasts of United Kingdom inflation rates, and probabilistic predictions of wind energy resources in the Pacific Northwest. Key words and phrases: asymmetric loss function; Bayes

  9. Addendum: Observables for General Relativity related to geometry

    E-Print Network [OSTI]

    Duch, Pawe?; Lewandowski, Jerzy; ?wie?ewski, Jedrzej

    2015-01-01T23:59:59.000Z

    In this addendum we clarify a point which strengthens one of the results from [the original paper]. Namely, we show that the algebra of the observables $F(r,\\theta)$ is yet simpler then it was described in [the original paper]. This is an important point, because with this simplification an important subalgebra becomes canonical, allowing for a natural reduction of the phase space.

  10. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  11. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  12. Stable fixed points in the Kuramoto model

    E-Print Network [OSTI]

    Richard Taylor

    2010-10-05T23:59:59.000Z

    We develop a necessary condition for the existence of stable fixed points for the general network Kuramoto model, and use it to show that for the complete network the homogeneous model has no non-zero stable fixed point solution. This result provides further evidence that in the homogeneous case the zero fixed point has an attractor set consisting of the entire space minus a set of measure zero, a conjecture of Verwoerd and Mason (2007).

  13. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  14. Wolf Point Substation, Roosevelt County, Montana

    SciTech Connect (OSTI)

    Not Available

    1991-05-01T23:59:59.000Z

    The Western Area Power Administration (Western), an agency of the United States Department of Energy, is proposing to construct the 115-kV Wolf Point Substation near Wolf Point in Roosevelt County, Montana (Figure 1). As part of the construction project, Western's existing Wolf Point Substation would be taken out of service. The existing 115-kV Wolf Point Substation is located approximately 3 miles west of Wolf Point, Montana (Figure 2). The substation was constructed in 1949. The existing Wolf Point Substation serves as a Switching Station'' for the 115-kV transmission in the region. The need for substation improvements is based on operational and reliability issues. For this environmental assessment (EA), the environmental review of the proposed project took into account the removal of the old Wolf Point Substation, rerouting of the five Western lines and four lines from the Cooperatives and Montana-Dakota Utilities Company, and the new road into the proposed substation. Reference to the new proposed Wolf Point Substation in the EA includes these facilities as well as the old substation site. The environmental review looked at the impacts to all resource areas in the Wolf Point area. 7 refs., 6 figs.

  15. Building Green in Greensburg: Prairie Pointe Townhomes

    Office of Energy Efficiency and Renewable Energy (EERE)

    This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing Prairie Pointe Townhomes in Greensburg, Kansas.

  16. SIMPLE EXPLICIT FORMULA FOR COUNTING LATTICE POINTS ...

    E-Print Network [OSTI]

    2007-02-14T23:59:59.000Z

    by a simple formula involving the evaluation of ? zx over the integral points of those ... different) formula from a decomposition of the generating function into.

  17. Wisconsin Nuclear Profile - Point Beach Nuclear Plant

    U.S. Energy Information Administration (EIA) Indexed Site

    Point Beach Nuclear Plant" "Unit","Summer capacity (mw)","Net generation (thousand mwh)","Summer capacity factor (percent)","Type","Commercial operation date","License expiration...

  18. Computing proximal points of nonconvex functions

    E-Print Network [OSTI]

    2006-01-18T23:59:59.000Z

    By means of variational analysis, the concept of proximal mapping was ..... modified to guarantee convergence to the proximal point, or to detect failure if R is not ...

  19. Effective Immediately - OASIS Reservation Points Suspended -...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CommitteesTeams Customer Training Interconnection Notices Rates Standards of Conduct Tariff TF Web Based Training Notice: Effective Immediately - OASIS Reservation Points...

  20. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  1. Updated On: 11/7/2012 16:28 Teams: Off In The Gym points Bromuda Triangle Open points

    E-Print Network [OSTI]

    Sridhar, Srinivas

    Diamantides 0 #12;I Was Saying Boourns points Diesel points Faaantastic points Michael Chafetz - C 0 Steven Webber 0 Taylor Goudreau 0 Jared Lowe 0 #12;GREEDIANS points The Brown Bears points Wanna go Stetty West

  2. Stauts of the Laser Inertial Fusion Energy (LIFE) Hohlraum Point Design

    SciTech Connect (OSTI)

    Amendt, P; Dunne, M; Ho, D; Lasinski, B; Meeker, D; Ross, J S

    2012-04-10T23:59:59.000Z

    Progress on the hohlraum point design for the LIFE engine is described. New features in the original design [Amendt et al., Fus. Sci. Technol. 60, 49 (2011)] are incorporated that address the imperatives of low target cost, high manufacturing throughput, efficient and prompt material recycling, an ability for near-term testing of key target design uncertainties on the National Ignition Facility, and robustness to target chamber environment and injection insults. To this end, the novel use of Pb hohlraums and aerogel-supported liquid DT fuel loading within a high-density-carbon (HDC) ablator is implemented in the hohlraum point design.

  3. Vision-Aided Inertial Navigation for Pin-Point Landing using Observations of Mapped Landmarks

    E-Print Network [OSTI]

    Roumeliotis, Stergios I.

    , as well as by estimating and limiting touchdown velocities to within airbag or landing gear specifications

  4. The Wolf-Rayet hydrogen puzzle -- an observational point of view

    E-Print Network [OSTI]

    C. Foellmi; S. V. Marchenko; A. F. J. Moffat

    2005-10-20T23:59:59.000Z

    Significant amounts of hydrogen were found in very hot early-type single WN stars in the SMC and the LMC. Recently, we found similar evidence in the Wolf-Rayet star of a short-period LMC binary. We discuss here the relevance of hydrogen for WR star classification, models, the relation to metallicity, and the GRB progenitors.

  5. Inversion of STEP-Observation Equation Using Banach's Fixed-Point Principle

    E-Print Network [OSTI]

    Stuttgart, Universität

    s on the sphere Sr of radius r, if for every u E H~(S~) with the spherical harmonics expansion n>Olm

  6. LETTER TO THE EDITOR Contour Mapping and Number of Point Observations

    E-Print Network [OSTI]

    Liebhold, Andrew

    alternative would have been to present the same data as bubble plots with either size, shape, or color of discrete dots indicating the magnitude of trap captures (Bailey and Gatrell 1995, Nansen et al. 2003

  7. Speech versus keying commands in a text-editing task

    E-Print Network [OSTI]

    Bierschwale, John Milton

    1987-01-01T23:59:59.000Z

    . A study (Vidulich, 1986) was designed to investigate the possibility that asymmetrical transfer was contaminating the results of research in this area. The study found nothing. to support asymmetrical transfer. The preceding discussion points...

  8. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  9. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  10. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  11. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  12. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  13. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  14. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  15. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  16. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  17. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  18. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  19. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  20. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  1. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  2. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  3. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  4. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  5. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  6. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  7. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  8. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  9. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  10. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  11. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  12. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  13. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  14. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  15. Infrared fixed point in quantum Einstein gravity

    E-Print Network [OSTI]

    S. Nagy; J. Krizsan; K. Sailer

    2012-06-28T23:59:59.000Z

    We performed the renormalization group analysis of the quantum Einstein gravity in the deep infrared regime for different types of extensions of the model. It is shown that an attractive infrared point exists in the broken symmetric phase of the model. It is also shown that due to the Gaussian fixed point the IR critical exponent $\

  16. Traveling water waves with point vortices

    E-Print Network [OSTI]

    Kristoffer Varholm

    2015-03-20T23:59:59.000Z

    We construct small-amplitude solitary traveling gravity-capillary water waves with a finite number of point vortices along a vertical line, on finite depth. This is done using a local bifurcation argument. The properties of the resulting waves are also examined: We find that they depend significantly on the position of the point vortices in the water column.

  17. Zero-point energy in spheroidal geometries

    E-Print Network [OSTI]

    A. R. Kitson; A. I. Signal

    2005-12-19T23:59:59.000Z

    We study the zero-point energy of a massless scalar field subject to spheroidal boundary conditions. Using the zeta-function method, the zero-point energy is evaluated for small ellipticity. Axially symmetric vector fields are also considered. The results are interpreted within the context of QCD flux tubes and the MIT bag model.

  18. Three-point spherical mirror mount

    DOE Patents [OSTI]

    Cutburth, R.W.

    1984-01-23T23:59:59.000Z

    A three-point spherical mirror mount for use with lasers is disclosed. The improved mirror mount is adapted to provide a pivot ring having an outer surface with at least three spaced apart mating points to engage an inner spherical surface of a support housing.

  19. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  20. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  1. Interaction between Injection Points during Hydraulic Fracturing

    E-Print Network [OSTI]

    Hals, Kjetil M D

    2012-01-01T23:59:59.000Z

    We present a model of the hydraulic fracturing of heterogeneous poroelastic media. The formalism is an effective continuum model that captures the coupled dynamics of the fluid pressure and the fractured rock matrix and models both the tensile and shear failure of the rock. As an application of the formalism, we study the geomechanical stress interaction between two injection points during hydraulic fracturing (hydrofracking) and how this interaction influences the fracturing process. For injection points that are separated by less than a critical correlation length, we find that the fracturing process around each point is strongly correlated with the position of the neighboring point. The magnitude of the correlation length depends on the degree of heterogeneity of the rock and is on the order of 30-45 m for rocks with low permeabilities. In the strongly correlated regime, we predict a novel effective fracture-force that attracts the fractures toward the neighboring injection point.

  2. Guide to Douglas Point, Charles County, Maryland

    SciTech Connect (OSTI)

    Jensen, B.L.; Miles, K.J.; Strass, P.K.; McDonald, B.S. Jr.

    1980-01-01T23:59:59.000Z

    In 1974, the tract of land now known as the Douglas Point Ecology Laboratory was pieced together from approximately 10 smaller pieces by the Potomac Electric Power Company (PEPCO) for the purpose of developing a nuclear power generating station. At that time they decided to leave the bulk of the property in its natural state for ecological research. Douglas Point is reasonably representative of a large section of the Atlantic Coastal plain. Results from research on the site may be applicable to larger coastal plain areas. This section of Charles County is one of the least populated areas in Maryland, and the portion of the county known as Maryland Point, which includes Douglas Point, contains some of the most extensive, continuous forested tracts of land remaining in the state. The present publication is intended to be used as an introduction to Douglas Point, its history, biology, geology, topography, soils, and climatology.

  3. Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01T23:59:59.000Z

    "Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

  4. Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01T23:59:59.000Z

    Grid parity--or break-even cost--for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that local incentives rather than ?technical? parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  5. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Fei Gao; Su-Juan Qin; Fen-Zhuo Guo; Qiao-Yan Wen

    2011-04-20T23:59:59.000Z

    Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e. the dense-coding attack. It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice's encoding. The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed. Furthermore, this attack does not introduce any errors to the transmitted information and consequently will not be discovered by Alice and Bob. The attack strategy is described in detail and a proof for its correctness is given. At last, the root of this insecurity and a possible way to improve these protocols are discussed.

  6. On the Scission Point Configuration of Fisioning Nuclei

    E-Print Network [OSTI]

    Ivanyuk, Fedir

    2013-01-01T23:59:59.000Z

    The scission of a nucleus into two fragments is at present the least understood part of the fission process, though the most important for the formation of the observables. To investigate the potential energy landscape at the largest possible deformations, i.e. at the scission point (line, hypersurface), the Strutinsky's optimal shape approach is applied. For the accurate description of the mass-asymmetric nuclear shape at the scission point, it turned out necessary to construct an interpolation between the two sets of constraints for the elongation and mass asymmetry which are applied successfully at small deformations (quadrupole and octupole moments) and for separated fragments (the distance between the centers of mass and the difference of fragments masses). In addition, a constraint on the neck radius was added, what makes it possible to introduce the so called super-short and super-long shapes at the scission point and to consider the contributions to the observable data from different fission modes. Th...

  7. On the Scission Point Configuration of Fisioning Nuclei

    E-Print Network [OSTI]

    Fedir Ivanyuk

    2013-03-29T23:59:59.000Z

    The scission of a nucleus into two fragments is at present the least understood part of the fission process, though the most important for the formation of the observables. To investigate the potential energy landscape at the largest possible deformations, i.e. at the scission point (line, hypersurface), the Strutinsky's optimal shape approach is applied. For the accurate description of the mass-asymmetric nuclear shape at the scission point, it turned out necessary to construct an interpolation between the two sets of constraints for the elongation and mass asymmetry which are applied successfully at small deformations (quadrupole and octupole moments) and for separated fragments (the distance between the centers of mass and the difference of fragments masses). In addition, a constraint on the neck radius was added, what makes it possible to introduce the so called super-short and super-long shapes at the scission point and to consider the contributions to the observable data from different fission modes. The calculated results for the mass distribution of the fission fragment and the Coulomb repulsion energy "immediately after scission" are in a reasonable agreement with experimental data.

  8. Atomic Collapse Observed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Scientists Observe Atomic Collapse State Quantum Mechanics Prediction Confirmed in Graphene Using NERSC's Hopper April 26, 2013 | Tags: Hopper, Materials Science Contact: Linda...

  9. Hot Pot Field Observations

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Lane, Michael

    Map of field observations including depressions, springs, evidence of former springs, travertine terraces and vegetation patterns. Map also contains interpretation of possible spring alignments.

  10. Hot Pot Field Observations

    SciTech Connect (OSTI)

    Lane, Michael

    2013-06-28T23:59:59.000Z

    Map of field observations including depressions, springs, evidence of former springs, travertine terraces and vegetation patterns. Map also contains interpretation of possible spring alignments.

  11. Speaking of Places - - A Tale of Two Points

    E-Print Network [OSTI]

    Baldwin, Ian

    2009-01-01T23:59:59.000Z

    patches of Queens. Hunters Point, facing midtown Manhattanshowing the locations of Hunters Point South and WilletsCurrent plans for Hunters Point South would extend this

  12. Relevance of complex branch points for partial wave analysis

    SciTech Connect (OSTI)

    Ceci, S.; Svarc, A. [Rudjer Boskovic Institute, Bijenicka 54, HR-10000 Zagreb (Croatia); Doering, M. [HISKP (Theorie), Universitaet Bonn, Nussallee 14-16, D-53115 Bonn (Germany); Hanhart, C.; Krewald, S. [Institut fuer Kernphysik and Juelich Center for Hadron Physics, Forschungszentrum Juelich, D-52425 Juelich (Germany); Institute for Advanced Simulation, Forschungszentrum Juelich, D-52425 Juelich (Germany); Meissner, U.-G. [HISKP (Theorie), Universitaet Bonn, Nussallee 14-16, D-53115 Bonn (Germany); Institut fuer Kernphysik and Juelich Center for Hadron Physics, Forschungszentrum Juelich, D-52425 Juelich (Germany); Institute for Advanced Simulation, Forschungszentrum Juelich, D-52425 Juelich (Germany)

    2011-07-15T23:59:59.000Z

    A central issue in hadron spectroscopy is to deduce--and interpret--resonance parameters, namely, pole positions and residues, from experimental data, for those are the quantities to be compared to lattice QCD or model calculations. However, not every structure in the observables derives from a resonance pole: the origin might as well be branch points, either located on the real axis (when a new channel composed of stable particles opens) or in the complex plane (when at least one of the intermediate particles is unstable). In this paper we demonstrate first the existence of such branch points in the complex plane and then show on the example of the {pi}N P{sub 11} partial wave that it is not possible to distinguish the structures induced by the latter from a true pole signal based on elastic data alone.

  13. Microscopic return point memory in Co/Pd multilayer films

    SciTech Connect (OSTI)

    Seu, K.A.; Su, R.; Roy, S.; Parks, D.; Shipton, E.; Fullerton, E.E.; Kevan, S.D.

    2009-10-01T23:59:59.000Z

    We report soft x-ray speckle metrology measurements of microscopic return point and complementary point memory in Co/Pd magnetic films having perpendicular anisotropy. We observe that the domains assemble into a common labyrinth phase with a period that varies by nearly a factor of two between initial reversal and fields near saturation. Unlike previous studies of similar systems, the ability of the film to reproduce its domain structure after magnetic cycling through saturation varies from loop to loop, from position to position on the sample, and with the part of the speckle pattern used in the metrology measurements. We report the distribution of memory as a function of field and discuss these results in terms of the reversal process.

  14. Damping the zero-point energy of a harmonic oscillator

    E-Print Network [OSTI]

    T. G Philbin; S. A. R. Horsley

    2013-07-31T23:59:59.000Z

    The physics of quantum electromagnetism in an absorbing medium is that of a field of damped harmonic oscillators. Yet until recently the damped harmonic oscillator was not treated with the same kind of formalism used to describe quantum electrodynamics in a arbitrary medium. Here we use the techniques of macroscopic QED, based on the Huttner--Barnett reservoir, to describe the quantum mechanics of a damped oscillator. We calculate the thermal and zero-point energy of the oscillator for a range of damping values from zero to infinity. While both the thermal and zero-point energies decrease with damping, the energy stored in the oscillator at fixed temperature increases with damping, an effect that may be experimentally observable. As the results follow from canonical quantization, the uncertainty principle is valid for all damping levels.

  15. DES Ch t 9DES Chapter 9 The Starting Point forThe Starting Point for

    E-Print Network [OSTI]

    Schubart, Christoph

    of the firm's cost of capital. (Chapter 11) Step 6: Project the financial statements by choosing key inputsProvide projections for key performance drivers. Obtain preliminary intrinsic value estimateObtain preliminary intrinsic value estimate. Refine projections and perform sensitivity analysis to determine impact

  16. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  17. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  18. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  19. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  20. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  1. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  2. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  3. CenterPoint Energy Sustainable Schools Program

    Broader source: Energy.gov [DOE]

    The Sustainable Schools Program focuses on energy savings through behavioral and operational improvements, and may be used along with CenterPoint Energy’s SCORES and Load Management programs. It...

  4. INTERIOR-POINT METHODS FOR NONCONVEX NONLINEAR ...

    E-Print Network [OSTI]

    2005-11-04T23:59:59.000Z

    Nov 4, 2005 ... problem is not convex, the algorithm will be searching for a local optimum. ..... the terms in the barrier objective of our infeasible interior-point method. ..... In order to enter dual feasibility restoration mode, we monitored the ...

  5. PowerPoints, Video Lessons and Outlines

    E-Print Network [OSTI]

    Lesson 1 Video · Lesson 1 Outline ... Lesson 2 Video · Lesson 2 Outline. 9/1. Labor Day. No Classes. 9/2. 9/3. Lesson 3 PowerPoint · Lesson 3 Video · Lesson 3 ...

  6. Cumulative Undergraduate Grade Point Average (GPA) Potential Student Name: _____________________________

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    in the list from Step "a" and sum them: = ____________Total Quality Points Note: Quality Points assigned Total Quality Points (number from Step "b") by Total Credits (number from Step "a"). Cumulative GPA = Total Quality Points/Total Credits = _______________ #12;

  7. Relativistic point-form approach to hadron properties

    E-Print Network [OSTI]

    W. Plessas

    2010-10-31T23:59:59.000Z

    We present a review of the description of hadron properties along an invariant mass operator in the point form of Poincar\\'e-invariant relativistic dynamics. The quark-quark interaction is furnished by a linear confinement, consistent with the QCD string tension, and a hyperfine interaction derived from Goldstone-boson exchange. The main advantage of the point-form approach is the possibility of calculating manifestly covariant observables, since the generators of Lorentz transformations remain interaction-free. We discuss the static properties of the mass-operator eigenstates, such as the invariant mass spectra of light- and heavy-flavor baryons, the characteristics of the eigenstates in terms of their spin, flavor, and spatial dependences as well as their classification into spin-flavor multiplets. Regarding dynamical observables we address the electroweak structures of the nucleon and hyperon ground states, including their electric radii, magnetic moments as well as axial charges, and in addition a recently derived microscopic description of the $\\pi NN$ as well as $\\pi N\\Delta$ interaction vertices. Except for hadronic resonance decays, which are not addressed here due to space limitations, all of these observables are obtained in good agreement with existing phenomenology. Relativistic (boost) effects are generally sizable. We conclude that low-energy hadrons can be well described by an effective theory with a finite number of degrees of freedom, as long as the symmetries of low-energy quantum chromodynamics (spontaneously broken chiral symmetry) as well as special relativity (Poincar\\'e invariance) are properly taken into account. The latter requirement is particularly well and efficiently met in the point-form approach.

  8. Comparative Analysis of a Transition Region Bright Point with a Blinker and Coronal Bright Point Using Multiple EIS Emission Lines

    E-Print Network [OSTI]

    Orange, N Brice; Chesny, David L; Patel, Maulik; Hesterly, Katie; Preuss, Lauren; Neira, Chantale; Turner, Niescja E

    2015-01-01T23:59:59.000Z

    Since their discovery twenty year ago, transition region bright points (TRBPs) have never been observed spectroscopically. Bright point properties have not been compared with similar transition region and coronal structures. In this work we have investigated three transient quiet Sun brightenings including a TRBP, a coronal BP (CBP) and a blinker. We use time-series observations of the extreme ultraviolet emission lines of a wide range of temperature T (log T = 5.3 - 6.4) from the EUV imaging spectrometer (EIS) onboard the Hinode satellite. We present the EIS temperature maps and Doppler maps, which are compared with magnetograms from the Michelson Doppler Imager (MDI) onboard the SOHO satellite. Doppler velocities of the TR BP and blinker are <,25 km s$^{-1}$, which is typical of transient TR phenomena. The Dopper velocities of the CBP were found to be < 20 km s^{-1} with exception of those measured at log T = 6.2 where a distinct bi-directional jet is observed. From an EM loci analysis we find evidenc...

  9. Zero point energy on extra dimensions: Noncommutative torus

    SciTech Connect (OSTI)

    Fabi, S.; Harms, B.; Karatheodoris, G. [Department of Physics and Astronomy, University of Alabama, Box 870324, Tuscaloosa, Alabama 35487-0324 (United States)

    2007-09-15T23:59:59.000Z

    In this paper we calculate the zero point energy density experienced by observers on M{sup 4} due to a massless scalar field defined throughout M{sup 4}xT{sub F}{sup 2}, where T{sub F}{sup 2} are fuzzy extra dimensions. Using the Green's function approach we calculate the energy density for the commutative torus and the fuzzy torus. We also calculate the energy density for the fuzzy torus using the Hamiltonian approach. Agreement is shown between the Green's function and Hamiltonian approaches.

  10. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  11. Ten Myths of ICT4D (And One Key Lesson)

    E-Print Network [OSTI]

    Anderson, Richard

    development and the modernization of farming? Where would the break-even point come? Where would the saving;Technology X will save the world. Wasn't true for X = radio, TV, or landline phone, despite initial ­ E.g., health insurance "Poverty premium" exists for a reason. Poor populations are... ­ Harder

  12. ANU CRICOS # 00120C SRI082013 Bonus points

    E-Print Network [OSTI]

    Zhou, Xiangyun "Sean"

    ANU CRICOS # 00120C SRI082013 Bonus points The National Access Scheme 2014 ANU offers bonus points face in their studies. Bonus points are applied to all applicants with an ATAR at or above 70. Points and maximum 5 equity points) will be awarded. Bonus points to do not apply to programs with an ATAR cut

  13. Observational learning in horses

    E-Print Network [OSTI]

    Baer, Katherine Louise

    1979-01-01T23:59:59.000Z

    . One group served as control subjects while the other group functioned as a treated group (observers). The observers were allowed to watch a correctly performed discrimination task prior to testing of a learning response using the same task.... Discrimination testing was conducted on all horses daily for 14 days with criterion set at seven out of eight responses correct with the last five consecutively correct. The maximum number of trials performed without reaching set criterion was limited...

  14. 2001: PUBLICATIONS WITH RESULTS FROM USERS' IRAM OBSERVATIONS

    E-Print Network [OSTI]

    RadioAstronomie Millimétrique, Institut de (IRAM)

    2001: PUBLICATIONS WITH RESULTS FROM USERS' IRAM OBSERVATIONS 829. WARM H2 IN THE GALACTIC CENTER. Hüttemeister 2001, A&A 365, 174 830. THE IRAM KEY-PROJECT: SMALL- SCALE STRUCTURE OF PRE-STAR FORMING REGIONS. Heithausen, E. Falgarone 2001, A&A 365, 275 831. METHODS AND CONSTRAINTS FOR THE CORRECTION OF THE ERROR BEAM

  15. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    that would strongly impede plasma motion or even thwart it altogether, leading to a "rubber-like" behavior of the plasma. However, the experimentally observed evolution of...

  16. 10b- Bifurcations in swirling flames.key

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    levels * The FTFs between the two states also differ suggesting different thermoacoustic effects * The transition between the two states observed in the present gas...

  17. Third-Order Gas-Liquid Phase Transition and the Nature of Andrews Critical Point

    E-Print Network [OSTI]

    Tian Ma; Shouhong Wang

    2010-07-13T23:59:59.000Z

    The main objective of this article is to study the nature of the Andrews critical point in the gas-liquid transition in a physical-vapor transport (PVT) system. A dynamical model, consistent with the van der Waals equation near the Andrews critical point, is derived. With this model, we deduce two physical parameters, which interact exactly at the Andrews critical point, and which dictate the dynamic transition behavior near the Andrews critical point. In particular, it is shown that 1) the Andrews critical point is a switching point where the phase transition changes from the first order to the third order, 2) the gas-liquid co-existence curve can be extended beyond the Andrews critical point, and 3) the liquid-gas phase transition going beyond Andrews point is of the third order. This clearly explains why it is hard to observe the gas-liquid phase transition beyond the Andrews critical point. Furthermore, the analysis leads naturally the introduction of a general asymmetry principle of fluctuations and the preferred transition mechanism for a thermodynamic system.

  18. Intrinsic Lorentz violation in Doppler effect from a moving point light source

    E-Print Network [OSTI]

    Changbiao Wang

    2012-04-09T23:59:59.000Z

    Einstein's Doppler formula is not applicable when a moving point light source is close enough to the observer; for example, it may break down or cannot specify a determinate value when the point source and the observer overlap. In this paper, Doppler effect for a moving point light source is analyzed, and it is found that the principle of relativity allows the existence of intrinsic Lorentz violation. A conceptual scheme to experimentally test the point-source Doppler effect is proposed, and such a test could lead to an unexpected result that the frequency of a photon may change during propagation, which questions the constancy of Planck constant since the energy conservation in Einstein's light-quantum hypothesis must hold.

  19. Superconductivity, superfluidity and zero-point oscillations

    E-Print Network [OSTI]

    B. V. Vasiliev

    2013-06-29T23:59:59.000Z

    Currently it is thought that in order to explain the phenomenon of superconductivity is necessary to understand the mechanism of formation of electron pairs. However, the paired electrons cannot form a superconducting condensate. They perform disorderly zero-point oscillations and there are no attractive forces in their ensemble. To create a unified ensemble of particles, the pairs must order their zero-point fluctuations so that an attraction between the particles appears. For this reason, the ordering of zero-point oscillations in the electron gas is the cause of superconductivity and the parameters characterizing this order determine the properties of superconductors. The model of condensation of zero-point oscillations creates the possibility to obtain estimates for the critical parameters of elementary superconductors, which are also in the satisfactory agreement with measured data. On the another hand, the phenomenon of superfluidity in He-4 and He-3 can be similarly explained due to the ordering of zero-point fluctuations. Thus it is established that the both related phenomena are based on the same physical mechanism.

  20. Direct observation of Rydberg-Rydberg transitions via CPmmW spectroscopy

    E-Print Network [OSTI]

    Zhou, Yan, Ph. D. Massachusetts Institute of Technology

    2014-01-01T23:59:59.000Z

    Rydberg-Rydberg transitions of BaF molecules have been directly observed in our lab. The key to the experimental success is our ability to combine two powerful and new technologies, Chirped-Pulse millimeter-Wave spectroscopy ...

  1. Device calibration impacts security of quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16T23:59:59.000Z

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  2. An experimental study of a six key handprint chord keyboard

    E-Print Network [OSTI]

    Wolstein, Sheldon Aaron

    1986-01-01T23:59:59.000Z

    er Dr. R. Quinn Brackett Head o Department Dr. Leland T. Blank May 1986 ABSTRACT An Exper1mental Study of a Six Key Handprlnt Chord Keyboard (May 1986) Sheldon Aaron Wolstein, B. S. , Texas ASM University Cha1r of Advisory Committee: Dr... PRACTICE ARTICLE UITA 7Z 7B IUU IUB 1U7 11U 111 LIST OF TABLES Page TABLE I Results of Typing Test: Means and Standard Deviations 25 TABLE 2 Means and Variances for Letter Sequence Times 28 TABLE 3 Analysis of Variance for Letter Sequence...

  3. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  4. Effects of color coding on keying time and errors

    E-Print Network [OSTI]

    Wooldridge, Brenda Gail

    1983-01-01T23:59:59.000Z

    were to determine the effects if any oi' color coding upon the error rate and location time of special func- tion keys on a computer keyboard. An ACT-YA CRT keyboard interfaced with a Kromemco microcomputer was used. There were 84 high schoool... to comnunicate with more and more computer-like devices. The most common computer/human interface is the terminal, consisting of a display screen, and keyboard. The format and layout on the display screen of computer-generated information is generally...

  5. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  6. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  7. DOE Announces More Key Administration Posts | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartmentConsumersDevelopmentDepartmentofKey

  8. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues

  9. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey

  10. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy- FORTechnology Key to

  11. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKey

  12. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,KeyTex

  13. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  14. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA Key

  15. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyA

  16. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAA

  17. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAAA

  18. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  19. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteriesmetal-organic frameworks |A photo ofMay 2015andKEY

  20. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to Preserving

  1. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to PreservingIron

  2. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental AssessmentsGeoffrey Campbell isOklahoma City, USA OklahomaTiratIs Key

  3. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) MappingOctober 12,U.S.U.S. DOEJoanKaye D. Lathrop,KevinKey

  4. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Nobel Laureate's

  5. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  6. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  7. Encryption Key Search using Java-based ALiCE Grid

    E-Print Network [OSTI]

    Virkar, Ameya

    Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

  8. Observing Massive Galaxy Formation

    E-Print Network [OSTI]

    Christopher J. Conselice

    2002-12-20T23:59:59.000Z

    A major goal of contemporary astrophysics is understanding the origin of the most massive galaxies in the universe, particularly nearby ellipticals and spirals. Theoretical models of galaxy formation have existed for many decades, although low and high redshift observations are only beginning to put constraints on different ideas. We briefly describe these observations and how they are revealing the methods by which galaxies form by contrasting and comparing fiducial rapid collapse and hierarchical formation model predictions. The available data show that cluster ellipticals must have rapidly formed at z > 2, and that up to 50% of all massive galaxies at z ~ 2.5 are involved in major mergers. While the former is consistent with the monolithic collapse picture, we argue that hierarchal formation is the only model that can reproduce all the available observations.

  9. Symmetry and Dirac points in graphene spectrum

    E-Print Network [OSTI]

    Gregory Berkolaiko; Andrew Comech

    2014-12-28T23:59:59.000Z

    Existence and stability of Dirac points in the dispersion relation of operators periodic with respect to the hexagonal lattice is investigated for different sets of additional symmetries. The following symmetries are considered: rotation by $2\\pi/3$ and inversion, rotation by $2\\pi/3$ and horizontal reflection, inversion or reflection with weakly broken rotation symmetry, and the case where no Dirac points arise: rotation by $2\\pi/3$ and vertical reflection. All proofs are based on symmetry considerations and are elementary in nature. In particular, existence of degeneracies in the spectrum is proved by a transplantation argument (which is deduced from the (co)representation of the relevant symmetry group). The conical shape of the dispersion relation is obtained from its invariance under rotation by $2\\pi/3$. Persistence of conical points when the rotation symmetry is weakly broken is proved using a geometric phase in one case and parity of the eigenfunctions in the other.

  10. Symmetry and Dirac points in graphene spectrum

    E-Print Network [OSTI]

    Gregory Berkolaiko; Andrew Comech

    2015-04-23T23:59:59.000Z

    Existence and stability of Dirac points in the dispersion relation of operators periodic with respect to the hexagonal lattice is investigated for different sets of additional symmetries. The following symmetries are considered: rotation by $2\\pi/3$ and inversion, rotation by $2\\pi/3$ and horizontal reflection, inversion or reflection with weakly broken rotation symmetry, and the case where no Dirac points arise: rotation by $2\\pi/3$ and vertical reflection. All proofs are based on symmetry considerations and are elementary in nature. In particular, existence of degeneracies in the spectrum is proved by a transplantation argument (which is deduced from the (co)representation of the relevant symmetry group). The conical shape of the dispersion relation is obtained from its invariance under rotation by $2\\pi/3$. Persistence of conical points when the rotation symmetry is weakly broken is proved using a geometric phase in one case and parity of the eigenfunctions in the other.

  11. Phase-shifting point diffraction interferometer

    DOE Patents [OSTI]

    Medecki, Hector (Berkeley, CA)

    1998-01-01T23:59:59.000Z

    Disclosed is a point diffraction interferometer for evaluating the quality of a test optic. In operation, the point diffraction interferometer includes a source of radiation, the test optic, a beam divider, a reference wave pinhole located at an image plane downstream from the test optic, and a detector for detecting an interference pattern produced between a reference wave emitted by the pinhole and a test wave emitted from the test optic. The beam divider produces separate reference and test beams which focus at different laterally separated positions on the image plane. The reference wave pinhole is placed at a region of high intensity (e.g., the focal point) for the reference beam. This allows reference wave to be produced at a relatively high intensity. Also, the beam divider may include elements for phase shifting one or both of the reference and test beams.

  12. Phase-shifting point diffraction interferometer

    DOE Patents [OSTI]

    Medecki, H.

    1998-11-10T23:59:59.000Z

    Disclosed is a point diffraction interferometer for evaluating the quality of a test optic. In operation, the point diffraction interferometer includes a source of radiation, the test optic, a beam divider, a reference wave pinhole located at an image plane downstream from the test optic, and a detector for detecting an interference pattern produced between a reference wave emitted by the pinhole and a test wave emitted from the test optic. The beam divider produces separate reference and test beams which focus at different laterally separated positions on the image plane. The reference wave pinhole is placed at a region of high intensity (e.g., the focal point) for the reference beam. This allows reference wave to be produced at a relatively high intensity. Also, the beam divider may include elements for phase shifting one or both of the reference and test beams. 8 figs.

  13. Attraction towards an inflection point inflation

    SciTech Connect (OSTI)

    Allahverdi, Rouzbeh [Department of Physics and Astronomy, University of New Mexico, Albuquerque, New Mexico 87131 (United States); Dutta, Bhaskar [Department of Physics, Texas A and M University, College Station, Texas 77843-4242 (United States); Mazumdar, Anupam [Physics Department, Lancaster University, Lancaster, LA1 4YB (United Kingdom); Niels Bohr Institute, Blegdamsvej-17, Copenhagen-2100 (Denmark)

    2008-09-15T23:59:59.000Z

    Many models of high-energy physics possess metastable vacua. It is conceivable that the Universe can get trapped in such a false vacuum, irrespective of its origin and prior history, at an earlier stage during its evolution. The ensuing false vacuum inflation results in a cold and empty universe and has a generic graceful exit problem. We show that an inflection point inflation along the flat directions of the minimal supersymmetric standard model (MSSM) can resolve this graceful exit problem by inflating the bubble, which nucleates out of a false vacuum. The important point is that the initial condition for an MSSM inflation can be naturally realized, due to an attractor behavior toward the inflection point. We investigate these issues in detail and also present an example where metastable vacua, hence the false vacuum inflation, can happen within the MSSM.

  14. Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices

    SciTech Connect (OSTI)

    Sharon Kramer; Mirko Previsic; Peter Nelson; Sheri Woo

    2010-06-17T23:59:59.000Z

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: ? 4 wave energy generation technologies ? 3 tidal energy generation technologies ? 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal) ? 3 project sizes: pilot, small commercial, and large commercial The possible combinations total 24 wave technology scenarios and 9 tidal technology scenarios. We evaluated 3 of the 33 scenarios in detail: 1. A small commercial OPT Power Buoy project off the Humboldt County, California coast 2. A small commercial Pelamis Wave Power P-2 project off Makapu’u Point, Oahu, Hawaii 3. A pilot MCT SeaGen tidal project, sited in the Tacoma Narrows, Washington This framework document used information available from permitting documents that were written to support actual wave or tidal energy projects, but the results obtained here should not be confused with those of the permitting documents1. The main difference between this framework document and permitting documents of currently proposed pilot projects is that this framework identifies key environmental concerns and describes the next steps in addressing those concerns; permitting documents must identify effects, find or declare thresholds of significance, evaluate the effects against the thresholds, and find mitigation measures that will minimize or avoid the effects so they can be considered less-than-significant. Two methodologies, 1) an environmental effects analysis and 2) Raptools, were developed and tested to identify potential environmental effects associated with wave or tidal energy conversion projects. For the environmental effects analysis, we developed a framework based on standard risk assessment techniques. The framework was applied to the three scenarios listed above. The environmental effects analysis addressed questions such as: ? What is the temporal and spatial exposure of a species at a site? ? What are the specific potential project effects on that species? ? What measures could minimize, mitigate, or eliminate negative effects? ? Are there potential effects of the project, or species’ response to the effect, that are highly uncertain and warrant additional study? The second methodology, Raptools, is a collaborative approach useful for evaluating multiple characteristi

  15. $?$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Jameel-Un Nabi; Irgaziev Bakhadir

    2011-08-04T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model results. This study can prove useful for the core-collapse simulators.

  16. Non-lead hollow point bullet

    DOE Patents [OSTI]

    Vaughn, Norman L. (Knoxville, TN); Lowden, Richard A. (Clinton, TN)

    2003-04-15T23:59:59.000Z

    The non-lead hollow point bullet of the instant invention comprises a mixed construction slug further comprising, a monolithic metal insert having a tapered (preferred conical) hollow point tip and a tapered (preferred conical) tail protrusion, and an unsintered powdered metal composite core in tandem alignment with the insert. The core has a hollow tapered (preferred conical) cavity tip portion coupled with the tapered (preferred conical) tail protrusion on the insert. An open tip jacket envelops at least a portion of the insert and the core. The jacket is swaged at the open tip.

  17. QCD Critical Point: The Race is On

    E-Print Network [OSTI]

    Rajiv V. Gavai

    2014-04-26T23:59:59.000Z

    A critical point in the phase diagram of Quantum Chromodynamics (QCD), if established either theoretically or experimentally, would be as profound a discovery as the good-old gas-liquid critical point. Unlike the latter, however, first-principles based approaches are being employed to locate it theoretically. Due to the short lived nature of the concerned phases, novel experimental techniques are needed to search for it. The Relativistic Heavy Ion Collider (RHIC) in USA has an experimental program to do so. This short review is an attempt to provide a glimpse of the race between the theorists and the experimentalists as well as that of the synergy between them.

  18. LIDAR, Point Clouds, and their Archaeological Applications

    SciTech Connect (OSTI)

    White, Devin A [ORNL

    2013-01-01T23:59:59.000Z

    It is common in contemporary archaeological literature, in papers at archaeological conferences, and in grant proposals to see heritage professionals use the term LIDAR to refer to high spatial resolution digital elevation models and the technology used to produce them. The goal of this chapter is to break that association and introduce archaeologists to the world of point clouds, in which LIDAR is only one member of a larger family of techniques to obtain, visualize, and analyze three-dimensional measurements of archaeological features. After describing how point clouds are constructed, there is a brief discussion on the currently available software and analytical techniques designed to make sense of them.

  19. p-points in iterated forcing extensions

    E-Print Network [OSTI]

    Roitman, Judith A.

    1978-05-03T23:59:59.000Z

    Ma. By Fact 4, U apoints which are not selective. We show Theorem 2. Nonselective p-points exist in direct iterated ccc extensions whose length has uncountable cofinality. These theorems are proved in §3. In §4 we indicate how...

  20. Academic Writing Observation Papers

    E-Print Network [OSTI]

    a particular action and did not notice something about the people involved. Note what you did not notice observations. People: If the setting is crowded, choose a particular group (or groups) or focus on random paper around a research question: For example, you may be interested in power relations, interactions

  1. Academic Writing Observation Papers

    E-Print Network [OSTI]

    a particular action and did not notice something about the people involved. Note what you did not notice observations. People: If the setting is crowded, choose a particular group (or groups) or focus on random in power relations, interactions between interpersonal communication processes and other media, or other

  2. Global Warming Observations

    E-Print Network [OSTI]

    Schofield, Jeremy

    Global Warming Observations: 1. Global temperature has been gradually rising in recent years #15 in range 8000 12000 nm { CFC's, methane and N 2 O important for global warming even though concentra- tions in concentration of \\greenhouse gases" like CO 2 What determines global temperature? Energy budget of earth: 1

  3. The HST Key Project on the Extragalactic Distance Scale XVII. The Cepheid Distance to NGC 4725

    E-Print Network [OSTI]

    Brad K. Gibson; Shaun M. G. Hughes; Peter B. Stetson; Wendy L. Freedman; Robert C. Kennicutt, Jr.; Jeremy R. Mould; Fabio Bresolin; Laura Ferrarese; Holland C. Ford; John A. Graham; Mingsheng Han; Paul Harding; John G. Hoessel; John P. Huchra; Garth D. Illingworth; Daniel D. Kelson; Lucas M. Macri; Barry F. Madore; Randy L. Phelps; Charles F. Prosser; Abhijit Saha; Shoko Sakai; Kim M. Sebo; Nancy A. Silbermann; Anne M. Turner

    1998-10-01T23:59:59.000Z

    The distance to NGC 4725 has been derived from Cepheid variables, as part of the Hubble Space Telescope Key Project on the Extragalactic Distance Scale. Thirteen F555W (V) and four F814W (I) epochs of cosmic-ray-split Wide Field and Planetary Camera 2 observations were obtained. Twenty Cepheids were discovered, with periods ranging from 12 to 49 days. Adopting a Large Magellanic Cloud distance modulus and extinction of 18.50+/-0.10 mag and E(V-I)=0.13 mag, respectively, a true reddening-corrected distance modulus (based on an analysis employing the ALLFRAME software package) of 30.50 +/- 0.16 (random) +/- 0.17 (systematic) mag was determined for NGC 4725. The corresponding of distance of 12.6 +/- 1.0 (random) +/- 1.0 (systematic) Mpc is in excellent agreement with that found with an independent analysis based upon the DoPHOT photometry package. With a foreground reddening of only E(V-I)=0.02, the inferred intrinsic reddening of this field in NGC 4725, E(V-I)=0.19, makes it one of the most highly-reddened, encountered by the HST Key Project, to date.

  4. Surveying points in the complex projective plane

    E-Print Network [OSTI]

    Lane Hughston; Simon Salamon

    2014-10-21T23:59:59.000Z

    We classify SIC-POVMs of rank one in CP^2, or equivalently sets of nine equally-spaced points in CP^2, without the assumption of group covariance. If two points are fixed, the remaining seven must lie on a pinched torus that a standard moment mapping projects to a circle in R^3. We use this approach to prove that any SIC set in CP^2 is isometric to a known solution, given by nine points lying in triples on the equators of the three 2-spheres each defined by the vanishing of one homogeneous coordinate. We set up a system of equations to describe hexagons in CP^2 with the property that any two vertices are related by a cross ratio (transition probability) of 1/4. We then symmetrize the equations, factor out by the known solutions, and compute a Groebner basis to show that no SIC sets remain. We do find new configurations of nine points in which 27 of the 36 pairs of vertices of the configuration are equally spaced.

  5. Point transformations in invariant difference schemes

    E-Print Network [OSTI]

    Francis Valiquette

    2005-07-17T23:59:59.000Z

    In this paper, we show that when two systems of differential equations admitting a symmetry group are related by a point transformation it is always possible to generate invariant schemes, one for each system, that are also related by the same transformation. This result is used to easily obtain new invariant schemes of some differential equations.

  6. LATTICE POINT GENERATING FUNCTIONS AND SYMMETRIC CONES

    E-Print Network [OSTI]

    Savage, Carla D.

    LATTICE POINT GENERATING FUNCTIONS AND SYMMETRIC CONES MATTHIAS BECK, THOMAS BLIEM, BENJAMIN BRAUN Sn . Specifically, [3] discusses various approaches to compute, for a fixed set of parame- ters a1, a representation of Sn, a = (a1, . . . , an), and ( , ) is the standard inner product on Rn . This viewpoint

  7. Hints of Universality from Inflection Point Inflation 

    E-Print Network [OSTI]

    Downes, Sean Donovan

    2013-07-25T23:59:59.000Z

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 II.2.1 Old Inflation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 II.2.2 Chaotic Inflation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 II.2.3 Inflection Point Inflation... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 III.3.1 Scales of SUSY Breaking and Inflation . . . . . . . . . . . . . . . . . . . . . . . 22 III.3.2 A Simple Realization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 III.4 What We Talk About When We Talk About...

  8. Language Production General Points about Speech Production

    E-Print Network [OSTI]

    Coulson, Seana

    Language Production #12;General Points about Speech Production 15 speech sounds per second => 2, shall I say `t' or `d'' (Levelt) Production side has gotten less attention in Psycholinguistics than the comprehension side. Evidence for speech production behaviour has until recently relied heavily on speech errors

  9. Automorphisms mapping a point into a subvariety

    E-Print Network [OSTI]

    Poonen, Bjorn

    The problem of deciding, given a complex variety X, a point x \\in X, and a subvariety Z \\subseteq X, whether there is an automorphism of X mapping x into Z is proved undecidable. Along the way, we prove the undecidability ...

  10. SharePoint 2007 For Site Owners

    E-Print Network [OSTI]

    Siddharthan, Advaith

    -sites ...........................................................................................7 3.2 Create new items, e.g. a list, library, discussion board, survey or web page ............8 4Point, we have created a standard template for all projects ­ the Team Site. This collaborative environment (Announcements) Resources List If the standard Team Site template doesn't meet all your requirements, we can

  11. Effective dynamics of a classical point charge

    SciTech Connect (OSTI)

    Polonyi, Janos, E-mail: polonyi@iphc.cnrs.fr

    2014-03-15T23:59:59.000Z

    The effective Lagrangian of a point charge is derived by eliminating the electromagnetic field within the framework of the classical closed time path formalism. The short distance singularity of the electromagnetic field is regulated by an UV cutoff. The Abraham–Lorentz force is recovered and its similarity to quantum anomalies is underlined. The full cutoff-dependent linearized equation of motion is obtained, no runaway trajectories are found but the effective dynamics shows acausality if the cutoff is beyond the classical charge radius. The strength of the radiation reaction force displays a pole in its cutoff-dependence in a manner reminiscent of the Landau-pole of perturbative QED. Similarity between the dynamical breakdown of the time reversal invariance and dynamical symmetry breaking is pointed out. -- Highlights: •Extension of the classical action principle for dissipative systems. •New derivation of the Abraham–Lorentz force for a point charge. •Absence of a runaway solution of the Abraham–Lorentz force. •Acausality in classical electrodynamics. •Renormalization of classical electrodynamics of point charges.

  12. CHANGE-POINT METHODS Douglas M. Hawkins

    E-Print Network [OSTI]

    Qiu, Peihua

    been proposed as tools for following up signals given by other charting methods, when their likelihood: Change-point, LRT, GLR, Phase I, Phase II, SPC. 1 #12;1 INTRODUCTION Statistical process control methods will assume is unknown. If both 0 and 1 are known, then the SPC diagnostic of choice is generally

  13. Optimal External Memory Planar Point Enclosure

    E-Print Network [OSTI]

    Yi, Ke "Kevin"

    /O-efficiently. This problem has important applications in e.g. spatial and temporal databases, and is dual to the important in temporal databases; for example, if we have a database where each object is associated with a time span corresponds to a point enclosure query. Also, in spatial databases, irregular planar objects are often

  14. Hints of Universality from Inflection Point Inflation

    E-Print Network [OSTI]

    Downes, Sean Donovan

    2013-07-25T23:59:59.000Z

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 II.2.1 Old Inflation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 II.2.2 Chaotic Inflation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 II.2.3 Inflection Point Inflation... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 III.3.1 Scales of SUSY Breaking and Inflation . . . . . . . . . . . . . . . . . . . . . . . 22 III.3.2 A Simple Realization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 III.4 What We Talk About When We Talk About...

  15. ON LYAPUNOV FAMILIES AROUND COLLINEAR LIBRATION POINTS

    SciTech Connect (OSTI)

    Hou, X. Y.; Liu, L. [Astronomy Department, Nanjing University, Nanjing 210093 (China)], E-mail: lliu@nju.edu.cn

    2009-06-15T23:59:59.000Z

    Evolution details of the planar and vertical Lyapunov families around the three collinear libration points in the restricted three-body problem were studied. Researches before were generally restricted to be within the colliding orbits with the primaries and for fixed mass parameters {mu}. In this paper, members after colliding orbits were computed. With increasing {mu}, how these families evolve was studied.

  16. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  17. Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key-distribution protocols with a heralded single-photon source

    SciTech Connect (OSTI)

    Zhang Shengli [Key Laboratory of Quantum Information, University of Science and Technology of China (CAS), Hefei 230026 (China); Electronic Technology Institute, Information Engineering University, Zhengzhou, Henan 450004 (China); Zou Xubo; Li Ke; Guo Guangcan [Key Laboratory of Quantum Information, University of Science and Technology of China (CAS), Hefei 230026 (China); Jin Chenhui [Electronic Technology Institute, Information Engineering University, Zhengzhou, Henan 450004 (China)

    2007-10-15T23:59:59.000Z

    For the Bennett-Brassard 1984 (BB84) quantum key distribution, longer distance and higher key generating rate is shown with a heralded single-photon source (HSPS) [Phys. Rev. A. 73, 032331 (2006)]. In this paper, the performance of the Scarani-Acin-Ribordy-Gisim (SARG) protocol utilizing the HSPS sources is considered and the numerical simulation turns out that still a significant improvement in secret key generating rate can also be observed. It is shown that the security distance for HSPS+SARG is 120 km. However, compared with the HSPS+BB84 protocols, the HSPS+SARG protocol has a lower secret key rate and a shorter distance. Thus we show the HSPS+BB84 implementation is a preferable protocol for long distance transmittance.

  18. Updated On: 6/9/2014 16:21 Teams: Safe Sets points The Smuttynoses points

    E-Print Network [OSTI]

    Sridhar, Srinivas

    Kathryn Tomase 0 Alex Chao 0 Dan Reilly 0 Monica Eguia 0 Elizabeth Sczerzenie 0 James Kim 0 Conor Baker 0 Michael Palmeri 0 Patrick Mardula 0 Elizabeth Butler 0 James Ferrara 0 Molly Baum 0 Kate points Barkada Open points Rebecca Hansen - C 0 James Martin Tan - C 0 Shannon Coveney 0 Noel Llado

  19. Open MPI's TEG Point-to-Point Communications Methodology: Comparison to Existing Implementations

    E-Print Network [OSTI]

    Lumsdaine, Andrew

    Open MPI's TEG Point-to-Point Communications Methodology: Comparison to Existing Implementations T Indiana University {jsquyres, vsahay, pkambadu, brbarret, lums}@osl.iu.edu Abstract. TEG is a new-named "TEG"[9]) that provides high-performance, fault tolerant message passing. A full description

  20. Codes Over Non-Abelian Groups: Point-to-Point Communications and Computation Over MAC

    E-Print Network [OSTI]

    Pradhan, Sandeep

    Codes Over Non-Abelian Groups: Point-to-Point Communications and Computation Over MAC Aria G. We also show that for the problem of computation over MAC, these codes are superior to random codes channel. In [1], the capacity of group codes for certain classes of channels has been computed. Further

  1. Energy Efficiency Analysis of Link Layer Backoff Schemes on Point-to-Point

    E-Print Network [OSTI]

    Chockalingam, A.

    416 Energy Efficiency Analysis of Link Layer Backoff Schemes on Point-to-Point Markov Fading Links schemes are shown to achieve better energy ef- ficiency without compromising much on the link layer throughput performance. Keywords - Backoff algorithms, fading channels, en- ergy eficiency. 1 Introduction

  2. Is the zero-point energy a source of the cosmological constant?

    E-Print Network [OSTI]

    Yasunori Fujii

    2014-03-15T23:59:59.000Z

    We discuss how we remove a huge discrepancy between the theory of a cosmological constant, due to the zero-point energies of matter fields, and the observation. The technique of dimensional regularization plays a decisive role. We eventually reach the desired behavior of the vacuum densities falling off like t^{-2}, allowing us to understand how an extremely small result comes about naturally. As a price, however, the zero-point energy vacuum fails to act as a true cosmological constant. Its expected role responsible for the observed accelerating universe is then to be inherited by the gravitational scalar field, dark energy, as we suggest in the scalar-tensor theory.

  3. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19T23:59:59.000Z

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  4. Observational Mishaps - a Database

    E-Print Network [OSTI]

    Kaspar von Braun; Kristin Chiboucas; Denise Hurley-Keller

    1999-06-11T23:59:59.000Z

    We present a World-Wide-Web-accessible database of astronomical images which suffer from a variety of observational problems, ranging from common occurences, such as dust grains on filters and/or the dewar window, to more exotic phenomena, such as loss of primary mirror support due to the deflation of the support airbags. Apart from its educational usefulness, the purpose of this database is to assist astronomers in diagnosing and treating errant images at the telescope, thus saving valuable telescope time. Every observational mishap contained in this on-line catalog is presented in the form of a GIF image, a brief explanation of the problem, and, when possible, a suggestion for improving the image quality.

  5. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  6. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  7. Vapor pressure and boiling point elevation of slash pine black liquors: Predictive models with statistical approach

    SciTech Connect (OSTI)

    Zaman, A.A.; McNally, T.W.; Fricke, A.L. [Univ. of Florida, Gainesville, FL (United States)] [Univ. of Florida, Gainesville, FL (United States)

    1998-01-01T23:59:59.000Z

    Vapor-liquid equilibria and boiling point elevation of slash pine kraft black liquors over a wide range of solid concentrations (up to 85% solids) has been studied. The liquors are from a statistically designed pulping experiment for pulping slash pine in a pilot scale digester with four cooking variables of effective alkali, sulfidity, cooking time, and cooking temperature. It was found that boiling point elevation of black liquors is pressure dependent, and this dependency is more significant at higher solids concentrations. The boiling point elevation data at different solids contents (at a fixed pressure) were correlated to the dissolved solids (S/(1 {minus} S)) in black liquor. Due to the solubility limit of some of the salts in black liquor, a change in the slope of the boiling point elevation as a function of the dissolved solids was observed at a concentration of around 65% solids. An empirical method was developed to describe the boiling point elevation of each liquor as a function of pressure and solids mass fraction. The boiling point elevation of slash pine black liquors was correlated quantitatively to the pulping variables, using different statistical procedures. These predictive models can be applied to determine the boiling point rise (and boiling point) of slash pine black liquors at processing conditions from the knowledge of pulping variables. The results are presented, and their utility is discussed.

  8. Redeveloping or preserving public housing : the future of Columbia Point

    E-Print Network [OSTI]

    Lee, Sharon Hsueh-Jen

    1981-01-01T23:59:59.000Z

    Columbia Point, Boston's largest and most stigmatized public housing project, has been a focal point for public and private. investment strategies to create a new mixed-income residential community. Columbia Point provided ...

  9. The Copper Creek Clovis Point from Hells Canyon, Northeastern Oregon

    E-Print Network [OSTI]

    Reid, Kenneth C.; Root, Matthew J.; Hughes, Richard E.

    2008-01-01T23:59:59.000Z

    2008) | pp. 75-84 The Copper Creek Clovis Point from HellsSnake River to the Copper Creek point discovery location.5 cm Figure 4. The Copper Creek Clovis point (tick marks

  10. From Point to Pixel: A Genealogy of Digital Aesthetics

    E-Print Network [OSTI]

    Hoy, Meredith Anne

    2010-01-01T23:59:59.000Z

    From Point to Pixel: A Genealogy of Digital Aesthetics byFrom Point to Pixel: A Genealogy of Digital Aesthetics byFrom Point to Pixel: A Genealogy of Digital Aesthetics, I

  11. Sequential conditions for fixed and periodic points

    E-Print Network [OSTI]

    Peters, Burnis Charles

    1970-01-01T23:59:59.000Z

    points is Bausch's Contraction Ma~in Theorem: Let (X, d) be a complete metric space and f a selfmap of X satisfying: (Sl) there exists c in [0, 1) such that d(f(x), f(y)) & c d(x, y) for all x, y in X. Then there exists a unique fixed point u in X... of Edelstein [2] and [3] and Bailey [1]. CHAPTEE I T410 LEMMAS I'he following two lemmas are essential to most of the theorems in the following section. Lemma 1: Let f be a selfmap of (X, d) and (f I} a subsequence n ~ of (f ). If lim f i(x) = u and lim f...

  12. Remote temperature-set-point controller

    DOE Patents [OSTI]

    Burke, W.F.; Winiecki, A.L.

    1984-10-17T23:59:59.000Z

    An instrument is described for carrying out mechanical strain tests on metallic samples with the addition of means for varying the temperature with strain. The instrument includes opposing arms and associated equipment for holding a sample and varying the mechanical strain on the sample through a plurality of cycles of increasing and decreasing strain within predetermined limits, circuitry for producing an output signal representative of the strain during the tests, apparatus including a a set point and a coil about the sample for providing a controlled temperature in the sample, and circuitry interconnected between the strain output signal and set point for varying the temperature of the sample linearly with strain during the tests.

  13. ARM Observations Projected

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP Update Information on new, existing, andObservations Projected

  14. Observations of Edge Turbulence

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for RenewableSpeeding accessSpeeding access(SC)Gas and OilPhaseObservation ofEdge

  15. Bonus Point Exercise 3 Alessandro Abate

    E-Print Network [OSTI]

    Abate, Alessandro

    sc4026 Bonus Point Exercise 3 Alessandro Abate a.abate@tudelft.nl Solomon Zegeye s.k.zegeye@tudelft.nl Delft Center for Systems and Control, TU Delft October 1, 2009 ­ Ac.Yr. 2009/10, 1e Sem. Q1 ­ Bonus. Compute ^x1(t), for t . ­ Ac.Yr. 2009/10, 1e Sem. Q1 ­ Bonus Exercise Session 3 ­ sc4026 1 #12;

  16. Holographic Point-of-Care Diagnostic Devices

    E-Print Network [OSTI]

    Yetisen, Ali Kemal

    2014-11-29T23:59:59.000Z

    and characterisation of nanoparticle-based tuneable photonic crystal sensors. RSC Adv 4 (21):10454–10461 7. Yetisen AK, Akram MS, Lowe CR (2013) Paper-based microfluidic point-of- care diagnostic devices. Lab Chip 13 (12):2210–2251 Supervisor’s Foreword As the world... 7.3 Multiplexing Holographic Sensors with Microfluidic Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 7.4 Readouts with Smartphones and Wearable Devices . . . . . . . . . 156 7.5 The Vision for Holographic...

  17. Low-melting point heat transfer fluid

    DOE Patents [OSTI]

    Cordaro, Joseph Gabriel (Oakland, CA); Bradshaw, Robert W. (Livermore, CA)

    2010-11-09T23:59:59.000Z

    A low-melting point, heat transfer fluid made of a mixture of five inorganic salts including about 29.1-33.5 mol % LiNO.sub.3, 0-3.9 mol % NaNO.sub.3, 2.4-8.2 mol % KNO.sub.3, 18.6-19.9 mol % NaNO.sub.2, and 40-45.6 mol % KNO.sub.2. These compositions can have liquidus temperatures below 80.degree. C. for some compositions.

  18. Radium issues at Hunters Point Annex

    SciTech Connect (OSTI)

    Dean, S.M.

    1994-12-31T23:59:59.000Z

    Radium was a common source of illumination used in numerous instruments and gauges for military equipment prior to 1970. As a result of its many military applications radium 226 is now a principle radionuclide of concern at military base closures sites throughout the United States. This is an overview of the site characterization strategy employed and a potential site remediation technology being considered at a radium contaminated landfill at Hunters Point Annex, a former U.S. Navy shipyard in San Francisco, California.

  19. 2000 2006 City Percentage Point Change

    E-Print Network [OSTI]

    Baskaran, Mark

    .2 5.6 -1.4 -2.7 Monroe 3.2 6.5 3.3 3.2 6.5 - -0.4 Mt. Pleasant 3.5 5.4 1.9 2.9 6.3 -0.9 -1.5 Portage 2 Marquette Midland Monroe Mt. Pleasant Portage Average State Percentage Point Difference Unemployment Rates

  20. High speed point derivative microseismic detector

    DOE Patents [OSTI]

    Uhl, James Eugene (Albuquerque, NM); Warpinski, Norman Raymond (Albuquerque, NM); Whetten, Ernest Blayne (Albuquerque, NM)

    1998-01-01T23:59:59.000Z

    A high speed microseismic event detector constructed in accordance with the present invention uses a point derivative comb to quickly and accurately detect microseismic events. Compressional and shear waves impinging upon microseismic receiver stations disposed to collect waves are converted into digital data and analyzed using a point derivative comb including assurance of quiet periods prior to declaration of microseismic events. If a sufficient number of quiet periods have passed, the square of a two point derivative of the incoming digital signal is compared to a trip level threshold exceeding the determined noise level to declare a valid trial event. The squaring of the derivative emphasizes the differences between noise and signal, and the valid event is preferably declared when the trip threshold has been exceeded over a temporal comb width to realize a comb over a given time period. Once a trial event has been declared, the event is verified through a spatial comb, which applies the temporal event comb to additional stations. The detector according to the present invention quickly and accurately detects initial compressional waves indicative of a microseismic event which typically exceed the ambient cultural noise level by a small amount, and distinguishes the waves from subsequent larger amplitude shear waves.

  1. High speed point derivative microseismic detector

    DOE Patents [OSTI]

    Uhl, J.E.; Warpinski, N.R.; Whetten, E.B.

    1998-06-30T23:59:59.000Z

    A high speed microseismic event detector constructed in accordance with the present invention uses a point derivative comb to quickly and accurately detect microseismic events. Compressional and shear waves impinging upon microseismic receiver stations disposed to collect waves are converted into digital data and analyzed using a point derivative comb including assurance of quiet periods prior to declaration of microseismic events. If a sufficient number of quiet periods have passed, the square of a two point derivative of the incoming digital signal is compared to a trip level threshold exceeding the determined noise level to declare a valid trial event. The squaring of the derivative emphasizes the differences between noise and signal, and the valid event is preferably declared when the trip threshold has been exceeded over a temporal comb width to realize a comb over a given time period. Once a trial event has been declared, the event is verified through a spatial comb, which applies the temporal event comb to additional stations. The detector according to the present invention quickly and accurately detects initial compressional waves indicative of a microseismic event which typically exceed the ambient cultural noise level by a small amount, and distinguishes the waves from subsequent larger amplitude shear waves. 9 figs.

  2. Microsoft PowerPoint - IGCA Training 2011-OPAM | Department of...

    Office of Environmental Management (EM)

    - IGCA Training 2011-OPAM Microsoft PowerPoint - IGCA Training 2011-OPAM IGCA Inventory Data Collection Tool Training 2011 Microsoft PowerPoint - IGCA Training 2011-OPAM...

  3. adjacent point sources: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extraction capabilities of MOPEX. Point source extraction is implemented as a two step process: point source detection and profile fitting. Non-linear matched filtering of input...

  4. Parallel Implementation of Gamma-Point Pseudopotential Plane...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Parallel Implementation of Gamma-Point Pseudopotential Plane-Wave DFT with Exact Exchange. Parallel Implementation of Gamma-Point Pseudopotential Plane-Wave DFT with Exact...

  5. Role of Point Defects on the Reactivity of Reconstructed Anatase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Point Defects on the Reactivity of Reconstructed Anatase Titanium Dioxide (001) Surface. Role of Point Defects on the Reactivity of Reconstructed Anatase Titanium Dioxide (001)...

  6. Observing the Inflationary Reheating

    E-Print Network [OSTI]

    Jerome Martin; Christophe Ringeval; Vincent Vennin

    2014-10-29T23:59:59.000Z

    Reheating is the the epoch which connects inflation to the subsequent hot Big-Bang phase. Conceptually very important, this era is however observationally poorly known. We show that the current Planck satellite measurements of the Cosmic Microwave Background (CMB) anisotropies constrain the kinematic properties of the reheating era for most of the inflationary models. This result is obtained by deriving the marginalized posterior distributions of the reheating parameter for about 200 models taken in Encyclopaedia Inflationaris. Weighted by the statistical evidence of each model to explain the data, we show that the Planck 2013 measurements induce an average reduction of the posterior-to-prior volume by 40%. Making some additional assumptions on reheating, such as specifying a mean equation of state parameter, or focusing the analysis on peculiar scenarios, can enhance or reduce this constraint. Our study also indicates that the Bayesian evidence of a model can substantially be affected by the reheating properties. The precision of the current CMB data is therefore such that estimating the observational performance of a model now requires to incorporate information about its reheating history.

  7. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  8. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  9. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    at zero and increase to $47 per ton of CO2 emissions by 2030. Higher electricity prices reduce demandSixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions Summary of Key................................................................ 10 Wholesale Electricity Prices

  10. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  11. Direct and Reverse Secret-Key Capacities of a Quantum Channel

    E-Print Network [OSTI]

    Braunstein, Samuel L.

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

  12. Updated On: 11/5/2012 16:40 Teams: Broomsday points Blood Sweat & Beers points

    E-Print Network [OSTI]

    Sridhar, Srinivas

    - C -*Ineligible* 0 Dean Porcello - C 0 Ben Hohlfelder - *Ineligible* 0 Garrett Gustafson 0 Max Brown Broom Broo points David O'Sullivan - C 0 Beatrice van den Heuvel - C 0 Zack Shaw 0 Corey Balint 0 Nick

  13. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01T23:59:59.000Z

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  14. Lattice calculation of point-to-point Hadron current correlation functions in the QCD vacuum

    SciTech Connect (OSTI)

    Chu, M.; Grandy, J.M.; Huang, S.; Negele, J.W. (Kellogg Laboratory, California Institute of Technology, 106-38, Pasadena, California 91125 (United States) Center for Theoretical Physics, Laboratory for Nuclear Science and Department of Physics, Massachusetts Institute of Technology, Cambride, Massachusetts 02139 (United States) Department of Physics, FM-15, University of Washington, Seattle, Washington 98195 (United States))

    1993-01-18T23:59:59.000Z

    Point-to-point correlation functions of hadron currents in the QCD vacuum are calculated on a lattice and analyzed using dispersion relations, providing physical information down to small spatial separations. Qualitative agreement with phenomenological results is obtained in channels for which experimental data are available, and these correlation functions are shown to be useful in exploring approximations based on sum rules and interacting instantons.

  15. Critical Points of the Electric Field from a Collection of Point Charges

    SciTech Connect (OSTI)

    Max, N; Weinkauf, T

    2007-02-16T23:59:59.000Z

    The electric field around a molecule is generated by the charge distribution of its constituents: positively charged atomic nuclei, which are well approximated by point charges, and negatively charged electrons, whose probability density distribution can be computed from quantum mechanics. For the purposes of molecular mechanics or dynamics, the charge distribution is often approximated by a collection of point charges, with either a single partial charge at each atomic nucleus position, representing both the nucleus and the electrons near it, or as several different point charges per atom. The critical points in the electric field are useful in visualizing its geometrical and topological structure, and can help in understanding the forces and motion it induces on a charged ion or neutral dipole. Most visualization tools for vector fields use only samples of the field on the vertices of a regular grid, and some sort of interpolation, for example, trilinear, on the grid cells. There is less risk of missing or misinterpreting topological features if they can be derived directly from the analytic formula for the field, rather than from its samples. This work presents a method which is guaranteed to find all the critical points of the electric field from a finite set of point charges. To visualize the field topology, we have modified the saddle connector method to use the analytic formula for the field.

  16. Origin of a complex key innovation in an obligate insectplant mutualism

    E-Print Network [OSTI]

    Krenn, Harald W.

    Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

  17. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-Print Network [OSTI]

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  18. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  19. Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser

    E-Print Network [OSTI]

    Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

  20. On the security of some password-based key agreement schemes

    E-Print Network [OSTI]

    on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19

  1. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  2. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770­2 [7] is vulnerable to a replay attack and also

  3. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks

    E-Print Network [OSTI]

    Hu, Jiankun

    A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Kejie propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous, the wireless sensor network can achieve higher key connectivity and higher resilience. I. INTRODUCTION Wireless

  4. Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates

    E-Print Network [OSTI]

    Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat the environmental correlates exert of the realized fitness of a species (Johnson and O'Neil 2001). They include

  5. Evaluation of the effects of a highway improvement project on Key deer

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30T23:59:59.000Z

    assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

  6. A Remark on Secret-Key Generation over Correlated Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    A Remark on Secret-Key Generation over Correlated Fading Channels Ashish Khisti ECE Dept. Univ@ee.ucla.edu Abstract-- We study secret-key agreement with public discussion over a flat-fading wiretap channel model. INTRODUCTION In recent years there has been a significant interest in developing secret-key agreement protocols

  7. Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion Ashish Khisti Member, IEEE Abstract Fundamental limits of secret-key generation over a two-way, reciprocal and block establish upper and lower bounds on the secret-key generation capacity with public discussion. The upper

  8. Secret-key Agreement with Channel State Information at the Transmitter

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-key Agreement with Channel State Information at the Transmitter Ashish Khisti, Member of secret-key agreement over a wiretap channel with state parameters. The transmitter com- municates discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound

  9. Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach Ashish: akhisti@comm.utoronto.ca Abstract--Fundamental limits of secret-key agreement over reciprocal wireless source generation. The resulting secret-key involves contributions of both channel sequences and source

  10. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number

  11. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  12. Nonperturbative infrared fixed point in sextet QCD

    E-Print Network [OSTI]

    Benjamin Svetitsky; Yigal Shamir; Thomas DeGrand

    2008-09-18T23:59:59.000Z

    The SU(3) gauge theory with fermions in the sextet representation is one of several theories of interest for technicolor models. We have carried out a Schrodinger functional (SF) calculation for the lattice theory with two flavors of Wilson fermions. We find that the discrete beta function changes sign when the SF renormalized coupling is in the neighborhood of g^2 = 2.0, showing a breakdown of the perturbative picture even though the coupling is weak. The most straightforward interpretation is an infrared-stable fixed point.

  13. Benchmarks for the point kinetics equations

    SciTech Connect (OSTI)

    Ganapol, B. [Department of Aerospace and Mechanical Engineering (United States); Picca, P. [Department of Systems and Industrial Engineering, University of Arizona (United States); Previti, A.; Mostacci, D. [Laboratorio di Montecuccolino Alma Mater Studiorum, Universita di Bologna (Italy)

    2013-07-01T23:59:59.000Z

    A new numerical algorithm is presented for the solution to the point kinetics equations (PKEs), whose accurate solution has been sought for over 60 years. The method couples the simplest of finite difference methods, a backward Euler, with Richardsons extrapolation, also called an acceleration. From this coupling, a series of benchmarks have emerged. These include cases from the literature as well as several new ones. The novelty of this presentation lies in the breadth of reactivity insertions considered, covering both prescribed and feedback reactivities, and the extreme 8- to 9- digit accuracy achievable. The benchmarks presented are to provide guidance to those who wish to develop further numerical improvements. (authors)

  14. Fixed-Point-Like Theorems on Subspaces

    E-Print Network [OSTI]

    Bich, Philippe; Cornet, Bernard

    2004-08-26T23:59:59.000Z

    denote by E? = {u ? Rn | ?x ? E, x · u = 0} the orthogonal space to E. If u1, . . . ,uk belong to E, a vector space, we denote by span{u1, . . . ,uk} the vector subspace of E spanned by u1, . . . ,uk. Let V be a Euclidean space and let k be an integer... Fixed-point-like theorems on subspaces Take I = {1},V1 =Rn+1, k1 = n, J =?, and apply Theorem 2.1 to the correspondences Hk, which clearly satisfy the assumptions of Theorem 2.1. So there exists E¯ ? Gn(Rn+1) such that E¯?Hk(E¯) #6;= ? for every k = 1...

  15. Wisconsin Nuclear Profile - Point Beach Nuclear Plant

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5 Tables July 1996 Energy Information Administration Office ofthroughYear JanYearFuel5,266 6,090IndustrialVehicle FuelPoint Beach

  16. CenterPoint Energy | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model, click here.Telluric Survey asWest, New Jersey:Moriches,CenterPoint Energy

  17. CenterPoint Energy | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model, click here.Telluric Survey asWest, New Jersey:Moriches,CenterPoint

  18. Tribal Points of Contacts | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success| Department ofServicesPoints of Contacts Tribal

  19. Points of Contact and Privacy Act Advisory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeeding accessPeptoidLabPhysicsPits | National NuclearPlutoniumPoints

  20. ChargePoint America | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof EnergyAdministration-DesertofSuccess Stories fromSteelsDieselChargePoint

  1. Analysis of Crossover Points for MVLT Superclass

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T, Inc.'s Reply Comments AT&T,FACT SAmes LabSystems Analysisof Crossover Points

  2. Point of Compliance | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSAR - T en YMedicineWhat Happens ina HomeAmended Record ofPoint

  3. Midnight Point Geothermal Project | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant JumpMarysville, Ohio:Menomonee| OpenMickeyDelaware: EnergyMidnight Point Geothermal

  4. Star Point Wind Farm | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-f < RAPID‎SolarCity CorpSpringfield,Wind FarmJumpNebraska: EnergyPoint

  5. Microsoft PowerPoint - 8 Greg Flach

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel Microsoft PowerPoint -of 16 Mar |org

  6. Microsoft PowerPoint - Advances_Taylor

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel Microsoft PowerPoint -of 16 MarNational

  7. Microsoft PowerPoint - Briefings_Casey

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel Microsoft PowerPoint -of 16Oversight *TRANSCOM

  8. Microsoft PowerPoint - Budget.pptx

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel Microsoft PowerPoint -of 16Oversight

  9. Cedar Point Wind Farm | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia:Power LPInformationCashtonGoCaterpillar Jump to:CeCapPoint Wind

  10. Microsoft PowerPoint - Franklin System IO

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighand RetrievalsFinalModule8.ppt Microsoft PowerPoint - C-ModChemicalFile

  11. Microsoft PowerPoint - GVR2_Poster

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighand RetrievalsFinalModule8.ppt Microsoft PowerPoint -March 26 -

  12. Proximity Graphs for Defining Surfaces over Point Clouds

    E-Print Network [OSTI]

    Behnke, Sven

    over Point Clouds Gabriel Zachmann University of Bonn Germany Jan Klein University of Paderborn Germany

  13. THE FERNALD DOSIMETRY RECONSTRUCTION Task 1: Identification of Release Points

    E-Print Network [OSTI]

    and scrubber stacks, 19 thorium emission points, and 6 unmonitored stacks. Using selected engineering drawings

  14. X-ray Observations of AGN at Intermediate to High Redshift

    E-Print Network [OSTI]

    K. A. Weaver

    1999-04-22T23:59:59.000Z

    The cores of active galactic nuclei (AGN) harbor some of the most extreme conditions of matter and energy in the Universe. One of the major goals of high-energy astrophysics is to probe these extreme environments in the vicinity of supermassive black holes, which are intimately linked to the mechanisms that produce the continuum emission in AGN. X-ray studies seek to understand the physics responsible for the continuum emission, its point of origin, how nuclear activity is fueled, and how supermassive black holes evolve. The key to finding answers to these questions lies in measuring the intrinsic luminosities and spectral shapes, the relation of these properties to other wavebands, and how the source properties change with redshift. This article reviews X-ray observations of AGN from redshifts of ~0.1-3 with the goal of summarizing our current knowledge of their X-ray spectral characteristics. Results are evaluated in terms of their robustness and are examined in the light of current theoretical predictions of energy release via processes associated with the accretion mechanism. A possible evolutionary scenario is discussed, along with the importance of AGN studies at high redshift as they relate to the total energetics of the Universe.

  15. Autonomous observing strategies for the ocean carbon cycle

    SciTech Connect (OSTI)

    Bishop, James K.; Davis, Russ E.

    2000-07-26T23:59:59.000Z

    Understanding the exchanges of carbon between the atmosphere and ocean and the fate of carbon delivered to the deep sea is fundamental to the evaluation of ocean carbon sequestration options. An additional key requirement is that sequestration must be verifiable and that environmental effects be monitored and minimized. These needs can be addressed by carbon system observations made from low-cost autonomous ocean-profiling floats and gliders. We have developed a prototype ocean carbon system profiler based on the Sounding Oceanographic Lagrangian Observer (SOLO; Davis et al., 1999). The SOLO/ carbon profiler will measure the two biomass components of the carbon system and their relationship to physical variables, such as upper ocean stratification and mixing. The autonomous observations within the upper 1500 m will be made on daily time scales for periods of months to seasons and will be carried out in biologically dynamic locations in the world's oceans that are difficult to access with ships (due to weather) or observe using remote sensing satellites (due to cloud cover). Such an observational capability not only will serve an important role in carbon sequestration research but will provide key observations of the global ocean's natural carbon cycle.

  16. Observing alternatives to inflation

    E-Print Network [OSTI]

    P. Peter

    2009-12-07T23:59:59.000Z

    We discuss the possibility that the inflationary paradigm, undoubtfully today's best framework to understand all the present cosmological data, may still have some viable challengers. The underlying idea for such discussions is that although inflation already passed quite a large number of tests, indeed enough to make it part of the so-called ``standard model'' of cosmology, it has always been through indirect measurements: there is not a chance that we may ever directly check its validity, and therefore, in order to assert its factuality with increasing level of confidence, it is required that we compare its predictions not only to observations, but also to as many contenders as possible. Among other categories of possible models, we wish to put the emphasis in particular on bouncing cosmologies that, however not as complete as the inflation paradigm might be, could still represent a reasonnable way of explaining the current data. Hopefully, future data will be able to discriminate between these various sets of theories.

  17. Observational Analysis of Cloud and Precipitation in Midlatitude Cyclones: Northern versus Southern Hemisphere Warm Fronts

    E-Print Network [OSTI]

    Satellite Observations (CALIPSO), and Advanced Microwave Scanning Radiometer for Earth Observing System Extratropical cyclones produce the bulk of the cold- season precipitation in middle and high latitudes and are key contributors to the meridional transport of energy between the equator and the poles. Though

  18. THE IMPACT OF NEW IONIZING FLUXES ON ISO OBSERVATIONS OF HII REGIONS AND STARBURSTS \\Lambda

    E-Print Network [OSTI]

    Schaerer, Daniel

    1 THE IMPACT OF NEW IONIZING FLUXES ON ISO OBSERVATIONS OF HII REGIONS AND STARBURSTS \\Lambda on the IR lines are shown. First comparisons of our starburst models with IR­diagnostics and the ISO observations of Genzel et al. (1998) are also presented. Key words: HII regions, galaxies: starburst, ISO. 1

  19. Power Counting to Better Jet Observables

    E-Print Network [OSTI]

    Andrew J. Larkoski; Ian Moult; Duff Neill

    2014-09-22T23:59:59.000Z

    Optimized jet substructure observables for identifying boosted topologies will play an essential role in maximizing the physics reach of the Large Hadron Collider. Ideally, the design of discriminating variables would be informed by analytic calculations in perturbative QCD. Unfortunately, explicit calculations are often not feasible due to the complexity of the observables used for discrimination, and so many validation studies rely heavily, and solely, on Monte Carlo. In this paper we show how methods based on the parametric power counting of the dynamics of QCD, familiar from effective theory analyses, can be used to design, understand, and make robust predictions for the behavior of jet substructure variables. As a concrete example, we apply power counting for discriminating boosted Z bosons from massive QCD jets using observables formed from the n-point energy correlation functions. We show that power counting alone gives a definite prediction for the observable that optimally separates the background-rich from the signal-rich regions of phase space. Power counting can also be used to understand effects of phase space cuts and the effect of contamination from pile-up, which we discuss. As these arguments rely only on the parametric scaling of QCD, the predictions from power counting must be reproduced by any Monte Carlo, which we verify using Pythia8 and Herwig++. We also use the example of quark versus gluon discrimination to demonstrate the limits of the power counting technique.

  20. arXiv:1404.2350v1[cond-mat.stat-mech]9Apr2014 The two-point resistance of a cobweb with a superconducting

    E-Print Network [OSTI]

    Essam, John W.

    with a superconducting boundary Zhi-Zhong Tan Department of Physics, Nantong University, Nantong 226007, China J. W as a single summation. Key words: m Ã? n cobweb; superconducting boundary, two-point resistance; matrix Laplacian approach [7]. In this paper we consider the cobweb network with a superconducting boundary

  1. Eavesdropper's Optimal Information in Variations of Bennett-Brassard 1984 Quantum Key Distribution in the Coherent Attacks

    E-Print Network [OSTI]

    W. Y. Hwang; D. Ahn; S. W. Hwang

    2001-02-03T23:59:59.000Z

    We calculate eavesdropper's optimal information on raw bits in Bennett-Brassard 1984 quantum key distribution (BB84 QKD) and six-state scheme in coherent attacks, using a formula by Lo and Chau [Science 283 (1999) 2050] with single photon assumption. We find that eavesdropper's optimal information in QKD without public announcement of bases [Phys. Lett. A 244 (1998) 489] is the same as that of a corresponding QKD WITH it in the coherent attack. We observe a sum-rule concerning each party's information.

  2. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  3. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    SciTech Connect (OSTI)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01T23:59:59.000Z

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  4. A beta-type fully implicit reservoir simulator with variable bubble point and dew point

    E-Print Network [OSTI]

    Boe, Jarle

    1980-01-01T23:59:59.000Z

    the following equation. V P 5. 617 m g 2 QT 1000 (56) And the R curve can be obtained from the same constant volume Sg depletion by summing up the GPM content of the propane through hep- tanes plus fractions. The B and the R can then be calculated 0 so...A BETA-TYPE FULLY IMPLICIT RESERVOIR SIMULATOR WITH VARIABLE BUBBLE POINT AND DEW POINT A Thesis by JARLE BOE Submitted to the Graduate College of Texas A&M University in partial fulfillment of the requirement for the degree of MASTER...

  5. Key residues for the oligomerization of A{beta}42 protein in Alzheimer's disease

    SciTech Connect (OSTI)

    Ngo, Sam [Department of Neurology, Brain Research Institute, Molecular Biology Institute, University of California, Los Angeles, CA 90095 (United States)] [Department of Neurology, Brain Research Institute, Molecular Biology Institute, University of California, Los Angeles, CA 90095 (United States); Guo, Zhefeng, E-mail: zhefeng@ucla.edu [Department of Neurology, Brain Research Institute, Molecular Biology Institute, University of California, Los Angeles, CA 90095 (United States)] [Department of Neurology, Brain Research Institute, Molecular Biology Institute, University of California, Los Angeles, CA 90095 (United States)

    2011-10-28T23:59:59.000Z

    Highlights: Black-Right-Pointing-Pointer A{beta} oligomers are neurotoxins and likely the causing agents for Alzheimer's disease. Black-Right-Pointing-Pointer A{beta}42 fusion protein form globular oligomers. Black-Right-Pointing-Pointer A{beta}42 fusion protein oligomers contain SDS-resistant tetramers and hexamers. Black-Right-Pointing-Pointer Cysteine substitutions at residues 31, 32, 34, 39-41 disrupt A{beta}42 oligomerization. -- Abstract: Deposition of amyloid fibrils consisting of amyloid {beta} (A{beta}) protein as senile plaques in the brain is a pathological hallmark of Alzheimer's disease. However, a growing body of evidence shows that soluble A{beta} oligomers correlate better with dementia than fibrils, suggesting that A{beta} oligomers may be the primary toxic species. The structure and oligomerization mechanism of these A{beta} oligomers are crucial for developing effective therapeutics. Here we investigated the oligomerization of A{beta}42 in the context of a fusion protein containing GroES and ubiquitin fused to the N-terminus of A{beta} sequence. The presence of fusion protein partners, in combination with a denaturing buffer containing 8 M urea at pH 10, is unfavorable for A{beta}42 aggregation, thus allowing only the most stable structures to be observed. Transmission electron microscopy showed that A{beta}42 fusion protein formed globular oligomers, which bound weakly to thioflavin T and Congo red. SDS-PAGE shows that A{beta}42 fusion protein formed SDS-resistant hexamers and tetramers. In contrast, A{beta}40 fusion protein remained as monomers on SDS gel, suggesting that the oligomerization of A{beta}42 fusion protein is not due to the fusion protein partners. Cysteine scanning mutagenesis at 22 residue positions further revealed that single cysteine substitutions of the C-terminal hydrophobic residues (I31, I32, L34, V39, V40, and I41) led to disruption of hexamer and tetramer formation, suggesting that hydrophobic interactions between these residues are most critical for A{beta}42 oligomerization.

  6. Correlation between model observer and human observer performance in CT imaging when lesion location is uncertain

    SciTech Connect (OSTI)

    Leng, Shuai; Yu, Lifeng; Zhang, Yi; McCollough, Cynthia H. [Department of Radiology, Mayo Clinic, 200 First Street Southwest, Rochester, Minnesota 55905 (United States)] [Department of Radiology, Mayo Clinic, 200 First Street Southwest, Rochester, Minnesota 55905 (United States); Carter, Rickey [Department of Biostatistics, Mayo Clinic, 200 First Street Southwest, Rochester, Minnesota 55905 (United States)] [Department of Biostatistics, Mayo Clinic, 200 First Street Southwest, Rochester, Minnesota 55905 (United States); Toledano, Alicia Y. [Biostatistics Consulting, LLC, 10606 Wheatley Street, Kensington, Maryland 20895 (United States)] [Biostatistics Consulting, LLC, 10606 Wheatley Street, Kensington, Maryland 20895 (United States)

    2013-08-15T23:59:59.000Z

    Purpose: The purpose of this study was to investigate the correlation between model observer and human observer performance in CT imaging for the task of lesion detection and localization when the lesion location is uncertain.Methods: Two cylindrical rods (3-mm and 5-mm diameters) were placed in a 35 × 26 cm torso-shaped water phantom to simulate lesions with ?15 HU contrast at 120 kV. The phantom was scanned 100 times on a 128-slice CT scanner at each of four dose levels (CTDIvol = 5.7, 11.4, 17.1, and 22.8 mGy). Regions of interest (ROIs) around each lesion were extracted to generate images with signal-present, with each ROI containing 128 × 128 pixels. Corresponding ROIs of signal-absent images were generated from images without lesion mimicking rods. The location of the lesion (rod) in each ROI was randomly distributed by moving the ROIs around each lesion. Human observer studies were performed by having three trained observers identify the presence or absence of lesions, indicating the lesion location in each image and scoring confidence for the detection task on a 6-point scale. The same image data were analyzed using a channelized Hotelling model observer (CHO) with Gabor channels. Internal noise was added to the decision variables for the model observer study. Area under the curve (AUC) of ROC and localization ROC (LROC) curves were calculated using a nonparametric approach. The Spearman's rank order correlation between the average performance of the human observers and the model observer performance was calculated for the AUC of both ROC and LROC curves for both the 3- and 5-mm diameter lesions.Results: In both ROC and LROC analyses, AUC values for the model observer agreed well with the average values across the three human observers. The Spearman's rank order correlation values for both ROC and LROC analyses for both the 3- and 5-mm diameter lesions were all 1.0, indicating perfect rank ordering agreement of the figures of merit (AUC) between the average performance of the human observers and the model observer performance.Conclusions: In CT imaging of different sizes of low-contrast lesions (?15 HU), the performance of CHO with Gabor channels was highly correlated with human observer performance for the detection and localization tasks with uncertain lesion location in CT imaging at four clinically relevant dose levels. This suggests the ability of Gabor CHO model observers to meaningfully assess CT image quality for the purpose of optimizing scan protocols and radiation dose levels in detection and localization tasks for low-contrast lesions.

  7. Global integrators based on equispaced points 

    E-Print Network [OSTI]

    Kirker, Martha Jane

    1966-01-01T23:59:59.000Z

    DESCRIPTION . . . ~ 13 IVo RESULTS a e a a ~ o ~ a ~ ~ ~ ~ e ~ e ~ 18 BIBLIOGRAPHY 20 APPENDIX 21 C HAP TER I INTRODUCTION A set of functions wl(x) wg(x) w +1(x) and n+1 a set of points xl, x2, --- x +1 can be found such that n&1 f(n)du = S wi...+1 (u-x )(u-x ) --- (u-x ) 1 2 n+1 If f(t) has n+1 derivatives, then E (t) = f u- u- 1 2 n+1 since the (n+1)th derivative of q (t) is zero. Now E(u) ~ 0 and E(x ) = 0, 1 C i & n+1. Hence there exists a number 8, 0 & 8 & 1 such that' E (8) = 0 n...

  8. Sequential conditions for fixed and periodic points 

    E-Print Network [OSTI]

    Peters, Burnis Charles

    1970-01-01T23:59:59.000Z

    : If f is a nonexpansive selfmap of (X, d) and for some x in X, lim f i(x ) = u, then the sequence (fm(u)) is n o ' i 0 isometric. We now consider mappings which satisfy the weaker conditions (S7) and (SS). Theorems 6 through 10 are due to Bailey [I...) and f (x) such that d(f (x), f (x)) & s. Assume m & n. Then, m n 10 d(f ' (x), f (x)) & s. Sy Theorem 9, f (x) and f n ' xrl-(m-n) (x) are proximal under f; therefore, by Theorem 7, there is a point u in X such that fm (u) = u. If u and v...

  9. Chilled Mirror Dew Point Hygrometer (CM) Handbook

    SciTech Connect (OSTI)

    Ritsche, MT

    2005-01-01T23:59:59.000Z

    The CM systems have been developed for the ARM Program to act as a moisture standard traceable to National Institute of Standards and Technology (NIST). There are three CM systems that are each fully portable, self-contained, and require only 110 V AC power. The systems include a CM sensor, air sampling and filtration system, a secondary reference (Rotronic HP043 temperature and relative humidity sensor) to detect system malfunctions, a data acquisition system, and data storage for more than one month of 1-minute data. The CM sensor directly measures dew point temperature at 1 m, air temperature at 2 m, and relative humidity at 2 m. These measurements are intended to represent self-standing data streams that can be used independently or in combinations.

  10. Low-melting point heat transfer fluid

    DOE Patents [OSTI]

    Cordaro, Joseph G. (Oakland, CA); Bradshaw, Robert W. (Livermore, CA)

    2011-04-12T23:59:59.000Z

    A low-melting point, heat transfer fluid comprising a mixture of LiNO.sub.3, NaNO.sub.3, KNO.sub.3, NaNO.sub.2 and KNO.sub.2 salts where the Li, Na and K cations are present in amounts of about 20-33.5 mol % Li, about 18.6-40 mol % Na, and about 40-50.3 mol % K and where the nitrate and nitrite anions are present in amounts of about 36-50 mol % NO.sub.3, and about 50-62.5 mol % NO.sub.2. These compositions can have liquidus temperatures between 70.degree. C. and 80.degree. C. for some compositions.

  11. Global integrators based on equispaced points

    E-Print Network [OSTI]

    Kirker, Martha Jane

    1966-01-01T23:59:59.000Z

    DESCRIPTION . . . ~ 13 IVo RESULTS a e a a ~ o ~ a ~ ~ ~ ~ e ~ e ~ 18 BIBLIOGRAPHY 20 APPENDIX 21 C HAP TER I INTRODUCTION A set of functions wl(x) wg(x) w +1(x) and n+1 a set of points xl, x2, --- x +1 can be found such that n&1 f(n)du = S wi...+1 ( yl) (u-xl)(u-x2)---(u-xn) and f(u)-q(u) = f (8) (nil) '. Therefore x i(u-xl)(u-x2) ---(u-x )I fj Lf(u)-q(u)] du] & fx/f (8) 0 (n&1) ? When given the ini. tial condition that y(xl) = al, a solution for some differential equations may be found...

  12. Break-Even Cost for Residential Solar Water Heating in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Cassard, H.; Denholm, P.; Ong, S.

    2011-02-01T23:59:59.000Z

    This paper examines the break-even cost for residential rooftop solar water heating (SWH) technology, defined as the point where the cost of the energy saved with a SWH system equals the cost of a conventional heating fuel purchased from the grid (either electricity or natural gas). We examine the break-even cost for the largest 1,000 electric and natural gas utilities serving residential customers in the United States as of 2008. Currently, the break-even cost of SWH in the United States varies by more than a factor of five for both electricity and natural gas, despite a much smaller variation in the amount of energy saved by the systems (a factor of approximately one and a half). The break-even price for natural gas is lower than that for electricity due to a lower fuel cost. We also consider the relationship between SWH price and solar fraction and examine the key drivers behind break-even costs. Overall, the key drivers of the break-even cost of SWH are a combination of fuel price, local incentives, and technical factors including the solar resource location, system size, and hot water draw.

  13. Target Selection for the LBTI Exozodi Key Science Program

    E-Print Network [OSTI]

    Weinberger, Alycia J; Kennedy, Grant M; Roberge, Aki; Defrère, Denis; Hinz, Philip M; Millan-Gabet, Rafael; Rieke, George; Bailey, Vanessa P; Danchi, William C; Haniff, Chris; Mennesson, Bertrand; Serabyn, Eugene; Skemer, Andrew J; Stapelfeldt, Karl R; Wyatt, Mark C

    2015-01-01T23:59:59.000Z

    The Hunt for Observable Signatures of Terrestrial planetary Systems (HOSTS) on the Large Binocular Telescope Interferometer will survey nearby stars for faint emission arising from ~300 K dust (exozodiacal dust), and aims to determine the exozodiacal dust luminosity function. HOSTS results will enable planning for future space telescopes aimed at direct spectroscopy of habitable zone terrestrial planets, as well as greater understanding of the evolution of exozodiacal disks and planetary systems. We lay out here the considerations that lead to the final HOSTS target list. Our target selection strategy maximizes the ability of the survey to constrain the exozodi luminosity function by selecting a combination of stars selected for suitability as targets of future missions and as sensitive exozodi probes. With a survey of approximately 50 stars, we show that HOSTS can enable an understanding of the statistical distribution of warm dust around various types of stars and is robust to the effects of varying levels ...

  14. Chandra Orion Ultradeep Project: Observations and Source Lists

    E-Print Network [OSTI]

    K. V. Getman; E. Flaccomio; P. S. Broos; N. Grosso; M. Tsujimoto; L. Townsley; G. P. Garmire; J. Kastner; J. Li; F. R. Harnden, Jr.; S. Wolk; S. S. Murray; C. J. Lada; A. A. Muench; M. J. McCaughrean; G. Meeus; F. Damiani; G. Micela; S. Sciortino; J. Bally; L. A. Hillenbrand; W. Herbst; T. Preibisch; E. D. Feigelson

    2004-10-06T23:59:59.000Z

    We present a description of the data reduction methods and the derived catalog of more than 1600 X-ray point sources from the exceptionally deep January 2003 Chandra X-ray Observatory observation of the Orion Nebula Cluster and embedded populations around OMC-1. The observation was obtained with Chandra's Advanced CCD Imaging Spectrometer (ACIS) and has been nicknamed the Chandra Orion Ultradeep Project (COUP). With an 838 ks exposure made over a continuous period of 13.2 days, the COUP observation provides the most uniform and comprehensive dataset on the X-ray emission of normal stars ever obtained in the history of X-ray astronomy.

  15. Exploiting Symmetry in Integer Convex Optimization using Core Points

    E-Print Network [OSTI]

    Herr, Katrin; Schürmann, Achill

    2012-01-01T23:59:59.000Z

    We consider convex programming problems with integrality constraints that are invariant under a linear symmetry group. We define a core point of such a symmetry group as an integral point for which the convex hull of its orbit does not contain integral points other than the orbit points themselves. These core points allow us to decompose symmetric integer convex programming problems. Especially for symmetric integer linear programs we describe two algorithms based on this decomposition. Using a characterization of core points for direct products of symmetric groups, we show that prototype implementations can compete with state-of-the art commercial solvers and solve an open MIPLIB problem.

  16. Zero-point energy in the Johnson noise of resistors: Is it there?

    E-Print Network [OSTI]

    Kish, Laszlo B

    2015-01-01T23:59:59.000Z

    There is a longstanding debate about the zero-point term in the Johnson noise voltage of a resistor: Is it indeed there or is it only an experimental artifact due to the uncertainty principle for phase-sensitive amplifiers? We show that, when the zero-point term is measured by the mean energy and force in a shunting capacitor and, if these measurements confirm its existence, two types of perpetual motion machines could be constructed. Therefore an exact quantum theory of the Johnson noise must include also the measurement system used to evaluate the observed quantities. The results have implications also for phenomena in advanced nanotechnology.

  17. Zero-point energy in the Johnson noise of resistors: Is it there?

    E-Print Network [OSTI]

    Laszlo B. Kish

    2015-05-01T23:59:59.000Z

    There is a longstanding debate about the zero-point term in the Johnson noise voltage of a resistor: Is it indeed there or is it only an experimental artifact due to the uncertainty principle for phase-sensitive amplifiers? We show that, when the zero-point term is measured by the mean energy and force in a shunting capacitor and, if these measurements confirm its existence, two types of perpetual motion machines could be constructed. Therefore an exact quantum theory of the Johnson noise must include also the measurement system used to evaluate the observed quantities. The results have implications also for phenomena in advanced nanotechnology.

  18. Point-to-Point Verification of Monitored Sensors at Reynolds Army Clinic and Hospital Final Report 

    E-Print Network [OSTI]

    Martinez, J.; Linenschmidt, S.; Turner, D.

    2004-01-01T23:59:59.000Z

    their existing 8540 pneumatic system to a direct digital control (DDC) Metasys version 12.0 system. Only the points read by the control system and used for control sequencing were verified. In the following sections of this report detailed information...

  19. Updated On: 4/9/2014 15:43 Teams: Team Eells points Killin Em points

    E-Print Network [OSTI]

    Sridhar, Srinivas

    Galus - C 0 Timothy Foley 0 Matthew Marks 0 Jacob Barlow 0 Bridget Bunda 0 Kevin Zheng 0 Rachel Anderson Benjamin Dunbar 0 Dorian Kersch James Watkins 0 Richard Jones Samuel Lechter 0 Benjamin Lacy 0 Alexa Kacin Bandhi 0 Sami Berrada 0 James Tan Kevin Liu 0 Ashley Peltier 0 Andrew Yi Jack Corriveau 0 #12;points

  20. Updated On: 4/12/2013 15:34 Teams: Bung points Galactic Unicorns points

    E-Print Network [OSTI]

    Sridhar, Srinivas

    Alexander Turcotte 15 Daniel Lang 34 Andrew Schamber 17 Chris Lamb 15 Garrett Gustafson 17 Dan Hecht 9 Dean - *Ineligible* 0 Kushal Modi 18 Corey Lavin 4 Alexander Lobrano 0 Dan Durning #12;Ludo Loves Pizza v10.0 points