National Library of Energy BETA

Sample records for key observation point

  1. Outline Overview Design Principles Key Points Design Principles

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 12 #12-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least Common Mechanism Psychological Acceptability 3 Key Points Ahmad Almulhem - Network Security Engineering - 2008 2 / 12 #12;Outline

  2. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  3. Input Observer: Measuring Text Entry and Pointing Performance from

    E-Print Network [OSTI]

    Wobbrock, Jacob O.

    Input Observer: Measuring Text Entry and Pointing Performance from Naturalistic Everyday Computer that will be capable of measuring a user's text entry and pointing abilities from everyday computer use "in the wild for both text entry and mouse pointing. Keywords Text entry, mouse pointing, field studies, naturalistic

  4. Additional Entry Points in the Academic Year: Key Principles (Academic and Business) for Campus-Based Programmes

    E-Print Network [OSTI]

    Greenaway, Alan

    Additional Entry Points in the Academic Year: Key Principles (Academic and Business) for Campus-Based Programmes The Key Principles (Academic and Business) for Additional Entry points in the Academic Year operates on the basis of a two-semester academic year with a main, formal entry point in September

  5. Filtering with Marked Point Process Observations via Poisson Chaos Expansion

    SciTech Connect (OSTI)

    Sun Wei; Zeng Yong; Zhang Shu

    2013-06-15

    We study a general filtering problem with marked point process observations. The motivation comes from modeling financial ultra-high frequency data. First, we rigorously derive the unnormalized filtering equation with marked point process observations under mild assumptions, especially relaxing the bounded condition of stochastic intensity. Then, we derive the Poisson chaos expansion for the unnormalized filter. Based on the chaos expansion, we establish the uniqueness of solutions of the unnormalized filtering equation. Moreover, we derive the Poisson chaos expansion for the unnormalized filter density under additional conditions. To explore the computational advantage, we further construct a new consistent recursive numerical scheme based on the truncation of the chaos density expansion for a simple case. The new algorithm divides the computations into those containing solely system coefficients and those including the observations, and assign the former off-line.

  6. Lunar distances observed by Cook's expedition at Point Venus in ...

    E-Print Network [OSTI]

    In the modern navigator's language this is called GHA Aries (Greenwich hour angle of the point of the spring equinox). One of the two astronomers who made ...

  7. Microsoft PowerPoint - DOE O 413 3B Brief v9 with key points in notes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPAEnergy May 28MarEnergy Microsoft PowerPointSeptember

  8. Observations of Supernova Remnants and Pulsar Wind Nebulae: A VERITAS Key Science Project

    E-Print Network [OSTI]

    Humensky, Brian

    2009-01-01

    The study of supernova remnants and pulsar wind nebulae was one of the Key Science Projects for the first two years of VERITAS observations. VERITAS is an array of four imaging Cherenkov telescopes located at the Whipple Observatory in southern Arizona. Supernova remnants are widely considered to be the strongest candidate for the source of cosmic rays below the knee at around 10^15 eV. Pulsar wind nebulae are synchrotron nebulae powered by the spin-down of energetic young pulsars, and comprise one of the most populous very-high-energy gamma-ray source classes. This poster will summarize the results of this observation program.

  9. LETTER Global analysis of plasticity in turgor loss point, a key drought tolerance trait

    E-Print Network [OSTI]

    Sack, Lawren

    , ptlp measured in one season can reliably characterise most spe- cies' constitutive drought tolerances, wilting and hydraulic dysfunction (Brodribb et al. 2003; Choat et al. 2007; Bartlett et al. 2012b) have ecosystems, especially relative to ecosystem water supply. The turgor loss point (ptlp; unit: MPa

  10. Taming Wild Behavior: The Input Observer for Obtaining Text Entry and Mouse Pointing Measures from

    E-Print Network [OSTI]

    Wobbrock, Jacob O.

    Taming Wild Behavior: The Input Observer for Obtaining Text Entry and Mouse Pointing Measures from that can run quietly in the background of users' computers and measure their text entry and mouse pointing to segment text entry and mouse pointing input streams into "trials." We are the first to measure errors

  11. Blind and pointed Sunyaev-Zel'dovich observations with the Arcminute Microkelvin Imager

    E-Print Network [OSTI]

    Shimwell, Timothy William

    2011-11-08

    unknown SZ decrements. Finally, I conduct pointed observations towards a high luminosity subsample of eight clusters from the Local Cluster Substructure Survey (LoCuSS). For each of these I provide probability distributions of parameters such as mass...

  12. 1. Programmes without a standard entry point are excluded from the Key Principles (eg multi-format MBA and independent distance learning programmes). Partnership programmes (incl. West London College) and research degrees are likewise excluded.

    E-Print Network [OSTI]

    Greenaway, Alan

    1. Programmes without a standard entry point are excluded from the Key Principles (eg multi) and research degrees are likewise excluded. ADDITIONAL ENTRY POINTS IN THE ACADEMIC YEAR: KEY PRINCIPLES and templates. Additional Entry Points in the Academic Year: Key Principles for Campus-based Programmes Heriot

  13. Key Points of STFC and EPSRC's Fusion for Energy EPSRC and STFC Councils have agreed a revised strategy for fusion for energy

    E-Print Network [OSTI]

    Key Points of STFC and EPSRC's Fusion for Energy Strategy EPSRC and STFC Councils have agreed a revised strategy for fusion for energy research: 1) EPSRC and STFC will support fusion research as a long and demonstrating leadership to realise the goal of fusion energy. 2) EPSRC will develop a long term base funding

  14. Pay Tools Portfolio 2014-2015: Key Points to Optimize Impact (updated December 2014) 1. Values: While developing our pay initiatives, we have been mindful of our values.

    E-Print Network [OSTI]

    Gasch, Audrey P.

    Pay Tools Portfolio 2014-2015: Key Points to Optimize Impact (updated December 2014) 1. Values be mindful of market and equity and build pay tools beyond the weak or non-existent pay plans of recent years. 2. Sequencing strategy for decision making: In the case of faculty, we have multiple tools in our

  15. Observation of a Dirac point in microwave experiments with a photonic crystal modeling graphene

    E-Print Network [OSTI]

    S. Bittner; B. Dietz; M. Miski-Oglu; P. Oria Iriarte; A. Richter; F. Schaefer

    2010-05-25

    We present measurements of transmission and reflection spectra of a microwave photonic crystal composed of 874 metallic cylinders arranged in a triangular lattice. The spectra show clear evidence of a Dirac point, a characteristic of a spectrum of relativistic massless fermions. In fact, Dirac points are a peculiar property of the electronic band structure of graphene, whose properties consequently can be described by the relativistic Dirac equation. In the vicinity of the Dirac point, the measured reflection spectra resemble those obtained by conductance measurements in scanning tunneling microscopy of graphene flakes.

  16. Emission, oxidation, and secondary organic aerosol formation of volatile organic compounds as observed at Chebogue Point,

    E-Print Network [OSTI]

    Goldstein, Allen

    acid, formaldehyde, acetaldehyde, tentatively identified formic acid and hydroxyacetone organic aerosol production. We clearly show these compounds do not originate from local sources. We also show these compounds match the oxidation products of isoprene observed in smog chamber studies, and we

  17. The nuclear symmetry energy and other isovector observables from the point of view of nuclear structure

    E-Print Network [OSTI]

    G. Colo'; X. Roca-Maza; N. Paar

    2015-04-08

    In this contribution, we review some works related with the extraction of the symmetry energy parameters from isovector nuclear excitations, like the giant resonances. Then, we move to the general issue of how to assess whether correlations between a parameter of the nuclear equation of state and a nuclear observable are robust or not. To this aim, we introduce the covariance analysis and we discuss some counter-intuitive, yet enlightening, results from it.

  18. Bars and Boxy/Peanut-Shaped Bulges: An Observational Point of View

    E-Print Network [OSTI]

    M. Bureau; K. C. Freeman; E. Athanassoula

    1999-01-19

    Prompted by work on the buckling instability in barred spiral galaxies, much effort has been devoted lately to the study of boxy/peanut-shaped (B/PS) bulges. Here, we present new bar diagnostics for edge-on spiral galaxies based on periodic orbits calculations and hydrodynamical simulations. Both approaches provide reliable ways to identify bars and their orientations in edge-on systems. We also present the results of an observational search for bars in a large sample of edge-on spirals with and without B/PS bulges. We show that most B/PS bulges are due to the presence of a thick bar viewed edge-on while only a few may be due to accretion. This strongly supports the bar-buckling mechanism for the formation of B/PS bulges.

  19. Three-Year Global Survey of Coronal Null Points from Potential-Field-Source-Surface (PFSS) Modeling and Solar Dynamics Observatory (SDO) Observations

    E-Print Network [OSTI]

    Freed, Michael; McKenize, David

    2014-01-01

    This article compiles and examines a comprehensive coronal magnetic-null-point survey created by potential-field-source-surface (PFSS) modeling and Solar Dynamics Observatory/Atmospheric Imaging Assembly (SDO/AIA) observations. The locations of 582 potential magnetic null points in the corona were predicted from the PFSS model between Carrington Rotations (CR) 2098 (June 2010) and 2139 (July 2013). These locations were manually inspected, using contrast-enhanced SDO/AIA images in 171 angstroms at the east and west solar limb, for structures associated with nulls. A Kolmogorov--Smirnov (K--S) test showed a statistically significant difference between observed and predicted latitudinal distributions of null points. This finding is explored further to show that the observability of null points could be affected by the Sun's asymmetric hemisphere activity. Additional K--S tests show no effect on observability related to eigenvalues associated with the fan and spine structure surrounding null points or to the orie...

  20. Observation of Isomeric Decays in the r-Process Waiting-Point Nucleus {sup 130}Cd{sub 82}

    SciTech Connect (OSTI)

    Jungclaus, A.; Poves, A.; Modamio, V.; Walker, J. [Departamento de Fisica Teorica, Universidad Autonoma de Madrid, E-28049 Madrid (Spain); Caceres, L. [Departamento de Fisica Teorica, Universidad Autonoma de Madrid, E-28049 Madrid (Spain); Gesellschaft fuer Schwerionenforschung (GSI), D-64291 Darmstadt (Germany); Gorska, M.; Grawe, H.; Langanke, K.; Martinez-Pinedo, G.; Cuenca-Garcia, J. J.; Doornenbal, P.; Geissel, H.; Gerl, J.; Kojouharov, I.; Kurz, N.; Prokopowicz, W.; Schaffner, H.; Wollersheim, H. J.; Montes, F.; Tashenov, S. [Gesellschaft fuer Schwerionenforschung (GSI), D-64291 Darmstadt (Germany)] (and others)

    2007-09-28

    The {gamma} decay of excited states in the waiting-point nucleus {sup 130}Cd{sub 82} has been observed for the first time. An 8{sup +} two-quasiparticle isomer has been populated both in the fragmentation of a {sup 136}Xe beam as well as in projectile fission of {sup 238}U, making {sup 130}Cd the most neutron-rich N=82 isotone for which information about excited states is available. The results, interpreted using state-of-the-art nuclear shell-model calculations, show no evidence of an N=82 shell quenching at Z=48. They allow us to follow nuclear isomerism throughout a full major neutron shell from {sup 98}Cd{sub 50} to {sup 130}Cd{sub 82} and reveal, in comparison with {sup 76}Ni{sub 48} one major proton shell below, an apparently abnormal scaling of nuclear two-body interactions.

  1. KEY PERSONNEL

    National Nuclear Security Administration (NNSA)

    KEY PERSONNEL 7062015 TITLE NAME President Christopher C. Gentile Vice President, Engineering Robin Stubenhofer Vice President, Integrated Supply Chain Rick Lavelock Director,...

  2. Observed Asymptotic Differences in Energies of Stable and Minimal Point Configurations on $\\mathbb{S}^2$ and the Role of Defects

    E-Print Network [OSTI]

    M. Calef; W. Griffiths; A. Schulz; C. Fichtl; D. Hardin

    2013-10-02

    Observations suggest that configurations of points on a sphere that are stable with respect to a Riesz potential distribute points uniformly over the sphere. Further, these stable configurations have a local structure that is largely hexagonal. Minimal configurations differ from stable configurations in the arrangement of defects within the hexagonal structure. This paper reports the asymptotic difference between the average energy of stable states and the lowest reported energies. We use this to infer the energy scale at which defects in the hexagonal structure are manifest. We report results for the Riesz potentials for s=0, s=1, s=2 and s=3. Additionally we compare existing theory for the asymptotic expansion in N of the minimal $N$-point energy with experimental results. We report a case of two distinct stable states that have the same Voronoi structure. Finally, we report the observed growth of the number of stable states as a function of N.

  3. MENINGOCOCCAL DISEASE INFORMATION OVERVIEW/KEY POINTS

    E-Print Network [OSTI]

    Singh, Jaswinder Pal

    and in the community? You can help prevent the spread of illnesses by: Covering your mouth and nose when coughing or sneezing. Cover your mouth and nose with a tissue when coughing or sneezing. It may prevent those around

  4. Key Reference Agilent Technologies

    E-Print Network [OSTI]

    Anlage, Steven

    is provided "as is", and is subject to being changed, without notice, in future editions. Further with the User and should any of the contract terms conflict with these terms, the contract terms shall control enables you to define the number of points in a step sweep. When you press this key, the current value

  5. Observations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access to scienceSpeedingLightweight MaterialsGasObservation of aof

  6. DISCOVERY OF A DYNAMICAL COLD POINT IN THE HEART OF THE SAGITTARIUS dSph GALAXY WITH OBSERVATIONS FROM THE APOGEE PROJECT

    SciTech Connect (OSTI)

    Majewski, Steven R.; Hasselquist, Sten; Nidever, David L. E-mail: sh6cy@virginia.edu; and others

    2013-11-01

    The dynamics of the core of the Sagittarius (Sgr) dwarf spheroidal (dSph) galaxy are explored using high-resolution (R ? 22, 500), H-band, near-infrared spectra of over 1000 giant stars in the central 3 deg{sup 2} of the system, of which 328 are identified as Sgr members. These data, among some of the earliest observations from the Sloan Digital Sky Survey III/Apache Point Observatory Galactic Evolution Experiment (APOGEE) and the largest published sample of high resolution Sgr dSph spectra to date, reveal a distinct gradient in the velocity dispersion of Sgr from 11 to 14 km s{sup –1} for radii >0.°8 from center to a dynamical cold point of 8 km s{sup –1} in the Sgr center—a trend differing from that found in previous kinematical analyses of Sgr over larger scales that suggests a more or less flat dispersion profile at these radii. Well-fitting mass models with either cored and cusped dark matter distributions can be found to match the kinematical results, although the cored profile succeeds with significantly more isotropic stellar orbits than required for a cusped profile. It is unlikely that the cold point reflects an unusual mass distribution. The dispersion gradient may arise from variations in the mixture of populations with distinct kinematics within the dSph; this explanation is suggested (e.g., by detection of a metallicity gradient across similar radii), but not confirmed, by the present data. Despite these remaining uncertainties about their interpretation, these early test data (including some from instrument commissioning) demonstrate APOGEE's usefulness for precision dynamical studies, even for fields observed at extreme airmasses.

  7. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  8. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  9. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  10. Nano Lect 2 Questions and Keypoints Key Points

    E-Print Network [OSTI]

    Smy, Tom

    Semiconductors 3. Physics of quantum dots a. Heat as phonons b. Effective mass to crystals to fractals 5. Applications a. Biomedical i. Imaging ii. Cancer treatments

  11. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  12. Partial Observers

    E-Print Network [OSTI]

    Thomas Marlow

    2006-10-20

    We attempt to dissolve the measurement problem using an anthropic principle which allows us to invoke rational observers. We argue that the key feature of such observers is that they are rational (we need not care whether they are `classical' or `macroscopic' for example) and thus, since quantum theory can be expressed as a rational theory of probabilistic inference, the measurement problem is not a problem.

  13. Join Point Encapsulation David Larochelle

    E-Print Network [OSTI]

    Huang, Wei

    , behavior observation and modification are possible. We believe that it is undesirable to make all join points nec- essarily subject to behavioral observation and modification by aspects. To do so

  14. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  15. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  16. Key Research Results Achievement

    E-Print Network [OSTI]

    ) evaluated several common figures of merit used to compare the electrical and optical performance of TCsKey Research Results Achievement NREL research significantly contributed to inadequate existing not yet at performance levels of TCOs, demonstrate a much better combination of transmission

  17. Key Research Results Achievement

    E-Print Network [OSTI]

    % energy savings in new buildings and major renovations. Researchers at the National Renewable Energy%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvancedEnergy to use signifi- cantly less energy--reducing operating costs and greenhouse gas emissions. This new K-12

  18. Key Management in Historical Context

    E-Print Network [OSTI]

    ;Rolling Keys Why change keys? --- cryptoperiod (intrinsic to cryptosystem) --- management issuesKey Management in Historical Context Whitfield Diffie Internet Corporation for Assigned Names to become the security or insecurity of the message. #12;Key management systems both reflect and shape

  19. Integral points on hyperbolas: A special case

    E-Print Network [OSTI]

    Konstantine Zelator

    2009-07-21

    The subject matter of this work is integral points on conics described by the general equation, ax^2+bxy+cy^2+dx+ey+f=0 (1) where the six coefficients are integers satisfying the conditions, b^2-4ac=k^2, with a and c being nonzero and k a positive integer. It is well known the when b^2-4ac>0, equation (1) describes either a hyperbola on the plane or a pair of two straight lines(the degenerate case). The key integer is the number, I=k^2(d^2-4af)-(2ae-bd)^2. In Section 2, we show via a straightforward algebraic method that equation (1) can be put in the form, g(x,y)h(x,y)=I, where g(x,y) and h(x,y) are linear polynomials in x and y with integer coefficients. Thus, when I is not zero, equation (1) has only finitely many integer solutions (x,y). The process of finding these solutions is outlined in Section 3. In Section 4,we give a detailed numerical example. In Section 5, we offer some observations and remarks. In Section 6, we discuss the case b=d=e=0. In Section 7 we discuss the case a=1=k, and we show that when I=2^n, n>or=2, the above hyperbola has exactly 2(n-1) integral points, all explicitly given. In Section 10, we prove that these points are distinct. In Section 8 we discuss the case I=0, the hyperbola in (1) has either infinitely many integral points: or no integral points. Finally in Section 9, we discuss the special case d=e=f=0.

  20. Policy on Keys and Keycards Policy on Keys and Keycards

    E-Print Network [OSTI]

    Sridhar, Srinivas

    department is responsible for the total cost of lock changes and new keys/cards to secure areas compromised has been compromised, and avoid potentially significant costs due to theft, vandalism, or excessive be given access to keys/cards that permit entry to buildings and locked spaces on the University campuses

  1. Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the observed set of round subkeys in memory (computed via the cipher's key schedule operation), which were, for transparent en- cryption and decryption of data. One could apply the method from [9] to obtain the computer

  2. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  3. NAME GRAD'NG KEY .

    E-Print Network [OSTI]

    MA 165 EXAM 3 Fall 2002 Page 1/4. NAME GRAD'NG KEY . Page 1 / 18. STUDENT ID Page 2 / 32. Page 3 /18. RECITATION INSTRUCTOR. Page 4 / 32.

  4. Diversity & Flexibility Key to Sustainability | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Diversity & Flexibility Key to Sustainability Diversity & Flexibility Key to Sustainability Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting...

  5. PowerPoint Presentation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of low, medium, and high densities (4500 RPM) Sedimentation in centrifugal microfluidics Key Advantages * Fast: Sample-to-answer in <15 min * Inexpensive: <0.10 per...

  6. Key China Energy Statistics 2012

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  7. Key China Energy Statistics 2011

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  8. Key Issues | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKey

  9. Key Steps | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKeyKey Steps

  10. Architecture BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Architecture BA (Hons) Key details Duration: 4 years (honours degree) Delivery type: Day Intake in the subject of Architecture, including a portfolio of Design, Technical and Theoretical courses covering all aspects of Architectural Theory and Practice. The course has been designed with reference to the RIBA

  11. INFORMATION: THE KEY TO SUSTAINABILITY

    E-Print Network [OSTI]

    Bateman, Ian J.

    of construction and demolition wastes and the introduction of demolition plans. Examples of information sources in the UK, Europe and the US are provided. Key words: waste management, construction, demolition, secondary sector so are concerned with re-use and recycling construction and demolition waste (C & D). However many

  12. Few-key Text Entry Revisited: Mnemonic Gestures on Four Keys

    E-Print Network [OSTI]

    Wobbrock, Jacob O.

    of Roman letters for high learnability. We compare this new 4-key method to predominant 3-key and 5-key present a new 4-key method that relies on mnemonic gestures reminiscent of Roman letters. Our method-key methods rely on two keys to move a selector left and right and a third key to select a letter. Although

  13. Identify key design elements of desired function

    E-Print Network [OSTI]

    Nawroth, Janna C.

    DESIGN Identify key design elements of desired function Identify functionally equivalent implementation of key design elements (e.g. structure, physiology, kinematics etc.) Quantify functional and standardize fabrication for repeatability . Test phase: Quantify implementation of key design elements

  14. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key

  15. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

  16. Key Opportunities and Challenges for Program Sustainability ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  17. PowerPoint Presentation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for medical point of care diagnostics and drug delivery Ronen Polsky Department of Biosensors and Nanomaterials February 25, 2015 Sandia MedTech Showcase Sandia National...

  18. PowerPoint Presentation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System (RapiDx) * Portable microfluidic in vitro diagnostic instrument for cancer and infectious disease biomarkers in human biological samples * Point-of-Care...

  19. PowerPoint Presentation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    optic links will replace many hardwire connections - Remotely programmable set-points and monitoring for each klystron cart - Klystron collector over-temperature protection will...

  20. Web points of interest

    E-Print Network [OSTI]

    Web points of interest ... JUGGLING CLUB; The Lafayette Citizens Band Home Page; Harold Boas' incredible list of math and life resources on the WEB.

  1. Microsoft PowerPoint - DOE O 413 3B Brief v9 with key points in notes [Read-Only]

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996How to Apply forNavalReginald Agunwah

  2. Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs

    E-Print Network [OSTI]

    Prasanna, Viktor K.

    Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs Kiran Kumar Matam, prasanna}@usc.edu Abstract--Energy efficiency has emerged as one of the key performance metrics in scientific computing. In this work, we evaluate the energy efficiency of floating point matrix multipli

  3. Key Activities | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey

  4. Key Terms | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | International NuclearKaren AtkinsonAbout the FuelKey

  5. MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS

    E-Print Network [OSTI]

    Gao, Shuhong

    MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS SHUHONG GAO AND RAYMOND HEINDL for multivariate public key cryptosystems, which combines ideas from both triangular and oil-vinegar schemes. We the framework. 1. Introduction 1.1. Multivariate Public Key Cryptography. Public key cryptography plays

  6. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  7. Indirect L to T point optical transition in bismuth nanowires

    E-Print Network [OSTI]

    Levin, A. J.

    An indirect electronic transition from the L point valence band to the T point valence band has been previously observed in Bi nanowires oriented along the [011? 2] crystalline direction (used by Black et al. and by Reppert ...

  8. Hash-based Multivariate Public Key Cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Hash-based Multivariate Public Key Cryptosystems WANG Hou-Zhen and ZHANG Huan-Guo The Key for the traditional multivariate public key cryp- tosystems. For example, the signature scheme SFLASH was broken. at ASIACRYPTO'09. Most multivariate schemes known so far are insecure, except maybe the sigature schemes UOV

  9. Feasibility of underwater free space quantum key distribution

    E-Print Network [OSTI]

    Peng Shi; Shi-Cheng Zhao; Wen-Dong Li; Yong-Jian Gu

    2014-04-04

    We investigate the optical absorption and scattering properties of underwater media pertinent to our underwater free space quantum key distribution (QKD) channel model. With the vector radiative transfer theory and Monte Carlo method, we obtain the attenuation of photons, the fidelity of the scattered photons, the quantum bit error rate and the sifted key generation rate of underwater quantum communication. It can be observed from our simulations that the most secure single photon underwater free space QKD is feasible in the clearest ocean water.

  10. UCL INSTITUTE FOR RISK AND DISASTER REDUCTION WHY CANCUN MARKS A KEY TURNING POINT

    E-Print Network [OSTI]

    Guillas, Serge

    was underlined most recently by an International Energy Agency (IEA) report last month on the trend of increasing- Committee of the Committee on Climate Change; and China's scientific agencies and seriously begin of political, economic and technical approaches to climate change policy across the world, it may now

  11. The ROSAT HRI Point Spread Function

    E-Print Network [OSTI]

    Peter Predehl; Almudena Prieto

    2001-09-28

    A sample of the brightest point-like sources observed with the ROSAT-HRI were analysed to asses on the intrinsic shape of the ROSAT-HRI Point Spread Function (PSF). Almost all of the HRI observations collected during the ROSAT lifetime are found to be artificially broadened by factors up two ~2 due to residual errors in the ROSAT aspect solution. After correction by departing pointing positions, the width of the core of the PSF is found to be less than 5 arcsec (half energy width, HEW). On the basis of these results, an improved analytical representation of the ROSAT-HRI PSF is provided. However, for most of the new observations the source countrate is too weak to allow reliable recovering pf the ROSAT-HRI resolution. Therefore, a series of examples (data, correction, and theoretical PSF) are given in order to help the ROSAT user in determining whether "his/her source" is extended or not.

  12. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  13. Wind Vision: Analysis Highlights and Key Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Highlights and Key Results Eric Lantz (NREL) Ryan Wiser (LBNL) July 15, 2015 2 | Wind and Water Power Technologies Office eere.energy.gov Presentation Overview Wind...

  14. Monroe County Extension Services Key West Office

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    potable water is pumped to the Keys from the mainland through a 130-mile long transmission line irrigation and fertilizer, and are more

  15. Unifying classical and quantum key distillation

    E-Print Network [OSTI]

    Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

    2007-02-28

    Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

  16. Nanotexturing of surfaces to reduce melting point.

    SciTech Connect (OSTI)

    Garcia, Ernest J.; Zubia, David; Mireles, Jose; Marquez, Noel; Quinones, Stella

    2011-11-01

    This investigation examined the use of nano-patterned structures on Silicon-on-Insulator (SOI) material to reduce the bulk material melting point (1414 C). It has been found that sharp-tipped and other similar structures have a propensity to move to the lower energy states of spherical structures and as a result exhibit lower melting points than the bulk material. Such a reduction of the melting point would offer a number of interesting opportunities for bonding in microsystems packaging applications. Nano patterning process capabilities were developed to create the required structures for the investigation. One of the technical challenges of the project was understanding and creating the specialized conditions required to observe the melting and reshaping phenomena. Through systematic experimentation and review of the literature these conditions were determined and used to conduct phase change experiments. Melting temperatures as low as 1030 C were observed.

  17. ARM - Point Reyes News

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Comments?govInstrumentsnoaacrnBarrow, Alaska OutreachCalendar NSAProductsMergedProductsVaisala CL51CaliforniaPoint

  18. On multivariate signatureonly public key cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On multivariate signature­only public key cryptosystems Nicolas T. Courtois 1,2 courtois we argument that the problem has many natural solutions within the framework of the multivariate cryptography. First of all it seems that virtually any non­injective multivariate public key is inherently

  19. Deniable Internet Key Exchange Andrew C. Yao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Deniable Internet Key Exchange Andrew C. Yao Frances F. Yao Yunlei Zhao§ Bin Zhu¶ Abstract In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following of privacy protection (especially for E-commerce over Internet), this work is naturally of practical interest

  20. Air Observe System

    E-Print Network [OSTI]

    Alexander Bolonkin

    2007-01-10

    This manuscript contains a description and basic principles for observing inaccessible areas using low cost, easily deployed equipment. The basic premise is to suspend a tiny video camera at an altitude of 10 - 200 meters over the area to be surveyed. The TV camera supports at altitude by wind or balloon. The technical challenges regard the means by which the camera is suspended. Such a system may be used by military or police forces or by civil authorities for rescue missions or assessment of natural disasters. The method may be further developed for military applications by integrating the surveillance task with deployment of munitions. Key words: air observer, air suspended system, low altitude video observer.

  1. Field test of the wavelength-saving quantum key distribution network

    E-Print Network [OSTI]

    Shuang Wang; Wei Chen; Zhen-Qiang Yin; Yang Zhang; Tao Zhang; Hong-Wei Li; Fang-Xing Xu; Zheng Zhou; Yang Yang; Da-Jun Huang; Li-Jun Zhang; Fang-Yi Li; Dong Liu; Yong-Gang Wang; Guang-Can Guo; Zheng-Fu Han

    2012-03-20

    We propose a wavelength-saving topology of quantum key distribution(QKD) network based on passive optical elements, and report the field test of this network on the commercial telecom optical fiber. In this network, 5 nodes are supported with 2 wavelengths, and every two nodes can share secure keys directly at the same time. All QKD links in the network operate at the frequency of 20 MHz. We also characterized the insertion loss and crosstalk effects on the point-to-point QKD system after introducing this QKD network.

  2. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  3. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  4. Key Renewable Energy Opportunities for Oklahoma Tribes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKeyKEY

  5. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  6. Civil Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Civil Engineering BEng (Hons) Key details Duration: Full-time: 4 years (BEng Hons) Delivery type engineering disciplines of Structures, Geotechnics, Water Engineering and Transportation Engineering civil or structural engineers. After graduation, students are equipped to work for consultants

  7. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  8. Florida Nuclear Profile - Turkey Point

    U.S. Energy Information Administration (EIA) Indexed Site

    Turkey Point" "Unit","Summer capacity (mw)","Net generation (thousand mwh)","Summer capacity factor (percent)","Type","Commercial operation date","License expiration date"...

  9. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  10. Mechanical Engineering BEng / BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Mechanical engineers play key roles in all industrial sectors, from aerospace and oil and gas, through food for Mechanical Engineering graduates in many sectors, including power production, oil and petrochemicals, manufacturing, power plant, medical engineering and many others l Whatever your final career path, developing

  11. Fashion Marketing & Retailing BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Fashion Marketing & Retailing BA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (BA Hons) Delivery type: Day Intake date: September Fees: 54000 AED per year Overview Our Fashion Marketing and Retailing programme confidently prepares students for a career within the marketing and retailing industry

  12. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Duren, Mike

    2012-01-01

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  13. Organisational Change -Key Steps LocalCollege/

    E-Print Network [OSTI]

    Botea, Adi

    Resources Division START Version 1.0 X:\\Employment Strategies\\Workplace Change & Innovation\\Change Management Frameworks\\Change Management - Key Steps 021111.vsd FINISH NOTES: * For information on formal vs informal change refer to the managing change clause in the ANU Enterprise Agreement and the managing change policy

  14. Chemical Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Chemical Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng Hons) Delivery type: Day Intake date: September Fees: 58000 AED per year Overview Chemical engineering successful and thriving types of business in the world. Chemical engineers play a vital role in achieving

  15. Management strategies for endangered Florida Key deer 

    E-Print Network [OSTI]

    Peterson, Markus Nils

    2004-09-30

    species. These data were used to address my study objectives. I found the most commonly cited FSR (2.67:1, male:female) for Florida Key deer to be inaccurate. A male biased FSR of 1.45:1 was more probable. Modified drop and drive nets were appropriate...

  16. Psychology with Management BSc (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Psychology with Management BSc (Hons) Key details Duration: Full-time: 4 years Delivery type: Day% Psychology with 25% Business and Management modules. Psychology modules cover a range of core approaches to psychology as well as research design and analysis and applied specialist topics. The curriculum is based

  17. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  18. Business Management BA / MA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Business Management BA / MA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (MSc Management degree programme follows a number of guiding principles that mirror the values of managers of leading organisations and reflect current business management thinking. In the first two years of all

  19. Vermont's Changing Forests Key Findings on the

    E-Print Network [OSTI]

    Keeton, William S.

    1 Vermont's Changing Forests Key Findings on the Health of Forested Ecosystems from the Vermont Members Anne Archie, USDA Forest Service Douglas Lantagne, University of Vermont Ed O'Leary, Vermont, USDA Farm Service Agency Charles Scott, USDA Forest Service Steven Sinclair, Vermont Agency of Natural

  20. Automotive Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Automotive Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng programme, but allows students in the later years to specialise in subjects relating to automotive technology. Automotive engineering continues to be a major employer of professional engineers, owing

  1. CAREER RESOURCES Canadian Key Business Directory

    E-Print Network [OSTI]

    Thompson, Michael

    CAREER RESOURCES BOOKS Canadian Key Business Directory - Includes the largest companies in Canada companies - Search by name, geography, SIC code and more! - Online version available through library: http://www.jobsetc.gc.ca/eng/ - Training, career and worker information - Career Exploration resources

  2. NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues

    E-Print Network [OSTI]

    NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues Cem Kaner, J.D., Ph.D., ASQ-CQE November 1999 Contact Information: kaner@kaner.com www.kaner.com (testing November 1999 Cem Kaner Page 2 UCITA? Huh?UCITA? Huh? · Uniform Computer Information Transactions Act

  3. Directional emission from an optical microdisk resonator with a point scatterer

    E-Print Network [OSTI]

    Dettmann, Carl

    OFFPRINT Directional emission from an optical microdisk resonator with a point scatterer C. P www.epljournal.org doi: 10.1209/0295-5075/82/34002 Directional emission from an optical microdisk quality factors and highly directional light emission. The key idea is to place a point scatterer inside

  4. Wave Energy Converter Design Tool for Point Absorbers with Arbitrary Device Geometry Kelley Ruehl

    E-Print Network [OSTI]

    Siefert, Chris

    Wave Energy Converter Design Tool for Point Absorbers with Arbitrary Device Geometry Kelley Ruehl University Corvallis, OR, USA ABSTRACT In order to promote and support the wave energy industry, a Wave strategies. KEY WORDS: wave energy; point absorber; time-domain; design tool. INTRODUCTION Wave Energy

  5. Modeling and simulation of martensitic phase transitions with a triple point

    E-Print Network [OSTI]

    Zimmer, Johannes

    point of Zirconia (ZrO2), where tetragonal, orthorhombic (orthoI) and monoclinic phases are stable is then fitted to the avail- able elastic moduli of Zirconia in this two-dimensional setting. First, we use constructed here demonstrate the pattern formation in Zirconia at the triple point. Key words: A

  6. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

  7. Identification of Key Barriers in Workforce Development

    SciTech Connect (OSTI)

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  8. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  9. Rapid Compression Machine ? A Key Experimental Device to Effectively...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compression Machine A Key Experimental Device to Effectively Collaborate with Basic Energy Sciences Rapid Compression Machine A Key Experimental Device to Effectively...

  10. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  11. Single, Key Gene Discovery Could Streamline Production of Biofuels...

    Energy Savers [EERE]

    Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

  12. Building America Expert Meeting: Key Innovations for Adding Energy...

    Energy Savers [EERE]

    Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance...

  13. Thailand-Key Results and Policy Recommendations for Future Bioenergy...

    Open Energy Info (EERE)

    Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future...

  14. Technology Key to Harnessing Natural Gas Potential | Department...

    Office of Environmental Management (EM)

    Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa...

  15. Key Energy-Saving Projects for Smaller Facilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Energy-Saving Projects for Smaller Facilities Key Energy-Saving Projects for Smaller Facilities This presentation discusses how smaller industrial facilities can save energy...

  16. Dynamic trapping near a quantum critical point

    E-Print Network [OSTI]

    Michael Kolodrubetz; Emanuel Katz; Anatoli Polkovnikov

    2015-03-02

    The study of dynamics in closed quantum systems has recently been revitalized by the emergence of experimental systems that are well-isolated from their environment. In this paper, we consider the closed-system dynamics of an archetypal model: spins near a second order quantum critical point, which are traditionally described by the Kibble-Zurek mechanism. Imbuing the driving field with Newtonian dynamics, we find that the full closed system exhibits a robust new phenomenon -- dynamic critical trapping -- in which the system is self-trapped near the critical point due to efficient absorption of field kinetic energy by heating the quantum spins. We quantify limits in which this phenomenon can be observed and generalize these results by developing a Kibble-Zurek scaling theory that incorporates the dynamic field. Our findings can potentially be interesting in the context of early universe physics, where the role of the driving field is played by the inflaton or a modulus.

  17. Focusing: coming to the point in metamaterials

    E-Print Network [OSTI]

    Sebastien Guenneau; Andre Diatta; Ross McPhedran

    2010-09-02

    The point of the paper is to show some limitations of geometrical optics in the analysis of subwavelength focusing. We analyze the resolution of the image of a line source radiating in the Maxwell fisheye and the Veselago-Pendry slab lens. The former optical medium is deduced from the stereographic projection of a virtual sphere and displays a heterogeneous refractive index n(r) which is proportional to the inverse of 1+r^2. The latter is described by a homogeneous, but negative, refractive index. It has been suggested that the fisheye makes a perfect lens without negative refraction [Leonhardt, Philbin arxiv:0805.4778v2]. However, we point out that the definition of super-resolution in such a heterogeneous medium should be computed with respect to the wavelength in a homogenized medium, and it is perhaps more adequate to talk about a conjugate image rather than a perfect image (the former does not necessarily contains the evanescent components of the source). We numerically find that both the Maxwell fisheye and a thick silver slab lens lead to a resolution close to lambda/3 in transverse magnetic polarization (electric field pointing orthogonal to the plane). We note a shift of the image plane in the latter lens. We also observe that two sources lead to multiple secondary images in the former lens, as confirmed from light rays travelling along geodesics of the virtual sphere. We further observe resolutions ranging from lambda/2 to nearly lambda/4 for magnetic dipoles of varying orientations of dipole moments within the fisheye in transverse electric polarization (magnetic field pointing orthogonal to the plane). Finally, we analyse the Eaton lens for which the source and its image are either located within a unit disc of air, or within a corona 1

  18. Points

    Broader source: Energy.gov (indexed) [DOE]

    (Fluidic Energy, Inc.) 5,133,150 Tempe, AZ Energy Storage A new class of metal-air batteries using ionic liquids, with many times the energy density of today's lithium-ion...

  19. Take Home Points Horticultural Prospective

    E-Print Network [OSTI]

    Ma, Lena

    HLB Take Home Points Horticultural Prospective Stephen H. Futch Extension Agent, Multi County Co plants, ACP adults preferentially light on infected within first 48 hour but on uninfected after 7 days

  20. Introduction to the fifth Mars Polar Science special issue: Key questions, needed observations, and recommended investigations

    E-Print Network [OSTI]

    Byrne, Shane

    relative accessibility, the presence of some of the world's leading experts in permafrost, glacial history of the polar regions, including: the ages of the polar deposits, their melting and flow histories

  1. SATELLITE ALTIMETRY AND KEY OBSERVATIONS: WHAT WE'VE LEARNED, AND WHAT'S POSSIBLE WITH NEW TECHNOLOGIES

    E-Print Network [OSTI]

    Ferrari, Raffaele

    -0230, USA, sgille@ucsd.edu: (9) Department of Mechanical and Aerospace Engineering, Arizona State University]. At present a constellation of flying satellite missions routinely provides sea level anomaly, sea winds, sea tracks [2] with wide gaps in between. Fortuitously computing power kept pace allowing basin scale

  2. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  3. Another key Y-12 General Foreman remembered

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TAPropaneandAn319Another key Y-12 General Foreman

  4. Keyes, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLCKeyes,

  5. NERSC.COE.key.actions-4.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on77 PAGEMissionStressMoveMuncriefB ONERSCNERSC8 CoE Key Actions

  6. Composite keys? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlusComposite keys? Home >

  7. Fermilab | Science | Particle Physics | Key Discoveries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find whatGasEnergyfeature photo featureParticleDark matterKey

  8. Key Agency Targets Summary _FY 2012_.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5 B

  9. Key Actions for Optimizing for KNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin Morris Title:AnaKey

  10. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power, IncBio Centers Announcement at theproduceƈ GOAL:Key

  11. Fair Encryption of RSA Keys Guillaume Poupard and Jacques Stern

    E-Print Network [OSTI]

    Stern, Jacques

    based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs

  12. Session-Key Generation using Human Passwords Only Oded Goldreich

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session-Key Generation using Human Passwords Only Oded Goldreich Department of Computer Science present session-key generation protocols in a model where the legitimate parties share only a human assumptions. Keywords: Session-key generation (authenticated key-exchange), mutual authentication proto- cols

  13. SessionKey Generation using Human Passwords Only # Oded Goldreich +

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session­Key Generation using Human Passwords Only # Oded Goldreich + Department of Computer Science present session­key generation protocols in a model where the legitimate parties share only a human setup assumptions. Keywords: Session­key generation (authenticated key­exchange), mutual authentication

  14. The impacts of urbanization on endangered florida key deer 

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12

    of peninsular Florida. Key deer range is restricted to the Lower Florida Keys with approximately 60% residing on Big Pine Key and 15% residing on No Name Key which have undergone rapid human population growth and development over the past 30 years. Urban...

  15. Physical Point Simulation in 2+1 Flavor Lattice QCD

    E-Print Network [OSTI]

    PACS-CS Collaboration; :; S. Aoki; K. -I. Ishikawa; N. Ishizuka; T. Izubuchi; D. Kadoh; K. Kanaya; Y. Kuramashi; Y. Namekawa; M. Okawa; Y. Taniguchi; A. Ukawa; N. Ukita; T. Yamazaki; T. Yoshie

    2010-04-04

    We present the results of the physical point simulation in 2+1 flavor lattice QCD with the nonperturbatively $O(a)$-improved Wilson quark action and the Iwasaki gauge action at $\\beta=1.9$ on a $32^3 \\times 64$ lattice. The physical quark masses together with the lattice spacing is determined with $m_\\pi$, $m_K$ and $m_\\Omega$ as physical inputs. There are two key algorithmic ingredients to make possible the direct simulation at the physical point: One is the mass-preconditioned domain-decomposed HMC algorithm to reduce the computational cost. The other is the reweighting technique to adjust the hopping parameters exactly to the physical point. The physics results include the hadron spectrum, the quark masses and the pseudoscalar meson decay constants. The renormalization factors are nonperturbatively evaluated with the Schr{\\"o}dinger functional method. The results are compared with the previous ones obtained by the chiral extrapolation method.

  16. A Differential Phase Shift Scheme for Quantum Key Distribution in Passive Optical Networks

    E-Print Network [OSTI]

    Michael Hentschel; Andreas Poppe; Bernhard Schrenk; Momtchil Peev; Edwin Querasser; Roland Lieger

    2014-12-19

    We propose a scheme for quantum key distribution (QKD) in a passive optical network (PON) based on differential phase shift (DPS) coding. A centralized station including all expensive components serves many users, making it suitable for a true multi-user network in a local environment with moderate distances on the order of a few kilometers. The emphasis lies on an asymmetric design for cost effective implementation of network end points.

  17. Primordial nucleosynthesis: A cosmological point of view

    SciTech Connect (OSTI)

    Mathews, G. J.; Kusakabe, M.; Cheoun, M.-K.

    2014-05-09

    Primordial nucleosynthesis remains as one of the pillars of modern cosmology. It is the test-ing ground upon which all cosmological models must ultimately rest. It is our only probe of the universe during the first few minutes of cosmic expansion and in particular during the important radiation-dominated epoch. These lectures review the basic equations of space-time, cosmology, and big bang nucleosynthesis. We will then review the current state of observational constraints on primordial abundances along with the key nuclear reactions and their uncertainties. We summarize which nuclear measure-ments are most crucial during the big bang. We also review various cosmological models and their constraints. In particular, we summarize the constraints that big bang nucleosynthesis places upon the possible time variation of fundamental constants, along with constraints on the nature and origin of dark matter and dark energy, long-lived supersymmetric particles, gravity waves, and the primordial magnetic field.

  18. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-06-09

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  19. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-08-31

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  20. Keyed Side-Channel Based Hashing for IP Protection using Wavelets

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    signal feature extraction method, the wavelet transform, to form a keyed side-channel hash function industry, however, has virtually no opportunity to confirm a suspected plagiarism. Products on the market devices emit physically observ- able quantities, for instance the power consumption, electromagnetic

  1. Fluctuations of fragment observables

    E-Print Network [OSTI]

    F. Gulminelli; M. D'Agostino

    2006-11-09

    This contribution presents a review of our present theoretical as well as experimental knowledge of different fluctuation observables relevant to nuclear multifragmentation. The possible connection between the presence of a fluctuation peak and the occurrence of a phase transition or a critical phenomenon is critically analyzed. Many different phenomena can lead both to the creation and to the suppression of a fluctuation peak. In particular, the role of constraints due to conservation laws and to data sorting is shown to be essential. From the experimental point of view, a comparison of the available fragmentation data reveals that there is a good agreement between different data sets of basic fluctuation observables, if the fragmenting source is of comparable size. This compatibility suggests that the fragmentation process is largely independent of the reaction mechanism (central versus peripheral collisions, symmetric versus asymmetric systems, light ions versus heavy ion induced reactions). Configurational energy fluctuations, that may give important information on the heat capacity of the fragmenting system at the freeze out stage, are not fully compatible among different data sets and require further analysis to properly account for Coulomb effects and secondary decays. Some basic theoretical questions, concerning the interplay between the dynamics of the collision and the fragmentation process, and the cluster definition in dense and hot media, are still open and are addressed at the end of the paper. A comparison with realistic models and/or a quantitative analysis of the fluctuation properties will be needed to clarify in the next future the nature of the transition observed from compound nucleus evaporation to multi-fragment production.

  2. Electricity and Development: Global Trends and Key Challenges

    E-Print Network [OSTI]

    ;3. Prospects for Electricity Development Electricity Access Projected Electrification Rates by Region globalElectricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12

  3. Energy Storage: The Key to a Reliable, Clean Electricity Supply...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy...

  4. SOW and Key Performance Parameters (KPP) Handbook Final Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 This handbook provides suggested...

  5. Could Solar Energy Storage be Key for Residential Solar? | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? October 26, 2010 - 4:52pm Addthis This is the silent power storage...

  6. Biology 221 -Fall 2011 Exam number KEY Part 1 (short answer) worth 2 -4 points each (20 % of grade)

    E-Print Network [OSTI]

    Clifton, Ken

    above (circle one)? 2 (3 pts) a) What is the average depth of the ocean? 3,800 m ? b) How deep are the deepest oceanic trenches 11,000 m ? c) In what ocean do most trenches occur Pacific ? 3 (2 pts) Describe depth does this color typically penetrate in clear seawater? 10 m . 5 (2 pts) a) Graph the general

  7. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  8. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  9. Femtosecond photoelectron point projection microscope

    SciTech Connect (OSTI)

    Quinonez, Erik; Handali, Jonathan; Barwick, Brett

    2013-10-15

    By utilizing a nanometer ultrafast electron source in a point projection microscope we demonstrate that images of nanoparticles with spatial resolutions of the order of 100 nanometers can be obtained. The duration of the emission process of the photoemitted electrons used to make images is shown to be of the order of 100 fs using an autocorrelation technique. The compact geometry of this photoelectron point projection microscope does not preclude its use as a simple ultrafast electron microscope, and we use simple analytic models to estimate temporal resolutions that can be expected when using it as a pump-probe ultrafast electron microscope. These models show a significant increase in temporal resolution when comparing to ultrafast electron microscopes based on conventional designs. We also model the microscopes spectroscopic abilities to capture ultrafast phenomena such as the photon induced near field effect.

  10. Master Thesis Group Key Agreement for Ad Hoc Networks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Master Thesis Group Key Agreement for Ad Hoc Networks Lijun Liao Date: 06 July 2005 Supervisor: M their financial support. #12;Abstract Over the last 30 years the study of group key agreement has stimulated much present a Tree-based group key agreement Framework for Ad-hoc Networks (TFAN). TFAN is especially suitable

  11. Distributed Key Generation in the Wild Aniket Kate1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distributed Key Generation in the Wild Aniket Kate1 Yizhou Huang2 Ian Goldberg2 1 Max Planck of Waterloo, Canada aniket@mpi-sws.org, {y226huan, iang}@uwaterloo.ca Abstract Distributed key generation (DKG communication model. computational setting. distributed key generation. uniform randomness. implementation 1

  12. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  13. Leakage-Resilient Cryptography with Key Derived from Sensitive Data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Leakage-Resilient Cryptography with Key Derived from Sensitive Data Konrad Durnoga , Tomasz Kazana subject to adversarial leakage. We propose a method to derive keys for such protocols on-the-fly from the actual keys are derived from. That is, an adversary can hardly gain any knowledge about the private data

  14. Starting Points | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    (M&O) Contract Competition Starting Points Starting Points Kansas City Plant Related Web Pages Summary Kansas City Plant Home Page Kansas City Plant Contracts DOE Directives...

  15. Breaking Points in Quartic Maps

    E-Print Network [OSTI]

    M. Romera; G. Pastor; M. -F. Danca; A. Martin; A. B. Orue; F. Montoya

    2014-12-18

    Dynamical systems, whether continuous or discrete, are used by physicists in order to study non-linear phenomena. In the case of discrete dynamical systems, one of the most used is the quadratic map depending on a parameter. However, some phenomena can depend alternatively of two values of the same parameter. We use the quadratic map $x_{n+1} =1-ax_{n}^{2} $ when the parameter alternates between two values during the iteration process. In this case, the orbit of the alternate system is the sum of the orbits of two quartic maps. The bifurcation diagrams of these maps present breaking points where abruptly change their evolution.

  16. Capital Point | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmentalBowerbank,Cammack Village, Arkansas: EnergyCounty,NewHatteras ElecPoint Jump to:

  17. Points of Contact - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/OPerformancePi Day Pi Day Pi DayPlasmaandAbout UsPoints of

  18. Dependency Calculus Reasoning in a General Point Relation Algebra

    E-Print Network [OSTI]

    Nebel, Bernhard

    of flowing water, we can draw conclusions about pollution at other points (cf. Fig. 1). If pollution is found- pects and complexity results from one algebra to another. If we observe pollution in an ecosystem at D, F is polluted as well. It B C E D F A Figure 1: A pipe network. Flow occurs along the "pipes

  19. Quantum Jet Theory, Observer Dependence, and Multi-dimensional Virasoro algebra

    E-Print Network [OSTI]

    T. A. Larsson

    2009-09-15

    We review some key features of Quantum Jet Theory: observer dependence, multi-dimensional Virasoro algebra, and the prediction that spacetime has four dimensions.

  20. Minimal Riesz energy point configurations for rectifiable d-dimensional manifolds

    E-Print Network [OSTI]

    Hardin, Doug

    , these results are new. Key words: Minimal discrete Riesz energy, Best-packing, Hausdorff measure, Rectifiable best-packing, mini- mization of energy (e.g., Coulomb potentials), spherical t-designs (cubatureMinimal Riesz energy point configurations for rectifiable d-dimensional manifolds D.P. Hardin

  1. MATERIAL POINT METHOD CALCULATIONS WITH EXPLICIT CRACKS, FRACTURE PARAMETERS, AND CRACK

    E-Print Network [OSTI]

    Nairn, John A.

    MATERIAL POINT METHOD CALCULATIONS WITH EXPLICIT CRACKS, FRACTURE PARAMETERS, AND CRACK PROPAGATION." This new method has several advantages for numerical work on fracture. Compared to finite element analysis works well for calculating key fracture parameters such as J integral, stress intensity factors

  2. Updated distribution and reintroduction of the Lower Keys marsh rabbit 

    E-Print Network [OSTI]

    Faulhaber, Craig Alan

    2005-02-17

    , for their advice and interest in the project. Kim Rohrs of the Monroe County Department of Planning and Environmental Resources provided valuable spatial and tabular data on land ownership and land-use planning in the Keys. My interns, Josh Harris, Kyle........................ 29 3.1 The number of individual Lower Keys marsh rabbits captured in 13 occupied populations on 4 keys from October 2001?August 2002. Data are arranged according to sex and age class...

  3. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  4. Deputy Secretary Sherwood-Randall Meets Key Government Officials...

    Broader source: Energy.gov (indexed) [DOE]

    Pritzker and Deputy Secretary Sherwood-Randall had the opportunity to engage with key Chinese government officials while in Beijing. Both met with Premier Li Keqiang and Vice...

  5. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Climate Action Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment...

  6. California Energy Incentive Programs An Annual Update on Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Issues and Financial Opportunities for Federal Sites in California California Energy Incentive Programs An Annual Update on Key Energy Issues and Financial Opportunities...

  7. Intercropped silviculture systems, a key to achieving soil fungal...

    Office of Scientific and Technical Information (OSTI)

    Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations Citation Details In-Document Search Title: Intercropped...

  8. Strategic Energy Management.  Keys to Behavioral and Operational Change.

    E-Print Network [OSTI]

    Kroll, Ryan M; Willems, Phil; Rubado, Dan; Belkhayat, Kathleen

    2015-01-01

    Strategic Energy Management Keys to Behavioral andof Oregon’s Strategic Energy Management (SEM) initiative.Introduction Strategic energy management (SEM) is defined

  9. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  10. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  11. Far-infrared Point Sources

    E-Print Network [OSTI]

    B. Guiderdoni

    1999-03-08

    The analysis of the submm anisotropies that will be mapped by the forthcoming MAP and PLANCK satellites requires careful foreground subtraction before measuring CMB fluctuations. Among these, the foreground due to IR/submm thermal radiation from dusty sources was poorly known until recent observational breakthroughs began unveiling the properties of these objects. We hereafter briefly review the observational evidence for a strong evolution of IR/submm sources with respect to the local universe explored by IRAS. We present the basic principles of a new modeling effort where consistent spectral energy distributions of galaxies are implemented into the paradigm of hierarchical clustering with the fashionable semi-analytic approach. This model provides us with specific predictions in IR/submm wavebands, that seem to reproduce the current status of the observations and help assessing the capabilities of forthcoming instruments to pursue the exploration of the deep universe at IR/submm wavelengths. Finally, the ability of the PLANCK High Frequency Instrument all-sky survey to produce a catalogue of dusty sources at submm wavelengths is briefly described.

  12. Complete Chaotic Mixing in an Electro-osmotic Flow by Destabilization of Key Periodic Pathlines

    E-Print Network [OSTI]

    R. Chabreyrie; C. Chandre; P. Singh; N. Aubry

    2011-02-07

    The ability to generate complete, or almost complete, chaotic mixing is of great interest in numerous applications, particularly for microfluidics. For this purpose, we propose a strategy that allows us to quickly target the parameter values at which complete mixing occurs. The technique is applied to a time periodic, two-dimensional electro-osmotic flow with spatially and temporally varying Helmoltz-Smoluchowski slip boundary conditions. The strategy consists of following the linear stability of some key periodic pathlines in parameter space (i.e., amplitude and frequency of the forcing), particularly through the bifurcation points at which such pathlines become unstable.

  13. Dithering Strategies and Point-Source Photometry

    E-Print Network [OSTI]

    Samsing, Johan

    2011-01-01

    Strategies and Point-Source Photometry Johan Samsing DARK-The accuracy in the photometry of a point source depends onobjects in a single source photometry (Lauer 1999a) and the

  14. VOLUMETRIC SNAPPING: WATERTIGHT TRIANGULATION OF POINT CLOUDS

    E-Print Network [OSTI]

    Floater, Michael S.

    VOLUMETRIC SNAPPING: WATERTIGHT TRIANGULATION OF POINT CLOUDS Tim Volodine KULeuven, Department: meshing, surface reconstruction, volumetric grid, contouring, point clouds. Abstract: We propose, a volumetric method that does not rely on a signed distance function was proposed recently by Hornung

  15. Other Purdue Web points of Interest

    E-Print Network [OSTI]

    Other Purdue Web points of interest. Purdue University Home Page --- Schedule of Classes · Graduate School · Agronomy · Computer Science --- CS & E ...

  16. CenterPoint Energy New Homes Program

    Broader source: Energy.gov [DOE]

    Note: This program is only available to electric Customers in CenterPoint Energy's service territory (greater Houston area, Texas).

  17. AES Flow Interception : Key Snooping Method on Virtual Machine.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES for snooping AES en- cryption key on Virtual Machine Monitor (VMM), and we present coun- termeasures against. In general, the virtualization technology composes two software parts: one is vir- tual machine (VM

  18. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  19. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  20. A Distributed Public Key Caching Scheme in Large Wireless Networks

    E-Print Network [OSTI]

    Deng, Jing

    -constrained, in terms of computational power, battery energy, and on-board memory space. For example, the prototypeA Distributed Public Key Caching Scheme in Large Wireless Networks Yuan Kong Jing Deng Stephen R in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate

  1. Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme P. Scholl and N.P. Smart scheme was the slow key generation process. Gentry and Halevi provided a fast technique for 2-power cyclo. In particular they focused on the field generated by the polynomial F(X) = X2n + 1, but they noted

  2. Zero-one laws for connectivity in random key graphs

    E-Print Network [OSTI]

    Yagan, Osman

    with the random key predistribution scheme of Eschenauer and Gligor for wireless sensor networks. For this class which are more realistic for applications to wireless sensor networks. Keywords: Wireless sensor- dom key predistribution for wireless sensor networks (WSNs) [6], [7], [9]. For the sake

  3. Baton: Key Agility for Android without a Centralized Certificate Infrastructure

    E-Print Network [OSTI]

    Van Oorschot, Paul

    Baton: Key Agility for Android without a Centralized Certificate Infrastructure David Barrera,dmccarney}@ccsl.carleton.ca {clark,paulv}@scs.carleton.ca ABSTRACT Android's trust-on-first-use application signing model asso transfer signing au- thority to a new signing key. Our proposal, Baton, modifies Android's app installation

  4. Comparative Analysis of Software Libraries for Public Key Cryptography

    E-Print Network [OSTI]

    Gaj, Krzysztof

    Comparative Analysis of Software Libraries for Public Key Cryptography Ashraf Abusharekh1 and Kris libraries implementing such operations exist both commercially and in the public domain, in this paper, we, using performance and support of public key primitive operations. The performance of all libraries

  5. k-Connectivity in Random Key Graphs with Unreliable Links

    E-Print Network [OSTI]

    Yagan, Osman

    of Eschenauer and Gligor for securing wireless sensor network (WSN) communications. Random key graphs have real-world networks; e.g., with secure WSN application in mind, link unreliability can be attributed for securing WSN communications is the random predistribution of cryptographic keys to sensor nodes

  6. Wireless sensor networks under the random pairwise key predistribution scheme

    E-Print Network [OSTI]

    Yagan, Osman

    Wireless sensor networks under the random pairwise key predistribution scheme: Can resiliency, College Park, MD 20742. Email: armand@isr.umd.edu Abstract--We investigate the resiliency of wireless the classical key predistribution scheme of Eschenauer and Gligor. Keywords: Wireless sensor networks, Security

  7. CX Lyrae 2008 Observing Campaign

    E-Print Network [OSTI]

    de Ponthiere, Pierre; Hambsch, Franz-Josef

    2012-01-01

    The Blazhko effect in CX Lyr has been reported for the first time by Le Borgne et al. (2007). The authors have pointed out that the Blazhko period was not evaluated accurately due to dataset scarcity. The possible period values announced were 128 or 227 days. A newly conducted four-month observing campaign in 2008 (fifty-nine observation nights) has provided fourteen times of maximum. From a period analysis of measured times of maximum, a Blazhko period of 62 +/- 2 days can be suggested. However, the present dataset is still not densely sampled enough to exclude that the measured period is still a modulation of the real Blazhko period. Indeed the shape of the (O-C) curve does not repeat itself exactly during the campaign duration.

  8. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  9. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  10. Energy dissipation in magnetic null points at kinetic scales

    E-Print Network [OSTI]

    Olshevsky, Vyacheslav; Eriksson, Elin; Markidis, Stefano; Lapenta, Giovanni

    2015-01-01

    We use kinetic particle-in-cell and magnetohydrodynamic simulations supported by an observational dataset to investigate magnetic reconnection in clusters of null points in space plasma. The magnetic configuration under investigation is driven by fast adiabatic flux rope compression that dissipates almost half of the initial magnetic field energy. In this phase powerful currents are excited producing secondary instabilities, and the system is brought into a state of `intermittent turbulence' within a few ion gyro-periods. Reconnection events are distributed all over the simulation domain and energy dissipation is rather volume-filling. Numerous spiral null points interconnected via their spines form null lines embedded into magnetic flux ropes; null point pairs demonstrate the signatures of torsional spine reconnection. However, energy dissipation mainly happens in the shear layers formed by adjacent flux ropes with oppositely directed currents. In these regions radial null pairs are spontaneously emerging an...

  11. Remarks on a fixed point theorem of Caristi 

    E-Print Network [OSTI]

    Egle, David Lee

    1977-01-01

    ) = u and f(v) = v. Then, d(u, v) = d(f(u), f(v)) & o(d(u, f(u) + d(v, f(v))) = 0. 13 Thus, u = v and the fixed point is unique. The convergence of any sequence of i terates follows from the observation following Theorem 1. 3. & The concept of a... of the fixed point follows directly from the uniqueness of the fixed point for fn(u) Let x c X. Let s(x) = max (d(f (x), u) : j = 0, 1, . . . , (n(u)-l)). For m sufficiently large, write m = p n(u) + q, where 0 & q & n(u), p & 0. Then d(f (x, u) = d(f...

  12. Photovoltaics R&D: At the Tipping Point

    SciTech Connect (OSTI)

    Kazmerski, L. L.

    2005-01-01

    '' . . . with robust investments in research and market development, the picture changes dramatically.'' Thus, the realigned U.S. Photovoltaic Industry Roadmap highlights R&D as critical to the tipping point that will make solar photovoltaics (PV) significant in the U.S. energy portfolio--part of a well-designed plan that would bring ''2034 expectations'' to reality by 2020. Technology improvement and introduction depend on key, focused, and pertinent research contributions that range from the most fundamental through the applied. In this paper, we underscore the successes and relevance of our current systems-driven PV R&D programs, which are built on integrated capabilities. These capabilities span atomic-level characterization, nanotechnology, new materials design, interface and device engineering, theoretical guidance and modeling, processing, measurements and analysis, and process integration. This presentation identifies and provides examples of critical research tipping points needed to foster now and near technologies (primarily crystalline silicon and thin films) and to introduce coming generations of solar PV that provide options to push us to the next performance levels (devices with ultra-high efficiencies and with ultra-low cost). The serious importance of science and creativity to U.S. PV technology ownership--and the increased focus to accelerate the time from laboratory discovery to industry adoption--are emphasized at this ''tipping point'' for solar PV.

  13. Critical point analysis of phase envelope diagram

    SciTech Connect (OSTI)

    Soetikno, Darmadi; Siagian, Ucok W. R.; Kusdiantara, Rudy Puspita, Dila Sidarto, Kuntjoro A. Soewono, Edy; Gunawan, Agus Y.

    2014-03-24

    Phase diagram or phase envelope is a relation between temperature and pressure that shows the condition of equilibria between the different phases of chemical compounds, mixture of compounds, and solutions. Phase diagram is an important issue in chemical thermodynamics and hydrocarbon reservoir. It is very useful for process simulation, hydrocarbon reactor design, and petroleum engineering studies. It is constructed from the bubble line, dew line, and critical point. Bubble line and dew line are composed of bubble points and dew points, respectively. Bubble point is the first point at which the gas is formed when a liquid is heated. Meanwhile, dew point is the first point where the liquid is formed when the gas is cooled. Critical point is the point where all of the properties of gases and liquids are equal, such as temperature, pressure, amount of substance, and others. Critical point is very useful in fuel processing and dissolution of certain chemicals. Here in this paper, we will show the critical point analytically. Then, it will be compared with numerical calculations of Peng-Robinson equation by using Newton-Raphson method. As case studies, several hydrocarbon mixtures are simulated using by Matlab.

  14. Zero point energy on extra dimension: Noncommutative Torus

    E-Print Network [OSTI]

    S. Fabi; B. Harms; G. Karatheodoris

    2007-04-25

    In this paper we calculate the zero point energy density experienced by observers on M^4 due to a massless scalar field defined throughout M^4 x T^2_F, where T^2_F are fuzzy extra dimensions. Using the Green's function approach we calculate the energy density for the commutative torus and the fuzzy torus. We calculate then the energy density for the fuzzy torus using the Hamiltonian approach. Agreement is shown between Green's function and Hamiltonian approaches.

  15. Key Facts about Argonne National Laboratory | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKeyKey

  16. Observations of Edge Turbulence

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Edge Turbulence near the X-point of Alcator C-Mod APS-2007 (1) J.L. Terry, S.J. Zweben*, B. LaBombard, I. Cziegler, O. Grulke + , D.P. Stotler* MIT - Plasma Science and Fusion...

  17. If physics is an information science, what is an observer?

    E-Print Network [OSTI]

    Chris Fields

    2012-02-11

    Interpretations of quantum theory have traditionally assumed a "Galilean" observer, a bare "point of view" implemented physically by a quantum system. This paper investigates the consequences of replacing such an informationally-impoverished observer with an observer that satisfies the requirements of classical automata theory, i.e. an observer that encodes sufficient prior information to identify the system being observed and recognize its acceptable states. It shows that with reasonable assumptions about the physical dynamics of information channels, the observations recorded by such an observer will display the typical characteristics predicted by quantum theory, without requiring any specific assumptions about the observer's physical implementation.

  18. Fast Gaussian Process Methods for Point Process Intensity Estimation John P. Cunningham JCUNNIN@STANFORD.EDU

    E-Print Network [OSTI]

    Columbia University

    time requirements. We demonstrate problem specific methods for a class of renewal processes coupled with point process observation models. The problem of intensity estimation then becomes not address the appropriateness of doubly-stochastic point pro- cess models for particular applications

  19. LONG EXPOSURE POINT SPREAD FUNCTION ESTIMATION FROM SOLAR ADAPTIVE OPTICS LOOP DATA

    E-Print Network [OSTI]

    Astronomer, National Solar Observatory, New Mexico, USA Dr. Haimin Wang, Dissertation Co-Advisor DateABSTRACT LONG EXPOSURE POINT SPREAD FUNCTION ESTIMATION FROM SOLAR ADAPTIVE OPTICS LOOP DATA during solar observations due to the lack of point sources in the field-of-view. Moreover, the highly

  20. PURE STRATEGY NASH EQUILIBRIUM POINTS AND THE LEFSCHETZ FIXED POINT THEOREM

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    PURE STRATEGY NASH EQUILIBRIUM POINTS AND THE LEFSCHETZ FIXED POINT THEOREM by Leigh Tesfatsion of Minnesota Minneapolis, Minnesota 55455 #12;ABSTRAcr A pure strategy Nash equilibrium point existence theorem cases of the existence theorem are also discussed. #12;PURE STRATEGY NASH EQUILIBRIUM POINTS

  1. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  2. OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts!

    E-Print Network [OSTI]

    OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts! Eyestalk mouth antenna cheliped CURRICULUM Name: _____________________ Fun Crab Facts! Eyestalk Mouth Antenna Cheliped Carapace Walking metamorphosis motorcycle exoskeleton omnivores butterfly pea #12;OIMB GK12 CURRICULUM Masked crab Fiddler crab

  3. EnergySmart Schools National Financing Roundtable - Key Outcomes

    SciTech Connect (OSTI)

    2009-04-01

    This document presents key outcomes from the EnergySmart Schools National Financing Roundtable as a follow-up to the release of its Guide to FInancing EnergySmart Schools

  4. LANL breaks ground on key sediment control project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and made of rocks...

  5. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all about turbulence....

  6. Refine the Concept of Public Key Encryption with Delegated Search

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    with the public key of Bob, but unfortunately, her computer is infected by some virus which embeds a malware contents. However, in this way, Bob's computer will be under the risk of infection by the malware

  7. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

  8. A Key Review On Exergetic Analysis And Assessment Of Renewable...

    Open Energy Info (EERE)

    A Key Review On Exergetic Analysis And Assessment Of Renewable Energy Resources For A Sustainable Future Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal...

  9. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren students may want to (quietly) opt out of their friends' illicit file trading activities, but academics

  10. Practical Non-Interactive Key Distribution Based on Pairings

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , the Private Key Generator (PKG), who possesses additional privileged information in the form of a master in a non- interactive system is that the synchronous communication between Alice and Bob is replaced

  11. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  12. Reflective cracking of shear keys in multi-beam bridges 

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02

    strength to resist cracking from vehicular loads, but uneven temperature changes and shrinkage strains cause high tensile stresses in the shear key regions and lead to reflective cracking. The analyses showed the highest stresses were often times near...

  13. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  14. Darcy Q. Hou State Key Laboratory of Hydraulic

    E-Print Network [OSTI]

    Tijsseling, A.S.

    Darcy Q. Hou State Key Laboratory of Hydraulic Engineering Simulation and Safety, and School to severe dam- ages. Over 50 incidents have been attributed to this mechanism and an accident was reported

  15. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  16. New imaging capability reveals possible key to extending battery...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    developed for studying battery failures points to a potential next step in extending lithium ion battery lifetime and capacity, opening a path to wider use of these batteries...

  17. Building Green in Greensburg: Prairie Pointe Townhomes

    Office of Energy Efficiency and Renewable Energy (EERE)

    This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing Prairie Pointe Townhomes in Greensburg, Kansas.

  18. VPP Points of Contact web version 07092015

    Office of Environmental Management (EM)

    Updated 792015 VPP POINTS OF CONTACT Organization DOE POC Contractor DOE Federal POC Advanced Technologies and Laboratories International, Inc. (ATL)222-S Laboratory Analytical...

  19. SIMPLE EXPLICIT FORMULA FOR COUNTING LATTICE POINTS ...

    E-Print Network [OSTI]

    2007-02-14

    by a simple formula involving the evaluation of ? zx over the integral points of those ... different) formula from a decomposition of the generating function into.

  20. HOLOMORPHIC ONE FORMS, INTEGRAL AND RATIONAL POINTS ...

    E-Print Network [OSTI]

    2014-09-23

    Abstract The first goal of this paper is to study the question of finiteness of integral points on a cofinite non-compact complex two dimensional ball quotient ...

  1. Wisconsin Nuclear Profile - Point Beach Nuclear Plant

    U.S. Energy Information Administration (EIA) Indexed Site

    Point Beach Nuclear Plant" "Unit","Summer capacity (mw)","Net generation (thousand mwh)","Summer capacity factor (percent)","Type","Commercial operation date","License expiration...

  2. New York Nuclear Profile - Indian Point

    U.S. Energy Information Administration (EIA) Indexed Site

    Indian Point" "Unit","Summer capacity (mw)","Net generation (thousand mwh)","Summer capacity factor (percent)","Type","Commercial operation date","License expiration date"...

  3. Wolf Point Substation, Roosevelt County, Montana

    SciTech Connect (OSTI)

    Not Available

    1991-05-01

    The Western Area Power Administration (Western), an agency of the United States Department of Energy, is proposing to construct the 115-kV Wolf Point Substation near Wolf Point in Roosevelt County, Montana (Figure 1). As part of the construction project, Western's existing Wolf Point Substation would be taken out of service. The existing 115-kV Wolf Point Substation is located approximately 3 miles west of Wolf Point, Montana (Figure 2). The substation was constructed in 1949. The existing Wolf Point Substation serves as a Switching Station'' for the 115-kV transmission in the region. The need for substation improvements is based on operational and reliability issues. For this environmental assessment (EA), the environmental review of the proposed project took into account the removal of the old Wolf Point Substation, rerouting of the five Western lines and four lines from the Cooperatives and Montana-Dakota Utilities Company, and the new road into the proposed substation. Reference to the new proposed Wolf Point Substation in the EA includes these facilities as well as the old substation site. The environmental review looked at the impacts to all resource areas in the Wolf Point area. 7 refs., 6 figs.

  4. Transverse Anderson localization of light near Dirac points of photonic nanostructures

    E-Print Network [OSTI]

    Deng, Hanying; Malomed, Boris A; Panoiu, Nicolae C; Ye, Fangwei

    2015-01-01

    We perform a comparative study of the Anderson localization of light beams in disordered layered photonic nanostructures that, in the limit of periodic layer distribution, possess either a Dirac point or a Bragg gap in the spectrum of the wavevectors. In particular, we demonstrate that the localization length of the Anderson modes increases when the width of the Bragg gap decreases, such that in the vanishingly small bandgap limit, namely when a Dirac point is formed, even extremely high levels of disorders are unable to localize the optical modes located near the Dirac point. A comparative analysis of the key features of the propagation of Anderson modes formed in the Bragg gap or near the Dirac point is also presented. Our findings could provide valuable guidelines in assessing the influence of structural disorder on the functionality of a broad array of optical nanodevices.

  5. Short communication Observations of eruptive activity at Santiaguito volcano, Guatemala

    E-Print Network [OSTI]

    Rose, William I.

    Short communication Observations of eruptive activity at Santiaguito volcano, Guatemala Gregg J volcano, Guatemala, from the vantage point of its parent, Santa Mari´a. We have taken 12 h of digital

  6. Multi-party Agile Quantum Key Distribution Network with a Broadband Fiber-based Entangled Source

    E-Print Network [OSTI]

    E. Y. Zhu; C. Corbari; A. V. Gladyshev; P. G. Kazansky; H. K. Lo; L. Qian

    2015-06-12

    A reconfigurable, multi-party quantum key distribution scheme is experimentally demonstrated by utilizing a poled fiber-based source of broadband polarization-entangled photon pairs and dense wavelength-division multiplexing (DWDM). The large bandwidth (> 90 nm centered about 1555 nm) and highly spectrally-correlated nature of the entangled source is exploited to allow for the generation of more than 25 frequency-conjugate entangled pairs when aligned to the standard 200-GHz ITU grid. Such a network can serve more than 50 users simultaneously, allowing any one user on the network to establish a QKD link with any other user through wavelength-selective switching. The entangled pairs are delivered over 40 km of actual fiber (equivalent to 120 km of fiber based on channel-loss experienced), and a secure key rate of more than 20 bits/s per bi-party is observed.

  7. New algorithms for adaptive optics point-spread function reconstruction

    E-Print Network [OSTI]

    Eric Gendron; Yann Clénet; Thierry Fusco; Gérard Rousset

    2006-06-28

    Context. The knowledge of the point-spread function compensated by adaptive optics is of prime importance in several image restoration techniques such as deconvolution and astrometric/photometric algorithms. Wavefront-related data from the adaptive optics real-time computer can be used to accurately estimate the point-spread function in adaptive optics observations. The only point-spread function reconstruction algorithm implemented on astronomical adaptive optics system makes use of particular functions, named $U\\_{ij}$. These $U\\_{ij}$ functions are derived from the mirror modes, and their number is proportional to the square number of these mirror modes. Aims. We present here two new algorithms for point-spread function reconstruction that aim at suppressing the use of these $U\\_{ij}$ functions to avoid the storage of a large amount of data and to shorten the computation time of this PSF reconstruction. Methods. Both algorithms take advantage of the eigen decomposition of the residual parallel phase covariance matrix. In the first algorithm, the use of a basis in which the latter matrix is diagonal reduces the number of $U\\_{ij}$ functions to the number of mirror modes. In the second algorithm, this eigen decomposition is used to compute phase screens that follow the same statistics as the residual parallel phase covariance matrix, and thus suppress the need for these $U\\_{ij}$ functions. Results. Our algorithms dramatically reduce the number of $U\\_{ij}$ functions to be computed for the point-spread function reconstruction. Adaptive optics simulations show the good accuracy of both algorithms to reconstruct the point-spread function.

  8. On Robust Regression in Photogrammetric Point Clouds

    E-Print Network [OSTI]

    Schindler, Konrad

    On Robust Regression in Photogrammetric Point Clouds Konrad Schindler and Horst Bischof Institute,bischof}@icg.tu-graz.ac.at Abstract. Many applications in computer vision require robust linear regression on photogrammetrically for robust regression are based on distance measures from the regression surface to the points

  9. Traveling water waves with point vortices

    E-Print Network [OSTI]

    Kristoffer Varholm

    2015-03-20

    We construct small-amplitude solitary traveling gravity-capillary water waves with a finite number of point vortices along a vertical line, on finite depth. This is done using a local bifurcation argument. The properties of the resulting waves are also examined: We find that they depend significantly on the position of the point vortices in the water column.

  10. Three-point spherical mirror mount

    DOE Patents [OSTI]

    Cutburth, R.W.

    1984-01-23

    A three-point spherical mirror mount for use with lasers is disclosed. The improved mirror mount is adapted to provide a pivot ring having an outer surface with at least three spaced apart mating points to engage an inner spherical surface of a support housing.

  11. Interaction between Injection Points during Hydraulic Fracturing

    E-Print Network [OSTI]

    Hals, Kjetil M D

    2012-01-01

    We present a model of the hydraulic fracturing of heterogeneous poroelastic media. The formalism is an effective continuum model that captures the coupled dynamics of the fluid pressure and the fractured rock matrix and models both the tensile and shear failure of the rock. As an application of the formalism, we study the geomechanical stress interaction between two injection points during hydraulic fracturing (hydrofracking) and how this interaction influences the fracturing process. For injection points that are separated by less than a critical correlation length, we find that the fracturing process around each point is strongly correlated with the position of the neighboring point. The magnitude of the correlation length depends on the degree of heterogeneity of the rock and is on the order of 30-45 m for rocks with low permeabilities. In the strongly correlated regime, we predict a novel effective fracture-force that attracts the fractures toward the neighboring injection point.

  12. Untappable key distribution system: a one-time-pad booster

    E-Print Network [OSTI]

    Geraldo A. Barbosa; Jeroen van de Graaf

    2015-07-08

    One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. This paper presents a solution for this problem providing a fast and unlimited renewal of secure keys: An untappable key distribution system is presented and detailed. This fast key distribution system utilizes two layers of confidentially protection: 1) Physical noise intrinsic to the optical channel that turn the coded signals into stealth signals and 2) Privacy amplification using a bit pool of refreshed entropy run after run, to eliminate any residual information. The resulting level of security is rigorously calculated and demonstrates that the level of information an eavesdropper could obtain is completely negligible. The random bit sequences, fast and securely distributed, can be used to encrypt text, data or voice.

  13. On the Scission Point Configuration of Fisioning Nuclei

    E-Print Network [OSTI]

    Ivanyuk, Fedir

    2013-01-01

    The scission of a nucleus into two fragments is at present the least understood part of the fission process, though the most important for the formation of the observables. To investigate the potential energy landscape at the largest possible deformations, i.e. at the scission point (line, hypersurface), the Strutinsky's optimal shape approach is applied. For the accurate description of the mass-asymmetric nuclear shape at the scission point, it turned out necessary to construct an interpolation between the two sets of constraints for the elongation and mass asymmetry which are applied successfully at small deformations (quadrupole and octupole moments) and for separated fragments (the distance between the centers of mass and the difference of fragments masses). In addition, a constraint on the neck radius was added, what makes it possible to introduce the so called super-short and super-long shapes at the scission point and to consider the contributions to the observable data from different fission modes. Th...

  14. On the Scission Point Configuration of Fisioning Nuclei

    E-Print Network [OSTI]

    Fedir Ivanyuk

    2013-03-29

    The scission of a nucleus into two fragments is at present the least understood part of the fission process, though the most important for the formation of the observables. To investigate the potential energy landscape at the largest possible deformations, i.e. at the scission point (line, hypersurface), the Strutinsky's optimal shape approach is applied. For the accurate description of the mass-asymmetric nuclear shape at the scission point, it turned out necessary to construct an interpolation between the two sets of constraints for the elongation and mass asymmetry which are applied successfully at small deformations (quadrupole and octupole moments) and for separated fragments (the distance between the centers of mass and the difference of fragments masses). In addition, a constraint on the neck radius was added, what makes it possible to introduce the so called super-short and super-long shapes at the scission point and to consider the contributions to the observable data from different fission modes. The calculated results for the mass distribution of the fission fragment and the Coulomb repulsion energy "immediately after scission" are in a reasonable agreement with experimental data.

  15. Continuous Variable Quantum Key Distribution with a Noisy Laser

    E-Print Network [OSTI]

    Christian S. Jacobsen; Tobias Gehring; Ulrik L. Andersen

    2015-07-06

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances large amounts of preparation noise can be tolerated in contrast to reverse reconciliation where the key rate quickly drops to zero. Our experiment thereby demonstrates that quantum key distribution with non-shot-noise limited laser diodes might be feasible.

  16. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  17. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  18. Geo-neutrino Observation

    SciTech Connect (OSTI)

    Dye, S. T.; Alderman, M.; Batygov, M.; Learned, J. G.; Matsuno, S.; Mahoney, J. M.; Pakvasa, S.; Rosen, M.; Smith, S.; Varner, G.; McDonough, W. F.

    2009-12-17

    Observations of geo-neutrinos measure radiogenic heat production within the earth, providing information on the thermal history and dynamic processes of the mantle. Two detectors currently observe geo-neutrinos from underground locations. Other detection projects in various stages of development include a deep ocean observatory. This paper presents the current status of geo-neutrino observation and describes the scientific capabilities of the deep ocean observatory, with emphasis on geology and neutrino physics.

  19. Hot Pot Field Observations

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Lane, Michael

    2013-06-28

    Map of field observations including depressions, springs, evidence of former springs, travertine terraces and vegetation patterns. Map also contains interpretation of possible spring alignments.

  20. Hot Pot Field Observations

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Lane, Michael

    Map of field observations including depressions, springs, evidence of former springs, travertine terraces and vegetation patterns. Map also contains interpretation of possible spring alignments.

  1. Atomic Collapse Observed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Scientists Observe Atomic Collapse State Quantum Mechanics Prediction Confirmed in Graphene Using NERSC's Hopper April 26, 2013 | Tags: Hopper, Materials Science Contact: Linda...

  2. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  3. Robust Shot Noise Measurement for Continuous Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Sébastien Kunz-Jacques; Paul Jouguet

    2015-01-17

    We study a practical method to measure the shot noise in real time in Continuous Variable Quantum Key Distribution (CVQKD) systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e. noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  4. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKey

  5. Microscopic return point memory in Co/Pd multilayer films

    SciTech Connect (OSTI)

    Seu, K.A.; Su, R.; Roy, S.; Parks, D.; Shipton, E.; Fullerton, E.E.; Kevan, S.D.

    2009-10-01

    We report soft x-ray speckle metrology measurements of microscopic return point and complementary point memory in Co/Pd magnetic films having perpendicular anisotropy. We observe that the domains assemble into a common labyrinth phase with a period that varies by nearly a factor of two between initial reversal and fields near saturation. Unlike previous studies of similar systems, the ability of the film to reproduce its domain structure after magnetic cycling through saturation varies from loop to loop, from position to position on the sample, and with the part of the speckle pattern used in the metrology measurements. We report the distribution of memory as a function of field and discuss these results in terms of the reversal process.

  6. Relevance of complex branch points for partial wave analysis

    SciTech Connect (OSTI)

    Ceci, S.; Svarc, A.; Doering, M.; Hanhart, C.; Krewald, S.; Meissner, U.-G.

    2011-07-15

    A central issue in hadron spectroscopy is to deduce--and interpret--resonance parameters, namely, pole positions and residues, from experimental data, for those are the quantities to be compared to lattice QCD or model calculations. However, not every structure in the observables derives from a resonance pole: the origin might as well be branch points, either located on the real axis (when a new channel composed of stable particles opens) or in the complex plane (when at least one of the intermediate particles is unstable). In this paper we demonstrate first the existence of such branch points in the complex plane and then show on the example of the {pi}N P{sub 11} partial wave that it is not possible to distinguish the structures induced by the latter from a true pole signal based on elastic data alone.

  7. POLYNOMIAL PARTITIONING ON VARIETIES AND POINT ...

    E-Print Network [OSTI]

    2014-06-09

    Jun 9, 2014 ... breakthrough in a long-standing problem of Erd?os on the number of distinct dis- tances between a n points in the plane, by nearly proving the ...

  8. CenterPoint Energy Sustainable Schools Program

    Broader source: Energy.gov [DOE]

    The Sustainable Schools Program focuses on energy savings through behavioral and operational improvements, and may be used along with CenterPoint Energy’s SCORES and Load Management programs. It...

  9. Critical-Point Structure in Finite Nuclei

    E-Print Network [OSTI]

    A. Leviatan

    2006-12-04

    Properties of quantum shape-phase transitions in finite nuclei are considered in the framework of the interacting boson model. Special emphasis is paid to the dynamics at the critical-point of a general first-order phase transition.

  10. CenterPoint Energy's Energy Wise Program

    Broader source: Energy.gov [DOE]

    CenterPoint Energy's Energy Wise program provides take-home kits containing efficiency devices with classroom and in-home education techniques with the aim to inspire families to adopt new resource...

  11. Physical observability of horizons

    E-Print Network [OSTI]

    Matt Visser

    2014-11-25

    Event horizons are (generically) not physically observable. In contrast, apparent horizons (and the closely related trapping horizons) are generically physically observable --- in the sense that they can be detected by observers working in finite-size regions of spacetime. Consequently event horizons are inappropriate tools for defining astrophysical black holes, or indeed for defining any notion of evolving}black hole, (evolving either due to accretion or Hawking radiation). The only situation in which an event horizon becomes physically observable is for the very highly idealized stationary or static black holes, when the event horizon is a Killing horizon which is degenerate with the apparent and trapping horizons; and then it is the physical observability of the apparent/trapping horizons that is fundamental --- the event horizon merely comes along for the ride.

  12. Physical observability of horizons

    E-Print Network [OSTI]

    Visser, Matt

    2014-01-01

    Event horizons are (generically) not physically observable. In contrast, apparent horizons (and the closely related trapping horizons) are generically physically observable --- in the sense that they can be detected by observers working in finite-size regions of spacetime. Consequently event horizons are inappropriate tools for defining astrophysical black holes, or indeed for defining any notion of evolving}black hole, (evolving either due to accretion or Hawking radiation). The only situation in which an event horizon becomes physically observable is for the very highly idealized stationary or static black holes, when the event horizon is a Killing horizon which is degenerate with the apparent and trapping horizons; and then it is the physical observability of the apparent/trapping horizons that is fundamental --- the event horizon merely comes along for the ride.

  13. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  14. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  15. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  16. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  17. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  18. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  19. Preparing Turkey Safely Turkey provides protein along with other key

    E-Print Network [OSTI]

    Preparing Turkey Safely Nutrition Turkey provides protein along with other key nutrients. A serving is 3 ounces cooked poultry (about the size of a deck of cards). One serving of roasted, skinless turkey protein; iron--8% daily value Right Size Turkey Use this chart as a helpful guide: Whole bird ­ 1 pound

  20. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  1. GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald

    E-Print Network [OSTI]

    Ma, Lena

    GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald Contact: Soil and Water information systems (GIS), geostatistical and statistical methods, space-time landscape modeling, remote laboratory. Available software include: MS Office Suite; MS SQL database; ArcGIS Suite (ESRI) including

  2. November 2012 Key Performance Indicator (KPI): Carbon Management

    E-Print Network [OSTI]

    Evans, Paul

    November 2012 Key Performance Indicator (KPI): Carbon Management NTU report our carbon footprint provided. The carbon emissions are calculated using Carbon Trust conversion factors, as used in NTU's EMS.64 2011/2012 18,130 4.20 The recorded changes in emissions are a result of carbon management projects

  3. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  4. Experimental quantum key distribution without monitoring signal disturbance

    E-Print Network [OSTI]

    Hiroki Takesue; Toshihiko Sasaki; Kiyoshi Tamaki; Masato Koashi

    2015-05-29

    Since the invention of Bennett-Brassard 1984 (BB84) protocol, many quantum key distribution (QKD) protocols have been proposed and some protocols are operated even in field environments. One of the striking features of QKD is that QKD protocols are provably secure unlike cryptography based on computational complexity assumptions. It has been believed that, to guarantee the security of QKD, Alice and Bob have to monitor the statistics of the measurement outcomes which are used to determine the amount of the privacy amplification to generate a key. Recently a new type of QKD protocol, called round robin differential phase shift (RRDPS) protocol, was proposed, and remarkably this protocol can generate a key without monitoring any statistics of the measurement outcomes. Here we report an experimental realization of the RRDPS protocol. We used a setup in which Bob randomly chooses one from four interferometers with different pulse delays so that he could implement phase difference measurements for all possible combinations with five-pulse time-bin states. Using the setup, we successfully distributed keys over 30 km of fiber, making this the first QKD experiment that does not rely on signal disturbance monitoring.

  5. The Seven Keys to Success in Energy Management and Conservation 

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  6. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE­HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN­order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  7. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  8. Appendix 30 Fire Effects on Key Ecological Processes in Forested

    E-Print Network [OSTI]

    Appendix 30 Fire Effects on Key Ecological Processes in Forested Ecosystems The following paragraphs on fire effects on forest succession are from Stickney (1982) Forest Succession ...the severity of the pre-disturbance forest herb species also demonstrated the ability to survive fire, particularly those

  9. Annual Report 2004 1 Key events during 2004

    E-Print Network [OSTI]

    Svenningsson, Josef

    Johansson studying the separation of carbon dioxide in a reactor system for two-stage combustion. #12;1 Key for innovation systems and entrepreneurship A year of anniversaries ­ the University, the Foundation, Chalmers are among those hardest struck,but many holidaying Swedes,especially in Thailand,fall victim to the tsunami

  10. MOLECULAR ENTOMOLOGY Molecular Identification Key for Pest Species of Scirtothrips

    E-Print Network [OSTI]

    Hoddle, Mark S.

    primers and determining the size of the products by using standard agarose gel electrophoresis, followed, Neohydatothrips, molecular identiÞcation key, exotic pests, nondestruc- tive DNA extraction The genus Scirtothrips, several species of Scirtothrips have (or have the potential to) spread from their natural habitats

  11. Introduction Adhesion complexes play key roles in many events, including

    E-Print Network [OSTI]

    Hardin, Jeff

    Introduction Adhesion complexes play key roles in many events, including cell migration cell adhesion are remarkably similar in Caenorhabditis elegans, Drosophila and humans (Hynes and Zhao to reveal much about the basic, conserved molecular mechanisms that mediate and regulate cell adhesion

  12. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  13. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  14. news and views A key issue for hydrogen storage materi-

    E-Print Network [OSTI]

    Palumbi, Stephen

    news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

  15. Key Directions and a Roadmap for Electrical Design for Manufacturability

    E-Print Network [OSTI]

    Kahng, Andrew B.

    Key Directions and a Roadmap for Electrical Design for Manufacturability (Invited Talk) Andrew B by design and design-for- manufacturability (DFM) techniques. This talk addresses trends and a roadmap assumptions come true? The second part will give a roadmap for electrical DFM technologies, motivated

  16. Key Title Marine Ecology www.wiley.com

    E-Print Network [OSTI]

    Wall, Diana

    Key Title Marine Ecology www.wiley.com Antarctic Ecosystems: An Extreme Environment in a Changing their genomes. Chapters address both Antarctic terrestrial and marine ecosystems, and the scientific and evolution Part II: Marine habitats and regions Chapter 4. The impact of regional climate change

  17. Key Facts About Hurricane Readiness Preparing for a Hurricane

    E-Print Network [OSTI]

    HURRICANES Key Facts About Hurricane Readiness Preparing for a Hurricane If you are under a hurricane watch or warning, here are some basic steps to take to prepare for the storm: · Learn about your. · Identify potential home hazards and know how to secure or protect them before the hurricane strikes

  18. Notes on the CRTDH Group Key Agreement Protocol Spyros Magliveras and Wandi Wei

    E-Print Network [OSTI]

    Magliveras, Spyros

    , the distributed schemes help in the uniform distribution of the work-load for key management and eliminate: xkzou@cs.iupui.edu Abstract Group key management (GKM) is one of the primary is- sues for secure group Key Management (GKM), Contributory Group Key Agreement, Chinese Remainder Theorem, Diffie-Hellman Key

  19. Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01

    "Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

  20. Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01

    Grid parity--or break-even cost--for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that local incentives rather than ?technical? parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  1. THE FERNALD DOSIMETRY RECONSTRUCTION Task 1: Identification of Release Points

    E-Print Network [OSTI]

    fires, spills, and UF6 leaks and releases. The Stack Release Points and Other Release Points are located

  2. Hot Springs Point Geothermal Project | Open Energy Information

    Open Energy Info (EERE)

    Point Geothermal Project Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Development Project: Hot Springs Point Geothermal Project Project Location Information...

  3. OVERVIEW OF THE SDSS-IV MaNGA SURVEY: MAPPING NEARBY GALAXIES AT APACHE POINT OBSERVATORY

    SciTech Connect (OSTI)

    Bundy, Kevin; Bershady, Matthew A.; Wake, David A.; Tremonti, Christy; Diamond-Stanic, Aleksandar M.; Law, David R.; Cherinka, Brian; Yan, Renbin; Sánchez-Gallego, José R.; Drory, Niv; MacDonald, Nicholas; Weijmans, Anne-Marie; Thomas, Daniel; Masters, Karen; Coccato, Lodovico; Aragón-Salamanca, Alfonso; Avila-Reese, Vladimir; Badenes, Carles; Falcón-Barroso, Jésus; Belfiore, Francesco; and others

    2015-01-01

    We present an overview of a new integral field spectroscopic survey called MaNGA (Mapping Nearby Galaxies at Apache Point Observatory), one of three core programs in the fourth-generation Sloan Digital Sky Survey (SDSS-IV) that began on 2014 July 1. MaNGA will investigate the internal kinematic structure and composition of gas and stars in an unprecedented sample of 10,000 nearby galaxies. We summarize essential characteristics of the instrument and survey design in the context of MaNGA's key science goals and present prototype observations to demonstrate MaNGA's scientific potential. MaNGA employs dithered observations with 17 fiber-bundle integral field units that vary in diameter from 12'' (19 fibers) to 32'' (127 fibers). Two dual-channel spectrographs provide simultaneous wavelength coverage over 3600-10300 Å at R ? 2000. With a typical integration time of 3 hr, MaNGA reaches a target r-band signal-to-noise ratio of 4-8 (Å{sup –1} per 2'' fiber) at 23 AB mag arcsec{sup –2}, which is typical for the outskirts of MaNGA galaxies. Targets are selected with M {sub *} ? 10{sup 9} M {sub ?} using SDSS-I redshifts and i-band luminosity to achieve uniform radial coverage in terms of the effective radius, an approximately flat distribution in stellar mass, and a sample spanning a wide range of environments. Analysis of our prototype observations demonstrates MaNGA's ability to probe gas ionization, shed light on recent star formation and quenching, enable dynamical modeling, decompose constituent components, and map the composition of stellar populations. MaNGA's spatially resolved spectra will enable an unprecedented study of the astrophysics of nearby galaxies in the coming 6 yr.

  4. Observables on Quantum Structures

    E-Print Network [OSTI]

    Anatolij Dvure?enskij; Mária Kuková

    2012-04-29

    An observable on a quantum structure is any $\\sigma$-homomorphism of quantum structures from the Borel $\\sigma$-algebra into the quantum structure. We show that our partial information on an observable known only for all intervals of the form $(-\\infty,t)$ is sufficient to determine uniquely the whole observable defined on quantum structures like $\\sigma$-MV-algebras, $\\sigma$-effect algebras, Boolean $\\sigma$-algebras, monotone $\\sigma$-complete effect algebras with the Riesz Decomposition Property, the effect algebra of effect operators of a Hilbert space, and a system of functions, and an effect-tribe.

  5. MARS OBSERVER Mission Failure

    E-Print Network [OSTI]

    Rhoads, James

    of Mars Observer Mission Failure.. ................... D-12 a. Most Probable Cause: Leakage of NT0 Through Check Valves .................................................................. D-14 b. Potential Cause: Pressure Regulator Failure....................... D-28 c. Potential Cause: Failure of a Pyro Valve Charge

  6. Distribution and abundance of endangered Florida Key deer on outer islands 

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25

    -based survey data. All outer islands exhibited estimated abundances considerably below carrying capacities, with larger populations occurring closer to Big Pine Key. Results indicated that other islands and complexes such as Ramrod Key, Water Key...

  7. Superconductivity, superfluidity and zero-point oscillations

    E-Print Network [OSTI]

    B. V. Vasiliev

    2013-06-29

    Currently it is thought that in order to explain the phenomenon of superconductivity is necessary to understand the mechanism of formation of electron pairs. However, the paired electrons cannot form a superconducting condensate. They perform disorderly zero-point oscillations and there are no attractive forces in their ensemble. To create a unified ensemble of particles, the pairs must order their zero-point fluctuations so that an attraction between the particles appears. For this reason, the ordering of zero-point oscillations in the electron gas is the cause of superconductivity and the parameters characterizing this order determine the properties of superconductors. The model of condensation of zero-point oscillations creates the possibility to obtain estimates for the critical parameters of elementary superconductors, which are also in the satisfactory agreement with measured data. On the another hand, the phenomenon of superfluidity in He-4 and He-3 can be similarly explained due to the ordering of zero-point fluctuations. Thus it is established that the both related phenomena are based on the same physical mechanism.

  8. Third-Order Gas-Liquid Phase Transition and the Nature of Andrews Critical Point

    E-Print Network [OSTI]

    Tian Ma; Shouhong Wang

    2010-07-13

    The main objective of this article is to study the nature of the Andrews critical point in the gas-liquid transition in a physical-vapor transport (PVT) system. A dynamical model, consistent with the van der Waals equation near the Andrews critical point, is derived. With this model, we deduce two physical parameters, which interact exactly at the Andrews critical point, and which dictate the dynamic transition behavior near the Andrews critical point. In particular, it is shown that 1) the Andrews critical point is a switching point where the phase transition changes from the first order to the third order, 2) the gas-liquid co-existence curve can be extended beyond the Andrews critical point, and 3) the liquid-gas phase transition going beyond Andrews point is of the third order. This clearly explains why it is hard to observe the gas-liquid phase transition beyond the Andrews critical point. Furthermore, the analysis leads naturally the introduction of a general asymmetry principle of fluctuations and the preferred transition mechanism for a thermodynamic system.

  9. Simple rate-adaptive LDPC coding for quantum key distribution

    E-Print Network [OSTI]

    Mo Li; Chun-Mei Zhang; Zhen-Qiang Yin; Wei Chen; Chuan Wang; Zheng-Fu Han

    2015-05-24

    Although quantum key distribution (QKD) comes from the development of quantum theory, the implementation of a practical QKD system does involve a lot of classical process, such as key reconciliation and privacy amplification, which is called post-processing. Post-processing has been a crucial element to high speed QKD systems, even the bottleneck of it because of its relatively high time consumption. Low density parity check (LDPC) is now becoming a promising approach of overcoming the bottleneck due to its good performance in processing throughput. In this article we propose and simulate an easily implemented but efficiently rate-adaptive LDPC coding approach of reconciliation, different from the previously proposed puncturing- and shortening-based approach. We also give a measure for choosing the optimal LDPC parameter for our rate-adaptive approach according to error rates.

  10. Quantum Hacking on Quantum Key Distribution using Homodyne Detection

    E-Print Network [OSTI]

    Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2014-02-27

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  11. No-signaling Quantum Key Distribution: Solution by Linear Programming

    E-Print Network [OSTI]

    Won-Young Hwang; Joonwoo Bae; Nathan Killoran

    2013-01-15

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csisz\\'ar-K\\"orner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  12. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  13. 2001: PUBLICATIONS WITH RESULTS FROM USERS' IRAM OBSERVATIONS

    E-Print Network [OSTI]

    RadioAstronomie Millimétrique, Institut de (IRAM)

    2001: PUBLICATIONS WITH RESULTS FROM USERS' IRAM OBSERVATIONS 829. WARM H2 IN THE GALACTIC CENTER. Hüttemeister 2001, A&A 365, 174 830. THE IRAM KEY-PROJECT: SMALL- SCALE STRUCTURE OF PRE-STAR FORMING REGIONS. Heithausen, E. Falgarone 2001, A&A 365, 275 831. METHODS AND CONSTRAINTS FOR THE CORRECTION OF THE ERROR BEAM

  14. Direct observation of a widely tunable bandgap in bilayer graphene

    E-Print Network [OSTI]

    Zettl, Alex

    . Most notably, the inversion symmetric AB-stacked bilayer graphene is a zero-bandgap semiconductor in the graphene FET device we are able to control independently the two key semiconductor parameters: electronicLETTERS Direct observation of a widely tunable bandgap in bilayer graphene Yuanbo Zhang1 *, Tsung

  15. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  16. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIALU.S. DepartmentJeanKey Meeting Takeaways from 2014 Meeting

  17. Key Activities in Energy Efficiency | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore: ENERGYKevinKey

  18. Key Concepts in Project Development and Financing in Alaska

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: Project

  19. Vehicle Technologies Office: Key Activities in Vehicles | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-ScaleTechnology|Energy Key

  20. Relative localization of point particle interactions

    E-Print Network [OSTI]

    José Ricardo Oliveira

    2011-10-25

    We review the main concepts of the recently introduced principle of relative locality and investigate some aspects of classical interactions between point particles from this new perspective. We start with a physical motivation and basic mathematical description of relative locality and review the treatment of a system of classical point particles in this framework. We then examine one of the unsolved problems of this picture, the apparent ambiguities in the definition of momentum constraints caused by a non-commutative and/or non-associative momentum addition rule. The gamma ray burst experiment is used as an illustration. Finally, we use the formalism of relative locality to reinterpret the well-known multiple point particle system coupled to 2+1 Einstein gravity, analyzing the geometry of its phase space and once again referring to the gamma ray burst problem as an example.

  1. Phase-shifting point diffraction interferometer

    DOE Patents [OSTI]

    Medecki, H.

    1998-11-10

    Disclosed is a point diffraction interferometer for evaluating the quality of a test optic. In operation, the point diffraction interferometer includes a source of radiation, the test optic, a beam divider, a reference wave pinhole located at an image plane downstream from the test optic, and a detector for detecting an interference pattern produced between a reference wave emitted by the pinhole and a test wave emitted from the test optic. The beam divider produces separate reference and test beams which focus at different laterally separated positions on the image plane. The reference wave pinhole is placed at a region of high intensity (e.g., the focal point) for the reference beam. This allows reference wave to be produced at a relatively high intensity. Also, the beam divider may include elements for phase shifting one or both of the reference and test beams. 8 figs.

  2. Phase-shifting point diffraction interferometer

    DOE Patents [OSTI]

    Medecki, Hector (Berkeley, CA)

    1998-01-01

    Disclosed is a point diffraction interferometer for evaluating the quality of a test optic. In operation, the point diffraction interferometer includes a source of radiation, the test optic, a beam divider, a reference wave pinhole located at an image plane downstream from the test optic, and a detector for detecting an interference pattern produced between a reference wave emitted by the pinhole and a test wave emitted from the test optic. The beam divider produces separate reference and test beams which focus at different laterally separated positions on the image plane. The reference wave pinhole is placed at a region of high intensity (e.g., the focal point) for the reference beam. This allows reference wave to be produced at a relatively high intensity. Also, the beam divider may include elements for phase shifting one or both of the reference and test beams.

  3. Multiple Critical Points in Effective Quark Models

    E-Print Network [OSTI]

    Ferroni, Lorenzo; Pinto, Marcus B

    2010-01-01

    We consider the two flavor version of the Linear Sigma Model as well as of the Nambu Jona-Lasinio model, at finite temperature and quark chemical potential, beyond the Mean Field Approximation. Using parameter values for the pion and quark current masses which weakly break chiral symmetry we show that both models can present more than one critical end point. In particular, we explicitly show that the appearance of a new critical point associated with a first order line at high temperature and low densities could help to conciliate some lattice results with model predictions. Using different techniques, we perform an extensive thermodynamical analysis to understand the physical nature of the different critical points. For both models, our results suggest that the new first order line which starts at vanishing chemical potential has a more chiral character than the usual line which displays a character more reminiscent of a liquid-gas phase transition.

  4. Symmetry and Dirac points in graphene spectrum

    E-Print Network [OSTI]

    Gregory Berkolaiko; Andrew Comech

    2015-04-23

    Existence and stability of Dirac points in the dispersion relation of operators periodic with respect to the hexagonal lattice is investigated for different sets of additional symmetries. The following symmetries are considered: rotation by $2\\pi/3$ and inversion, rotation by $2\\pi/3$ and horizontal reflection, inversion or reflection with weakly broken rotation symmetry, and the case where no Dirac points arise: rotation by $2\\pi/3$ and vertical reflection. All proofs are based on symmetry considerations and are elementary in nature. In particular, existence of degeneracies in the spectrum is proved by a transplantation argument (which is deduced from the (co)representation of the relevant symmetry group). The conical shape of the dispersion relation is obtained from its invariance under rotation by $2\\pi/3$. Persistence of conical points when the rotation symmetry is weakly broken is proved using a geometric phase in one case and parity of the eigenfunctions in the other.

  5. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  6. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  7. Non-lead hollow point bullet

    DOE Patents [OSTI]

    Vaughn, Norman L. (Knoxville, TN); Lowden, Richard A. (Clinton, TN)

    2003-04-15

    The non-lead hollow point bullet of the instant invention comprises a mixed construction slug further comprising, a monolithic metal insert having a tapered (preferred conical) hollow point tip and a tapered (preferred conical) tail protrusion, and an unsintered powdered metal composite core in tandem alignment with the insert. The core has a hollow tapered (preferred conical) cavity tip portion coupled with the tapered (preferred conical) tail protrusion on the insert. An open tip jacket envelops at least a portion of the insert and the core. The jacket is swaged at the open tip.

  8. Sequential conditions for fixed and periodic points 

    E-Print Network [OSTI]

    Peters, Burnis Charles

    1970-01-01

    ) (Member) ~A (Month) 1970 (Year) ~04SQQ ABSTRACT Sec, uential Conditions fo. Fixed and Periodic Points (August 1970) Burnis C. Peter, Jr. , B. A. , Texas ASM University; M. S. , Texas A&M University Directed by: Jack Bryant and L. F. Guseman, Jr.... Let (X, d) be a metric space and f a selfmap of X. It is shown that a number of known theorems on the existence of fixed and periodic points are related through simple properties of the n sequence (f ) of iterates . ACMOVI. EDGEMENTS I wish...

  9. QCD Critical Point: The Race is On

    E-Print Network [OSTI]

    Gavai, Rajiv V

    2014-01-01

    A critical point in the phase diagram of Quantum Chromodynamics (QCD), if established either theoretically or experimentally, would be as profound a discovery as the good-old gas-liquid critical point. Unlike the latter, however, first-principles based approaches are being employed to locate it theoretically. Due to the short lived nature of the concerned phases, novel experimental techniques are needed to search for it. The Relativistic Heavy Ion Collider (RHIC) in USA has an experimental program to do so. This short review is an attempt to provide a glimpse of the race between the theorists and the experimentalists as well as that of the synergy between them.

  10. Points of Pride | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/OPerformancePi Day Pi Day Pi DayPlasmaandAbout UsPointsPoints

  11. Quantum Mechanics Without Observers

    E-Print Network [OSTI]

    W. H. Sulis

    2013-03-03

    The measurement problem and the role of observers have plagued quantum mechanics since its conception. Attempts to resolve these have introduced anthropomorphic or non-realist notions into physics. A shift of perspective based upon process theory and utilizing methods from combinatorial games, interpolation theory and complex systems theory results in a novel realist version of quantum mechanics incorporating quasi-local, nondeterministic hidden variables that are compatible with the no-hidden variable theorems and relativistic invariance, and reproduce the standard results of quantum mechanics to a high degree of accuracy without invoking observers.

  12. Direct observation of Rydberg-Rydberg transitions via CPmmW spectroscopy

    E-Print Network [OSTI]

    Zhou, Yan, Ph. D. Massachusetts Institute of Technology

    2014-01-01

    Rydberg-Rydberg transitions of BaF molecules have been directly observed in our lab. The key to the experimental success is our ability to combine two powerful and new technologies, Chirped-Pulse millimeter-Wave spectroscopy ...

  13. RELATIONSHIP BETWEEN CLOUD FRACTION AND CLOUD ALBEDO: COMBINED OBSERVATIONAL-MODELING-THEORETICAL INVESTIGATION

    E-Print Network [OSTI]

    RELATIONSHIP BETWEEN CLOUD FRACTION AND CLOUD ALBEDO: COMBINED OBSERVATIONAL of Energy Office of Science ABSTRACT Cloud fraction and cloud albedo have long occupied the central stage as key cloud quantities in studying cloud-climate interaction; however their quantitative relationship

  14. Observations of Solids in Protoplanetary Disks

    E-Print Network [OSTI]

    Andrews, Sean M

    2015-01-01

    This review addresses the state of research that employs astronomical (remote sensing) observations of solids ("dust") in young circumstellar disks to learn about planet formation. The intention is for it to serve as an accessible, introductory, pedagogical resource for junior scientists interested in the subject. After some historical background and a basic observational primer, the focus is shifted to the three fundamental topics that broadly define the field: (1) demographics -- the relationships between disk properties and the characteristics of their environments and hosts; (2) structure -- the spatial distribution of disk material and its associated physical conditions and composition; and (3) evolution -- the signposts of key changes in disk properties, including the growth and migration of solids and the impact of dynamical interactions with young planetary systems. Based on the state of the art results in these areas, suggestions are made for potentially fruitful lines of work in the near future.

  15. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  16. NSTX Upgrade Project STRUCTURAL CALCULATION OF THE TF FLAG KEY

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    source of design information including computer program titles and revision levels.) 1] NSTX-CALC-13] NSTX Structural Design Criteria Document, I. Zatz [3] NSTX Design Point June 2010 http://www.pppl.gov/~neumeyer/NSTX_CSU/Design blade due to the OOP torque. 3.)The shear strength of the epoxy used to bond the CRES insert into the G

  17. Project Management: Key to the future success of your office

    E-Print Network [OSTI]

    a case for project management in our offices Provide an easy entry point into project management Focus, Cost, Quality, HR, Communication, Risk, Procurement, and Stakeholder Management #12;Educational Opportunities HR classes 3rd party education companies New Horizons PMI Extensive professional development

  18. Ten Myths of ICT4D (And One Key Lesson)

    E-Print Network [OSTI]

    Anderson, Richard

    development and the modernization of farming? Where would the break-even point come? Where would the saving;Technology X will save the world. Wasn't true for X = radio, TV, or landline phone, despite initial ­ E.g., health insurance "Poverty premium" exists for a reason. Poor populations are... ­ Harder

  19. EXCEPTIONAL COVERS AND BIJECTIONS ON RATIONAL POINTS

    E-Print Network [OSTI]

    Fried, Michael

    EXCEPTIONAL COVERS AND BIJECTIONS ON RATIONAL POINTS ROBERT M. GURALNICK, THOMAS J. TUCKER proved by Davenport and Lewis [DL], Mac- Cluer [Mac], Williams [Wi], Cohen [Co], and Fried [Fr, Fr3, FGS was partially supported by NSF grant DMS-0140578. 1 #12;2 ROBERT M. GURALNICK, THOMAS J. TUCKER, AND MICHAEL E

  20. EXCEPTIONAL COVERS AND BIJECTIONS ON RATIONAL POINTS

    E-Print Network [OSTI]

    Zieve, Michael E.

    EXCEPTIONAL COVERS AND BIJECTIONS ON RATIONAL POINTS ROBERT M. GURALNICK, THOMAS J. TUCKER cases and weaker versions were previously proved by Davenport and Lewis [DL], Mac- Cluer [Mac], Williams was partially supported by NSF grant DMS-0140578. 1 #12;2 ROBERT M. GURALNICK, THOMAS J. TUCKER, AND MICHAEL E

  1. Killam Library Service Point August 20, 2013

    E-Print Network [OSTI]

    Lotze, Heike K.

    , the Library will make special provisions insofar as feasible to permit the patrons to examine sources impression of the Library. Individual assistance to patrons who come to the Library is the primary5 Killam Library Service Point Policy 2013-02-18 August 20, 2013 Head, Killam Memorial Library

  2. Discovering Point Sources in Unknown Environments

    E-Print Network [OSTI]

    Ferguson, Thomas S.

    - ted from the yet-to-be-located source. We will refer to the information from the range sensorDiscovering Point Sources in Unknown Environments Yanina Landa1 , Nicolay M. Tanushev2 , Richard of Texas at Austin, {nicktan,ytsai}@math.utexas.edu 3 Institute for Computational and Appplied Mathematics

  3. Form drag at Three Tree Point

    E-Print Network [OSTI]

    for this study Seattle Tacoma Edwards et al., 2004 Puget Sound, WA Point Three Tree Previous work McCabe et al 24 ­ drag due to tilt = residual drag total form drag #12;Cruise at TTP in Dec. 2009 Seattle Tacoma

  4. Multilinear generalized Radon transforms and point configurations

    E-Print Network [OSTI]

    Grafakos, Loukas; Iosevich, Alex; Palsson, Eyvindur

    2012-01-01

    We study multilinear generalized Radon transforms using a graph-theoretic paradigm that includes the widely studied linear case. These provide a general mechanism to study Falconer-type problems involving $(k+1)$-point configurations in geometric measure theory, with $k \\ge 2$, including the distribution of simplices, volumes and angles determined by the points of fractal subsets $E \\subset {\\Bbb R}^d$, $d \\ge 2$. If $T_k(E)$ denotes the set of noncongruent $(k+1)$-point configurations determined by $E$, we show that if the Hausdorff dimension of $E$ is greater than $d-\\frac{d-1}{2k}$, then the ${k+1 \\choose 2}$-dimensional Lebesgue measure of $T_k(E)$ is positive. This compliments previous work on the Falconer conjecture (\\cite{Erd05} and the references there), as well as work on finite point configurations \\cite{EHI11,GI10}. We also give applications to Erd\\"os-type problems in discrete geometry and a fractal regular value theorem, providing a multilinear framework for the results in \\cite{EIT11}.

  5. Multilinear generalized Radon transforms and point configurations

    E-Print Network [OSTI]

    Grafakos, Loukas

    Multilinear generalized Radon transforms and point configurations Loukas Grafakos, Allan Greenleaf, Alex Iosevich and Eyvindur Palsson Abstract. We study multilinear generalized Radon transforms using for the results in [7]. 1. Introduction Linear generalized Radon transforms are operators of the form (1.1) Rf

  6. Ground Vibration Measurements at LHC Point 4

    SciTech Connect (OSTI)

    Bertsche, Kirk; /SLAC; Gaddi, Andrea; /CERN

    2012-09-17

    Ground vibration was measured at Large Hadron Collider (LHC) Point 4 during the winter shutdown in February 2012. This report contains the results, including power and coherence spectra. We plan to collect and analyze vibration data from representative collider halls to inform specifications for future linear colliders, such as ILC and CLIC. We are especially interested in vibration correlations between final focus lens locations.

  7. Surveying points in the complex projective plane

    E-Print Network [OSTI]

    Lane Hughston; Simon Salamon

    2014-10-21

    We classify SIC-POVMs of rank one in CP^2, or equivalently sets of nine equally-spaced points in CP^2, without the assumption of group covariance. If two points are fixed, the remaining seven must lie on a pinched torus that a standard moment mapping projects to a circle in R^3. We use this approach to prove that any SIC set in CP^2 is isometric to a known solution, given by nine points lying in triples on the equators of the three 2-spheres each defined by the vanishing of one homogeneous coordinate. We set up a system of equations to describe hexagons in CP^2 with the property that any two vertices are related by a cross ratio (transition probability) of 1/4. We then symmetrize the equations, factor out by the known solutions, and compute a Groebner basis to show that no SIC sets remain. We do find new configurations of nine points in which 27 of the 36 pairs of vertices of the configuration are equally spaced.

  8. A Formula for Inserting Point Masses

    E-Print Network [OSTI]

    Manwah Lilian Wong

    2010-09-08

    Let mu be a probability measure on the unit circle and nu be the measure formed by adding a pure point to mu. We give a formula for the Verblunsky coefficients of the perturbed measure, based on a result of Simon.

  9. ON LYAPUNOV FAMILIES AROUND COLLINEAR LIBRATION POINTS

    SciTech Connect (OSTI)

    Hou, X. Y.; Liu, L. [Astronomy Department, Nanjing University, Nanjing 210093 (China)], E-mail: lliu@nju.edu.cn

    2009-06-15

    Evolution details of the planar and vertical Lyapunov families around the three collinear libration points in the restricted three-body problem were studied. Researches before were generally restricted to be within the colliding orbits with the primaries and for fixed mass parameters {mu}. In this paper, members after colliding orbits were computed. With increasing {mu}, how these families evolve was studied.

  10. Emergency Preparedness Plan Horn Point Laboratory

    E-Print Network [OSTI]

    Boynton, Walter R.

    Emergency Preparedness Plan Horn Point Laboratory March 2015 Introduction This plan summarizes the actions which will be taken in preparation for and in response to emergencies impacting the regular technology security and infrastructure, business functions, and academic and research continuity. Emergencies

  11. Language Production General Points about Speech Production

    E-Print Network [OSTI]

    Coulson, Seana

    Language Production #12;General Points about Speech Production 15 speech sounds per second => 2, shall I say `t' or `d'' (Levelt) Production side has gotten less attention in Psycholinguistics than the comprehension side. Evidence for speech production behaviour has until recently relied heavily on speech errors

  12. Global Warming Observations

    E-Print Network [OSTI]

    Schofield, Jeremy

    Global Warming Observations: 1. Global temperature has been gradually rising in recent years #15 in range 8000 12000 nm { CFC's, methane and N 2 O important for global warming even though concentra- tions in concentration of \\greenhouse gases" like CO 2 What determines global temperature? Energy budget of earth: 1

  13. 10b- Bifurcations in swirling flames.key

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    levels * The FTFs between the two states also differ suggesting different thermoacoustic effects * The transition between the two states observed in the present gas...

  14. Point-to-Point Car Racing: an Initial Study of Evolution Versus Temporal Difference Learning

    E-Print Network [OSTI]

    Togelius, Julian

    Point-to-Point Car Racing: an Initial Study of Evolution Versus Temporal Difference Learning Simon, jtogel}@essex.ac.uk Abstract-- This paper considers variations on an extremely simple form of car racing-evaluation neural networks, and these were greatly superior to human drivers. Keywords: Car racing, reinforcement

  15. The Efficiency of Point-to-Point Financial Transmission Rights is Limited by the Network Topology

    E-Print Network [OSTI]

    Blumsack, Seth

    of the restructured electric power industry envisioned replacing the transmission business of a regulated utility of electric-sector restructuring would place transmission under a market regime similar to generationThe Efficiency of Point-to-Point Financial Transmission Rights is Limited by the Network Topology

  16. 2014 CATEE: Collaboration is the Key- Public/Private Partnerships 

    E-Print Network [OSTI]

    Lin, L.

    2014-01-01

    stream_source_info ESL-KT-14-11-24.pdf.txt stream_content_type text/plain stream_size 9508 Content-Encoding UTF-8 stream_name ESL-KT-14-11-24.pdf.txt Content-Type text/plain; charset=UTF-8 2014 CATEE Collaboration... is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston Energy Efficiency Programs 2000...

  17. Upconversion based receivers for quantum hacking resistant quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Gregory S. Kanter

    2015-09-21

    We propose a novel upconversion (sum frequency generation) based quantum-optical setup that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  18. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLC Jump

  19. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to the

  20. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theA

  1. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theAA

  2. Florida Keys El Coop Assn, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpAFlex Fuels Energy Jump to:Flora HomeKeys El Coop

  3. SimTable key tool for preparing, responding to wildfire

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effect Photovoltaics -7541 UnlimitedShift EndShutdownSolar PhotovoltaicSimTable key

  4. Sandia Energy - The Brain: Key To a Better Computer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities General overview of theBrain: Key To a

  5. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecoveryplanning Career Planning for theFebruary 26, 2014andKEY

  6. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclear Physics (NP)aboutRio de Janeiro,theIs Key

  7. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5

  8. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey Dates

  9. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey

  10. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenryInhibitingInteractivePGAS andUniversity IonIron is the Key to

  11. Key Publications - Natural Gas Regulation | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKey

  12. Robotics Key to Subsea Exploration | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The Energy Materials CenterRobotics Key to Subsea

  13. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  14. A look at the PGP ecosystem through the key server data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    to be challenging. GnuPG does not provide library access to low level functions that would allow parsing the data-based encryption systems use a network of key servers to share public keys. These key server operate on an add only basis, thus the data gives us access to PGP public keys from over 20 years of PGP usage. Analyzing

  15. Observations of Exoplanet Atmospheres

    E-Print Network [OSTI]

    Crossfield, Ian J M

    2015-01-01

    Detailed characterization of an extrasolar planet's atmosphere provides the best hope for distinguishing the makeup of its outer layers, and the only hope for understanding the interplay between initial composition, chemistry, dynamics & circulation, and disequilibrium processes. In recent years, some areas have seen rapid progress while developments in others have come more slowly and/or have been hotly contested. This article gives an observer's perspective on the current understanding of extrasolar planet atmospheres prior to the considerable advances expected from the next generation of observing facilities. Atmospheric processes of both transiting and directly-imaged planets are discussed, including molecular and atomic abundances, cloud properties, thermal structure, and planetary energy budgets. In the future we can expect a continuing and accelerating stream of new discoveries, which will fuel the ongoing exoplanet revolution for many years to come.

  16. Observable primordial vector modes

    E-Print Network [OSTI]

    Antony Lewis

    2004-06-04

    Primordial vector modes describe vortical fluid perturbations in the early universe. A regular solution exists with constant non-zero radiation vorticities on super-horizon scales. Baryons are tightly coupled to the photons, and the baryon velocity only decays by an order unity factor by recombination, leading to an observable CMB anisotropy signature via the Doppler effect. There is also a large B-mode CMB polarization signal, with significant power on scales larger than l~2000. This B-mode signature is distinct from that expected from tensor modes or gravitational lensing, and makes a primordial vector to scalar mode power ratio ~10^(-6) detectable. Future observations aimed at detecting large scale B-modes from gravitational waves will also be sensitive to regular vector modes at around this level.

  17. Observations on European Agriculture. 

    E-Print Network [OSTI]

    Fraps, G. S. (George Stronach)

    1911-01-01

    AS ACKICUL-I-uRAL EXPE RIMENT STATIONS bLLETIN No. 14-1 DECEMBER, 1911 Division of Chemistry Observations on European Agriculture BY G. S. FRAPS, Chemist 0 Postoffice : CULLEGE STATION; TEXAS AUSTIN. TEXAS I AUSTIN PRINTING CO:. PRINTERS... ............................................... and Conclusions 35 [Blank Page in Original Bulletin] rrvations on European Agriculture By C. S. FRAPS ie object of this Bulletin is to present such abservadons on :ulture in Europe as may offer suggestions of value to Texas - :ulturists. The writer...

  18. Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices

    SciTech Connect (OSTI)

    Sharon Kramer; Mirko Previsic; Peter Nelson; Sheri Woo

    2010-06-17

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: ? 4 wave energy generation technologies ? 3 tidal energy generation technologies ? 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal) ? 3 project sizes: pilot, small commercial, and large commercial The possible combinations total 24 wave technology scenarios and 9 tidal technology scenarios. We evaluated 3 of the 33 scenarios in detail: 1. A small commercial OPT Power Buoy project off the Humboldt County, California coast 2. A small commercial Pelamis Wave Power P-2 project off Makapu’u Point, Oahu, Hawaii 3. A pilot MCT SeaGen tidal project, sited in the Tacoma Narrows, Washington This framework document used information available from permitting documents that were written to support actual wave or tidal energy projects, but the results obtained here should not be confused with those of the permitting documents1. The main difference between this framework document and permitting documents of currently proposed pilot projects is that this framework identifies key environmental concerns and describes the next steps in addressing those concerns; permitting documents must identify effects, find or declare thresholds of significance, evaluate the effects against the thresholds, and find mitigation measures that will minimize or avoid the effects so they can be considered less-than-significant. Two methodologies, 1) an environmental effects analysis and 2) Raptools, were developed and tested to identify potential environmental effects associated with wave or tidal energy conversion projects. For the environmental effects analysis, we developed a framework based on standard risk assessment techniques. The framework was applied to the three scenarios listed above. The environmental effects analysis addressed questions such as: ? What is the temporal and spatial exposure of a species at a site? ? What are the specific potential project effects on that species? ? What measures could minimize, mitigate, or eliminate negative effects? ? Are there potential effects of the project, or species’ response to the effect, that are highly uncertain and warrant additional study? The second methodology, Raptools, is a collaborative approach useful for evaluating multiple characteristi

  19. Implementing Performance-Based Sustainability Requirements for the Low Carbon Fuel Standard – Key Design Elements and Policy Considerations

    E-Print Network [OSTI]

    Yeh, Sonia; Sumner, Daniel A.; Kaffka, Stephen R.; Ogden, J; Jenkins, Bryan M.

    2009-01-01

    Standard – Key Design Elements and Policy ConsiderationsStandard ? Key Design Elements and Policy Considerations:Standard ? Key Design Elements and Policy Considerations:

  20. Redeveloping or preserving public housing : the future of Columbia Point

    E-Print Network [OSTI]

    Lee, Sharon Hsueh-Jen

    1981-01-01

    Columbia Point, Boston's largest and most stigmatized public housing project, has been a focal point for public and private. investment strategies to create a new mixed-income residential community. Columbia Point provided ...

  1. From Point to Pixel: A Genealogy of Digital Aesthetics

    E-Print Network [OSTI]

    Hoy, Meredith Anne

    2010-01-01

    From Point to Pixel: A Genealogy of Digital Aesthetics byFrom Point to Pixel: A Genealogy of Digital Aesthetics byFrom Point to Pixel: A Genealogy of Digital Aesthetics, I

  2. Quasi-Symmetries of Determinantal Point Processes

    E-Print Network [OSTI]

    Alexander I. Bufetov

    2014-09-06

    The main result of this paper is that determinantal point processes on the real line corresponding to projection operators with integrable kernels are quasi-invariant, in the continuous case, under the group of diffeomorphisms with compact support (Theorem 1.5); in the discrete case, under the group of all finite permutations of the phase space (Theorem 1.7). The Radon-Nikodym derivative is computed explicitly and is given by a regularized multiplicative functional. Theorem 1.5 applies, in particular, to the sine-process and the Bessel point process; Theorem 1.7 to the discrete sine process and the Gamma kernel process. The paper answers a question of Grigori Olshanski.

  3. Big Rock Point severe accident management strategies

    SciTech Connect (OSTI)

    Brogan, B.A. [Consumers Power Co., Charlevoix, MI (United States); Gabor, J.R. [Dames and Moore, Westmont, IL (United States)

    1996-07-01

    December 1994, the Nuclear Energy Institute (NEI) issued guidance relative to the formal industry position on Severe Accident Management (SAM) approved by the NEI Strategic Issues Advisory Committee on November 4, 1994. This paper summarizes how Big Rock Point (BRP) has and continues to address SAM strategies. The historical accounting portion of this presentation includes a description of how the following projects identified and defined the current Big Rock Point SAM strategies: the 1981 Level 3 Probabilistic Risk Assessment performance; the development of the Plant Specific Technical Guidelines from which the symptom oriented Emergency Operating Procedures (EOPs) were developed; the Control Room Design Review; and, the recent completion of the Individual Plant Evaluation (IPE). In addition to the historical presentation deliberation, this paper the present activities that continue to stress SAM strategies.

  4. Remote temperature-set-point controller

    DOE Patents [OSTI]

    Burke, W.F.; Winiecki, A.L.

    1984-10-17

    An instrument is described for carrying out mechanical strain tests on metallic samples with the addition of means for varying the temperature with strain. The instrument includes opposing arms and associated equipment for holding a sample and varying the mechanical strain on the sample through a plurality of cycles of increasing and decreasing strain within predetermined limits, circuitry for producing an output signal representative of the strain during the tests, apparatus including a a set point and a coil about the sample for providing a controlled temperature in the sample, and circuitry interconnected between the strain output signal and set point for varying the temperature of the sample linearly with strain during the tests.

  5. Perforation of domain wall by point mass

    E-Print Network [OSTI]

    D. V. Gal'tsov; E. Yu. Melkumova; P. A. Spirin

    2013-12-30

    We investigate collision of a point particle and an infinitely thin planar domain wall interacting gravitationally within the linearized gravity in Minkowski space-time of arbitrary dimension. In this setting we are able to describe analytically the perforation of the wall by an impinging particle, showing that it is accompanied by excitation of the spherical shock branon wave propagating outwards with the speed of light. Formally, the shock wave is a free solution of the branon wave equation which has to be added to ensure the validity of the retarded solution at the perforation point. Physically, the domain wall gets excited due to the shake caused by an instantaneous change of sign of the repulsive gravitational force. This effect is shown to hold, in particular, in four space-time dimensions, being applicable to the problem of cosmological domain walls.

  6. Perforation of domain wall by point mass

    E-Print Network [OSTI]

    Gal'tsov, D V; Spirin, P A

    2013-01-01

    We investigate collision of a point particle and an infinitely thin planar domain wall interacting gravitationally within the linearized gravity in Minkowski space-time of arbitrary dimension. In this setting we are able to describe analytically the perforation of the wall by an impinging particle, showing that it is accompanied by excitation of the spherical shock branon wave propagating outwards with the speed of light. Formally, the shock wave is a free solution of the branon wave equation which has to be added to ensure the validity of the retarded solution at the perforation point. Physically, the domain wall gets excited due to the shake caused by an instantaneous change of sign of the repulsive gravitational force. This effect is shown to hold, in particular, in four space-time dimensions, being applicable to the problem of cosmological domain walls.

  7. A passive transmitter for quantum key distribution with coherent light

    E-Print Network [OSTI]

    Marcos Curty; Marc Jofre; Valerio Pruneri; Morgan W. Mitchell

    2011-08-03

    Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, since no externally driven element is required. Typical passive transmitters involve parametric down-conversion. More recently, it has been shown that phase-randomized coherent pulses also allow passive generation of decoy states and Bennett-Brassard 1984 (BB84) polarization signals, though the combination of both setups in a single passive source is cumbersome. In this paper, we present a complete passive transmitter that prepares decoy-state BB84 signals using coherent light. Our method employs sum-frequency generation together with linear optical components and classical photodetectors. In the asymptotic limit of an infinite long experiment, the resulting secret key rate (per pulse) is comparable to the one delivered by an active decoy-state BB84 setup with an infinite number of decoy settings.

  8. The role of naturally occurring waterholes in determining the distribution of Florida Key Deer 

    E-Print Network [OSTI]

    Kim, Ji Yeon

    2009-05-15

    (Big Pine Key Inn Station, 1953) Data on Big Pine Key and the Volume of Daily Fresh Water Shortage on Big Pine Key (From the Result of 1-Year Base Line Simulation)................................................................................ 26...). I used two precipitation data sets to parameterize dv1, one consisting of daily precipitation (inches) from January 1 to December 31, 1953 from the Big Pine Key Inn weather station and one from January 1 to December 31, 2001 from the Key West...

  9. EIS-0153: Niagara Import Point Project

    Broader source: Energy.gov [DOE]

    The Federal Energy Regulatory Commission prepared this statement to assess the environmental impacts of the proposed Niagara Import Point project that would construct an interstate natural gas pipeline to transport gas from Canada and domestic sources to the Northeastern United States market. The U.S. Department of Energy's Office of Fossil Energy was a cooperating agency during statement development and adopted this statement on 6/15/1990.

  10. Low-melting point heat transfer fluid

    DOE Patents [OSTI]

    Cordaro, Joseph Gabriel (Oakland, CA); Bradshaw, Robert W. (Livermore, CA)

    2010-11-09

    A low-melting point, heat transfer fluid made of a mixture of five inorganic salts including about 29.1-33.5 mol % LiNO.sub.3, 0-3.9 mol % NaNO.sub.3, 2.4-8.2 mol % KNO.sub.3, 18.6-19.9 mol % NaNO.sub.2, and 40-45.6 mol % KNO.sub.2. These compositions can have liquidus temperatures below 80.degree. C. for some compositions.

  11. High speed point derivative microseismic detector

    DOE Patents [OSTI]

    Uhl, J.E.; Warpinski, N.R.; Whetten, E.B.

    1998-06-30

    A high speed microseismic event detector constructed in accordance with the present invention uses a point derivative comb to quickly and accurately detect microseismic events. Compressional and shear waves impinging upon microseismic receiver stations disposed to collect waves are converted into digital data and analyzed using a point derivative comb including assurance of quiet periods prior to declaration of microseismic events. If a sufficient number of quiet periods have passed, the square of a two point derivative of the incoming digital signal is compared to a trip level threshold exceeding the determined noise level to declare a valid trial event. The squaring of the derivative emphasizes the differences between noise and signal, and the valid event is preferably declared when the trip threshold has been exceeded over a temporal comb width to realize a comb over a given time period. Once a trial event has been declared, the event is verified through a spatial comb, which applies the temporal event comb to additional stations. The detector according to the present invention quickly and accurately detects initial compressional waves indicative of a microseismic event which typically exceed the ambient cultural noise level by a small amount, and distinguishes the waves from subsequent larger amplitude shear waves. 9 figs.

  12. High speed point derivative microseismic detector

    DOE Patents [OSTI]

    Uhl, James Eugene (Albuquerque, NM); Warpinski, Norman Raymond (Albuquerque, NM); Whetten, Ernest Blayne (Albuquerque, NM)

    1998-01-01

    A high speed microseismic event detector constructed in accordance with the present invention uses a point derivative comb to quickly and accurately detect microseismic events. Compressional and shear waves impinging upon microseismic receiver stations disposed to collect waves are converted into digital data and analyzed using a point derivative comb including assurance of quiet periods prior to declaration of microseismic events. If a sufficient number of quiet periods have passed, the square of a two point derivative of the incoming digital signal is compared to a trip level threshold exceeding the determined noise level to declare a valid trial event. The squaring of the derivative emphasizes the differences between noise and signal, and the valid event is preferably declared when the trip threshold has been exceeded over a temporal comb width to realize a comb over a given time period. Once a trial event has been declared, the event is verified through a spatial comb, which applies the temporal event comb to additional stations. The detector according to the present invention quickly and accurately detects initial compressional waves indicative of a microseismic event which typically exceed the ambient cultural noise level by a small amount, and distinguishes the waves from subsequent larger amplitude shear waves.

  13. General relativistic observables of the GRAIL mission

    E-Print Network [OSTI]

    Turyshev, Slava G; Sazhin, Mikhail V

    2012-01-01

    We present a realization of astronomical relativistic reference frames in the solar system and its application to the GRAIL mission. We model the necessary spacetime coordinate transformations for light-trip time computations and address some practical aspects of the implementation of the resulting model. We develop all the relevant relativistic coordinate transformations that are needed to describe the motion of the GRAIL spacecraft and to compute all observable quantities. We take into account major relativistic effects contributing to the dual one-way range observable, which is derived from one-way signal travel times between the two GRAIL spacecraft. We develop a general relativistic model for this fundamental observable of GRAIL, accurate to 1 $\\mu$m. We develop and present a relativistic model for another key observable of this experiment, the dual one-way range-rate, accurate to 1 $\\mu$m/s. The presented formulation justifies the basic assumptions behind the design of the GRAIL mission. It may also be ...

  14. General relativistic observables of the GRAIL mission

    E-Print Network [OSTI]

    Slava G. Turyshev; Viktor T. Toth; Mikhail V. Sazhin

    2012-12-18

    We present a realization of astronomical relativistic reference frames in the solar system and its application to the GRAIL mission. We model the necessary spacetime coordinate transformations for light-trip time computations and address some practical aspects of the implementation of the resulting model. We develop all the relevant relativistic coordinate transformations that are needed to describe the motion of the GRAIL spacecraft and to compute all observable quantities. We take into account major relativistic effects contributing to the dual one-way range observable, which is derived from one-way signal travel times between the two GRAIL spacecraft. We develop a general relativistic model for this fundamental observable of GRAIL, accurate to 1 $\\mu$m. We develop and present a relativistic model for another key observable of this experiment, the dual one-way range-rate, accurate to 1 $\\mu$m/s. The presented formulation justifies the basic assumptions behind the design of the GRAIL mission. It may also be used to further improve the already impressive results of this lunar gravity recovery experiment after the mission is complete. Finally, we present transformation rules for frequencies and gravitational potentials and their application to GRAIL.

  15. Energy Department Authorizes Dominion Cove Point LNG to Export...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Department Authorizes Dominion Cove Point LNG to Export Liquefied Natural Gas Energy Department Authorizes Dominion Cove Point LNG to Export Liquefied Natural Gas May 7,...

  16. Fast Change Point Detection for Electricity Market Analysis

    E-Print Network [OSTI]

    Gu, William

    2014-01-01

    The trouble with electricity markets: understandingPoint Detection for Electricity Market Analysis William Gu ?Point Detection for Electricity Market Analysis William Gu,

  17. ARM Observations Projected

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden Documentation Data Management Facility PlotsProductsObservations Projected

  18. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  19. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  20. Modern hydrocracking is the key to upgrading processes

    SciTech Connect (OSTI)

    Corbett, R.A.

    1989-06-26

    Hydrocracking technology is the key to Canada's heavy oil and bitumen upgrading facilities that have recently started or are due to start up during the next few years. The upgrader at Consumers' Cooperative Refineries Ltd. in Regina Sask.; the capacity addition program (CAP) at Syncrude Canada Ltd.'s Fort McMurray, Alta., plant; Husky Oil Operations Ltd.'s Bi-Provincial upgrader to be built near Lloydminster, Sask.; and the OSLO project to be built near Fort McMurray, all rely on this modern technology for primary upgrading. All of the projects are designed to upgrade heavy oil and bitumen extracted from oil sands to a high-quality synthetic crude oil (SCO) that is a blend of high-quality naphtha and gas oil.

  1. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  2. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  3. Passive decoy state quantum key distribution with practical light sources

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Bing Qi; Tobias Moroder

    2009-11-14

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. While active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty {\\it et al.}, Opt. Lett. {\\bf 34}, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy state setup with an infinite number of decoy settings. In this paper we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photo-detectors. In particular, we consider sources emitting thermal states, phase randomized WCP, and strong coherent light in combination with several types of photo-detectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photo-detectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret ket rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  4. H-point exciton transitions in bulk MoS{sub 2}

    SciTech Connect (OSTI)

    Saigal, Nihit; Ghosh, Sandip

    2015-05-04

    Reflectance and photoreflectance spectrum of bulk MoS{sub 2} around its direct bandgap energy have been measured at 12?K. Apart from spectral features due to the A and B ground state exciton transitions at the K-point of the Brillouin zone, one observes additional features at nearby energies. Through lineshape analysis the character of two prominent additional features are shown to be quite different from that of A and B. By comparing with reported electronic band structure calculations, these two additional features are identified as ground state exciton transitions at the H-point of the Brillouin zone involving two spin-orbit split valance bands. The excitonic energy gap at the H-point is 1.965?eV with a valance bands splitting of 185?meV. While at the K-point, the corresponding values are 1.920?eV and 205?meV, respectively.

  5. Wax Point Determinations Using Acoustic Resonance Spectroscopy

    SciTech Connect (OSTI)

    Bostick, D.T.; Jubin, R.T.; Schmidt, T.W.

    2001-06-01

    The thermodynamic characterization of the wax point of a given crude is essential in order to maintain flow conditions that prevent plugging of undersea pipelines. This report summarizes the efforts made towards applying an Acoustic Cavity Resonance Spectrometer (ACRS) to the determination of pressures and temperatures at which wax precipitates from crude. Phillips Petroleum Company, Inc., the CRADA participant, supplied the ACRS. The instrumentation was shipped to Dr. Thomas Schmidt of ORNL, the CRADA contractor, in May 2000 after preliminary software development performed under the guidance of Dr. Samuel Colgate and Dr. Evan House of the University of Florida, Gainesville, Fl. Upon receipt it became apparent that a number of modifications still needed to be made before the ACRS could be precisely and safely used for wax point measurements. This report reviews the sequence of alterations made to the ACRS, as well as defines the possible applications of the instrumentation once the modifications have been completed. The purpose of this Cooperative Research and Development Agreement (CRADA) between Phillips Petroleum Company, Inc. (Participant) and Lockheed Martin Energy Research Corporation (Contractor) was the measurement of the formation of solids in crude oils and petroleum products that are commonly transported through pipelines. This information is essential in the proper design, operation and maintenance of the petroleum pipeline system in the United States. Recently, new petroleum discoveries in the Gulf of Mexico have shown that there is a potential for plugging of undersea pipeline because of the precipitation of wax. It is important that the wax points of the expected crude oils be well characterized so that the production facilities for these new wells are capable of properly transporting the expected production. The goal of this work is to perform measurements of solids formation in crude oils and petroleum products supplied by the Participant. It is anticipated that these data will be used in the design of new production facilities and in the development of thermodynamic models that describe the behavior of wax-saturated petroleum.

  6. Tipping Point Renewable Energy | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEt Al., 2013)Open EnergyTinox Jump to: navigation, searchTipping Point

  7. Global integrators based on equispaced points 

    E-Print Network [OSTI]

    Kirker, Martha Jane

    1966-01-01

    . Sims for the patient and understanding guidance I received during the preparation of this thesis. TABLE OF CONTENTS Chapter Page I. INTRODUCTION . . . . . . . . . . . . . 1 II. GLOBAL INTEGRATORS . ~ . ~ ~ ~ ~ ~ ~ ~ ~ e ~ 3 III. PROGRAM... DESCRIPTION . . . ~ 13 IVo RESULTS a e a a ~ o ~ a ~ ~ ~ ~ e ~ e ~ 18 BIBLIOGRAPHY 20 APPENDIX 21 C HAP TER I INTRODUCTION A set of functions wl(x) wg(x) w +1(x) and n+1 a set of points xl, x2, --- x +1 can be found such that n&1 f(n)du = S wi...

  8. FortyPoint Seven | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainable Urban TransportFortistar LLC Jump to: navigation, search Name:FortyPoint

  9. Point Bio Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975) |Texas: Energy Resources JumpOhio:Pod GeneratingPoint Bio

  10. Beryllium Program Points of Contact - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAudits & InspectionsBeryllium and Chronic BerylliumProgramProgram Points

  11. Star Point Wind Farm | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EIS ReportEurope GmbHSoloPage EditStamford,Energy Center Wind FarmPoint

  12. Starting Points | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en Signature ofSebStarting Points |

  13. power point | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowa (UtilityMichigan)data book Homefuelleasingoutages Homeplanningpower point

  14. Microsoft PowerPoint - BSQ-300.pptx

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPAEnergy May 28MarEnergy Microsoft PowerPoint -BSQ-300

  15. Points of Contact and Privacy Act Advisory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/OPerformancePi Day Pi Day Pi DayPlasmaandAbout UsPoints

  16. Modeling users' mobility among WiFi access points Minkyong Kim

    E-Print Network [OSTI]

    Kim, Minkyong

    in terms of the influx and outflux of users between access points (APs). We first counted the hourly visits to APs in the syslog messages recorded at APs. We found that the number of hourly visits has a periodic repetition of 24 hours. Based on this observation, we aggregated multiple days into a single day by adding

  17. Observations of Accreting Pulsars

    E-Print Network [OSTI]

    Lars Bildsten; Deepto Chakrabarty; John Chiu; Mark H. Finger; Danny T. Koh; Robert W. Nelson; Thomas A. Prince; Bradley C. Rubin; D. Matthew Scott; Mark Stollberg; Brian A. Vaughan; Colleen A. Wilson; Robert B. Wilson

    1997-07-22

    We summarize five years of continuous monitoring of accretion-powered pulsars with the Burst and Transient Source Experiment (BATSE) on the Compton Gamma Ray Observatory. Our 20-70 keV observations have determined or refined the orbital parameters of 13 binaries, discovered 5 new transient accreting pulsars, measured the pulsed flux history during outbursts of 12 transients (GRO J1744-28, 4U 0115+634, GRO J1750-27, GS 0834-430, 2S 1417-624, GRO J1948+32, EXO 2030+375, GRO J1008-57, A 0535+26, GRO J2058+42, 4U 1145-619 and A 1118-616), and also measured the accretion torque history of during outbursts of 6 of those transients whose orbital parameters were also known. We have also continuously measured the pulsed flux and spin frequency for eight persistently accreting pulsars (Her X-1, Cen X-3, Vela X-1, OAO 1657-415, GX 301-2, 4U 1626-67, 4U 1538-52, and GX 1+4). Because of their continuity and uniformity over a long baseline, BATSE observations have provided new insights into the long-term behavior of accreting magnetic stars. We have found that all accreting pulsars show stochastic variations in their spin frequencies and luminosities, including those displaying secular spin-up or spin-down on long time scales, blurring the conventional distinction between disk-fed and wind-fed binaries. Pulsed flux and accretion torque are strongly correlated in outbursts of transient accreting pulsars, but uncorrelated, or even anticorrelated, in persistent sources.

  18. Event Year Requirements Induction 1 mandatory; 10 training points

    E-Print Network [OSTI]

    Obbard, Darren

    /masterclass 30 training points (module I); 50 training points (module I and II) 20 hours Training strand 3Event Year Requirements Induction 1 mandatory; 10 training points Symposium All mandatory; 20 training points in Y1 only Training strand 1: Research skills Thematic group meetings (4) Advanced

  19. Complex systems analysis of series of blackouts: cascading failure, critical points, and self-organization

    SciTech Connect (OSTI)

    Dobson, Ian [University of Wisconsin, Madison; Carreras, Benjamin A [ORNL; Lynch, Vickie E [ORNL; Newman, David E [University of Alaska

    2007-01-01

    We give an overview of a complex systems approach to large blackouts of electric power transmission systems caused by cascading failure. Instead of looking at the details of particular blackouts, we study the statistics and dynamics of series of blackouts with approximate global models. Blackout data from several countries suggest that the frequency of large blackouts is governed by a power law. The power law makes the risk of large blackouts consequential and is consistent with the power system being a complex system designed and operated near a critical point. Power system overall loading or stress relative to operating limits is a key factor affecting the risk of cascading failure. Power system blackout models and abstract models of cascading failure show critical points with power law behavior as load is increased. To explain why the power system is operated near these critical points and inspired by concepts from self-organized criticality, we suggest that power system operating margins evolve slowly to near a critical point and confirm this idea using a power system model. The slow evolution of the power system is driven by a steady increase in electric loading, economic pressures to maximize the use of the grid, and the engineering responses to blackouts that upgrade the system. Mitigation of blackout risk should account for dynamical effects in complex self-organized critical systems. For example, some methods of suppressing small blackouts could ultimately increase the risk of large blackouts.

  20. Constraint effects observed in crack initiation stretch

    SciTech Connect (OSTI)

    Lambert, D.M.; Ernst, H.A.

    1995-12-31

    The current paper characterizes constraint in fracture: J-modified resistance (Jr) curves were developed for two tough structural materials, 6061-T651 (aluminum) and IN718-STA1 (nickel-base superalloy). A wide variety of configurations was tested to consider load configurations from bending to tension including three specimen types (compact tension, center-crack tension, and single-edge notched tension), and a range of ligament lengths and thicknesses, as well as side-grooved and smooth-sided ligaments. The Jr curves exhibited an inflection point after some crack extension, and the data were excluded beyond the inflection. Qualified Jr curves for the two materials showed similar behavior, but R-curves were identical for equal ligament length-to-thickness ratio (RL), for the aluminum alloy, with increasing slope for increasing RL, while for the nickel, the resistance curves aligned for equal ligament thickness, B, and the slope increased for decreasing B. Displacements at the original crack tip (CToD) were recorded throughout the test for several specimens. CToD-versus-crack extension curves were developed, and data were excluded beyond the inflection point (as with the Jr curves). The data collapsed into two distinct curves, thought to represent the surface, plane stress effect and the central, plane strain effect. This was observed for both materials. A technique called profiling is presented for the aluminum alloy only, where the crack face displacements are recorded at the final point of the test as a function of the position throughout the crack cavity, along with an effort to extract the observations in a usable form. Displacements were consistent throughout the cross-section at and behind the original crack tip. In the region where the crack grew, this displacement was developed by a combination of stretch and crack growth. The stretch required to initiate crack extension was a function of the depth beneath the surface into the cross-section.

  1. The Accuracy of the Astronomical Observations of Lewis and Clark*

    E-Print Network [OSTI]

    asterisk

    2000-05-09

    These search terms have been highlighted: sextant, horizon, preston ... latitude and longitude, at all remarkable points on the river. . . . and. Your observations ..... and the planets, and even the fixed stars, are also subject to parallax,. but those ..... The idea for the Lewis and Clark expedition originated with President. Thomas ...

  2. High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors

    E-Print Network [OSTI]

    Spellmeyer, Neal W.

    We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

  3. Blast furnace key to earth's birth P11 Balancing the body clock P14

    E-Print Network [OSTI]

    Liley, David

    Newage Blast furnace key to earth's birth P11 Balancing the body clock P14 Research readies to the stars Julian criBB 11 blast furnace holds key to earth's birth Julian criBB 12 agency audit raises

  4. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  5. The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks #

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks # Johann Großsch, Security. Keywords Wireless networking, security protocols, cryptography, key establishment, energy Inffeldgasse 16a, A--8010 Graz, Austria ABSTRACT Wireless sensor nodes generally face serious limitations

  6. A World Wide Web key to the grass genera of Texas 

    E-Print Network [OSTI]

    Dawson, John Edward

    2001-01-01

    An illustrated dichotomous key to the grass genera of Texas is presented in hypertext markup language (HTML) format. The key combines scanned images of inflorescences, digitized images of dissected spikelets, text descriptions ...

  7. ASTROPHYSICS Thesaurus of key words used in the annual subject indexes

    E-Print Network [OSTI]

    Xu, Ren-Xin

    ASTRONOMY AND ASTROPHYSICS Thesaurus of key words used in the annual subject indexes (valid from processing 03.20.2 Techniques: interferometric 03.20.3 Techniques: miscellaneous #12;2 Thesaurus of key words

  8. Large trees-key climate influencers-die first in drought

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Large trees-key climate influencers-die first in drought Large trees-key climate influencers-die first in drought A team of researchers studied forests worldwide, ranging from...

  9. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  10. Key issues of ultraviolet radiation of OH at high altitudes

    SciTech Connect (OSTI)

    Zhang, Yuhuai; Wan, Tian; Jiang, Jianzheng; Fan, Jing

    2014-12-09

    Ultraviolet (UV) emissions radiated by hydroxyl (OH) is one of the fundamental elements in the prediction of radiation signature of high-altitude and high-speed vehicle. In this work, the OH A{sup 2}?{sup +}?X{sup 2}? ultraviolet emission band behind the bow shock is computed under the experimental condition of the second bow-shock ultraviolet flight (BSUV-2). Four related key issues are discussed, namely, the source of hydrogen element in the high-altitude atmosphere, the formation mechanism of OH species, efficient computational algorithm of trace species in rarefied flows, and accurate calculation of OH emission spectra. Firstly, by analyzing the typical atmospheric model, the vertical distributions of the number densities of different species containing hydrogen element are given. According to the different dominating species containing hydrogen element, the atmosphere is divided into three zones, and the formation mechanism of OH species is analyzed in the different zones. The direct simulation Monte Carlo (DSMC) method and the Navier-Stokes equations are employed to compute the number densities of the different OH electronically and vibrationally excited states. Different to the previous work, the trace species separation (TSS) algorithm is applied twice in order to accurately calculate the densities of OH species and its excited states. Using a non-equilibrium radiation model, the OH ultraviolet emission spectra and intensity at different altitudes are computed, and good agreement is obtained with the flight measured data.

  11. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  12. Do myoepithelial cells hold the key for breast tumorprogression?

    SciTech Connect (OSTI)

    Polyak, Kornelia; Hu, Min

    2005-11-18

    Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

  13. Time-cost analysis of a quantum key distribution system clocked at 100 MHz

    E-Print Network [OSTI]

    Xiaofan Mo; Itzel Lucio Martinez; Philip Chan; Chris Healey; Steve Hosier; Wolfgang Tittel

    2011-05-18

    We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

  14. Low-melting point heat transfer fluid

    DOE Patents [OSTI]

    Cordaro, Joseph G. (Oakland, CA); Bradshaw, Robert W. (Livermore, CA)

    2011-04-12

    A low-melting point, heat transfer fluid comprising a mixture of LiNO.sub.3, NaNO.sub.3, KNO.sub.3, NaNO.sub.2 and KNO.sub.2 salts where the Li, Na and K cations are present in amounts of about 20-33.5 mol % Li, about 18.6-40 mol % Na, and about 40-50.3 mol % K and where the nitrate and nitrite anions are present in amounts of about 36-50 mol % NO.sub.3, and about 50-62.5 mol % NO.sub.2. These compositions can have liquidus temperatures between 70.degree. C. and 80.degree. C. for some compositions.

  15. A Thesis for the Degree of Master An Efficient Tree-based Group Key

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master An Efficient Tree-based Group Key Agreement using Bilinear Map-based Group Key Agreement using Bilinear Map #12;An Efficient Tree-based Group Key Agreement using Bilinear in partial fulfillment of the require- ments for the degree of Master of Science in the School of Engineering

  16. A Thesis for the Degree of Master A New Group Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master A New Group Key Agreement Scheme based on Ternary Tree Sang-won Lee School of Engineering Information and Communications University 2003 #12;A New Group Key Agreement Scheme based on Ternary Tree #12;A New Group Key Agreement Scheme based on Ternary Tree Advisor

  17. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  18. Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2 , Jun Ao3 , and Jianhua Li1 1 School@263.net Abstract. Kallahalla et al. presented a RSA-based Forward Key Rotation mechanism in secure storage present a Forward Key Rotation storage scheme based on discrete logarithm and discuss its security

  19. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

    E-Print Network [OSTI]

    State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University Experimental for energy dissipation mechanism. State Key Laboratory of Disaster Reduction in Civil Engineering #12;· Scope on Horizontal connection. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

  20. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek1, , S presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers

  1. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek 1,# , S presents the first scalable, e#cient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2­KE/3­KE) protocols. We propose three di#erent compilers where

  2. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  3. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12;A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt1,buchmann}@cdc.informatik.tu-darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  4. TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen-way trapdoor function, and then propose a new multivariate public key cryptosystem called TOT, which can though C was broken, its high speed has been affirmed). Keywords: TOT; multivariate public key

  5. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12; A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt 1,buchmann}@cdc.informatik.tu­darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  6. A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the

    E-Print Network [OSTI]

    Zdun, Uwe

    A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise in (all) the new key technology areas, it was hard for the management to estimate which new technologies, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale

  7. A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner Hamburg in the ubiquitous and pervasive comput- ing setting is secure key exchange. The restrictions moti- vate-core in ¢¡¤£¦¥¨§ -CMOS technology are evaluated. 1. Introduction In ubiquitous and pervasive computing scenarios, key

  8. Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships Mohammad, ymu}@uow.edu.au Abstract. In this paper, we revisit security notions for dedicated-key hash functions notions for dedicated-key hash functions. The provision of this set of enhanced properties has been

  9. Microsoft PowerPoint - Sandia CREW 2013 Wind Plant Reliability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    downtime event Some events automatically reset, others need intervention Event & SCADA Data Source: Data represents 327,000 turbine-days Key metrics all slightly...

  10. Microsoft PowerPoint - Sandia CREW 2012 Wind Plant Reliability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    downtime event Some events automatically reset, others need intervention Event & SCADA Data Source: Data represents 180,000 turbine-days Key metrics all improved,...

  11. EERE PowerPoint 97-2004 Template: Green Version

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE Geothermal Office eere.energy.gov RelevanceImpact of Research Objectives: * Optimal hydraulic connectivity between wells is the key to geothermal reservoir efficiency. Tracer...

  12. Path dependent scaling of geometric phase near a quantum multi-critical point

    E-Print Network [OSTI]

    Ayoti Patra; Victor Mukherjee; Amit Dutta

    2011-03-30

    We study the geometric phase of the ground state in a one-dimensional transverse XY spin chain in the vicinity of a quantum multi-critical point. We approach the multi-critical point along different paths and estimate the geometric phase by applying a rotation in all spins about z-axis by an angle $\\eta$. Although the geometric phase itself vanishes at the multi-critical point, the derivative with respect to the anisotropy parameter of the model shows peaks at different points on the ferromagnetic side close to it where the energy gap is a local minimum; we call these points `quasi-critical'. The value of the derivative at any quasi-critical point scales with the system size in a power-law fashion with the exponent varying continuously with the parameter $\\alpha$ that defines a path, upto a critical value $\\alpha = \\alpha_{c}=2$. For $\\alpha > \\alpha_{c}$, or on the paramagnetic side no such peak is observed. Numerically obtained results are in perfect agreement with analytical predictions.

  13. Key establishment à la Merkle in a quantum world

    E-Print Network [OSTI]

    Gilles Brassard; Peter Hoyer; Kassem Kalach; Marc Kaplan; Sophie Laplante; Louis Salvail

    2015-02-13

    In 1974, Ralph Merkle proposed the first unclassified scheme for secure communications over insecure channels. When legitimate communicating parties are willing to spend an amount of computational effort proportional to some parameter N, an eavesdropper cannot break into their communication without spending a time proportional to N^2, which is quadratically more than the legitimate effort. Two of us showed in 2008 that Merkle's schemes are completely insecure against a quantum adversary, but that their security can be partially restored if the legitimate parties are also allowed to use quantum computation: the eavesdropper needed to spend a time proportional to N^{3/2} to break our earlier quantum scheme. Furthermore, all previous classical schemes could be broken completely by the onslaught of a quantum eavesdropper and we conjectured that this is unavoidable. We give now two novel key establishment schemes in the spirit of Merkle's. The first one can be broken by a quantum adversary who makes an effort proportional to N^{5/3}, which is the optimal attack against this scheme. Our second scheme is purely classical, yet it cannot be broken by a quantum eavesdropper who is only willing to expend an effort proportional to that of the legitimate parties. We then introduce two families of more elaborate protocols. The first family consists in quantum protocols whose security is arbitrarily close to quadratic in the query complexity model. The second is a family of classical protocols whose security against a quantum adversary is arbitrarily close to N^{3/2} in the same model.

  14. Chandra Orion Ultradeep Project: Observations and Source Lists

    E-Print Network [OSTI]

    Getman, K V; Broos, P S; Grosso, N; Tsujimoto, M; Townsley, L K; Garmire, G P; Kästner, J H; Li, J; Harnden, F R; Wolk, S; Murray, S S; Lada, C J; Münch, A; McCaughrean, M J; Meeus, G; Damiani, F; Micela, G; Sciortino, S; Bally, J; Hillenbrand, L A; Herbst, W; Preibisch, T; Feigelson, E D

    2004-01-01

    We present a description of the data reduction methods and the derived catalog of more than 1600 X-ray point sources from the exceptionally deep January 2003 Chandra X-ray Observatory observation of the Orion Nebula Cluster and embedded populations around OMC-1. The observation was obtained with Chandra's Advanced CCD Imaging Spectrometer (ACIS) and has been nicknamed the Chandra Orion Ultradeep Project (COUP). With an 838 ks exposure made over a continuous period of 13.2 days, the COUP observation provides the most uniform and comprehensive dataset on the X-ray emission of normal stars ever obtained in the history of X-ray astronomy.

  15. Chandra Orion Ultradeep Project: Observations and Source Lists

    E-Print Network [OSTI]

    K. V. Getman; E. Flaccomio; P. S. Broos; N. Grosso; M. Tsujimoto; L. Townsley; G. P. Garmire; J. Kastner; J. Li; F. R. Harnden, Jr.; S. Wolk; S. S. Murray; C. J. Lada; A. A. Muench; M. J. McCaughrean; G. Meeus; F. Damiani; G. Micela; S. Sciortino; J. Bally; L. A. Hillenbrand; W. Herbst; T. Preibisch; E. D. Feigelson

    2004-10-06

    We present a description of the data reduction methods and the derived catalog of more than 1600 X-ray point sources from the exceptionally deep January 2003 Chandra X-ray Observatory observation of the Orion Nebula Cluster and embedded populations around OMC-1. The observation was obtained with Chandra's Advanced CCD Imaging Spectrometer (ACIS) and has been nicknamed the Chandra Orion Ultradeep Project (COUP). With an 838 ks exposure made over a continuous period of 13.2 days, the COUP observation provides the most uniform and comprehensive dataset on the X-ray emission of normal stars ever obtained in the history of X-ray astronomy.

  16. Two-point derivative dispersion relations

    E-Print Network [OSTI]

    Erasmo Ferreira; Javier Sesma

    2014-03-24

    A new derivation is given for the representation, under certain conditions, of the integral dispersion relations of scattering theory through local forms. The resulting expressions have been obtained through an independent procedure to construct the real part, and consist of new mathematical structures of double infinite summations of derivatives. In this new form the derivatives are calculated at the generic value of the energy $E$ and separately at the reference point $E=m$ that is the lower limit of the integration. This new form may be more interesting in certain circumstances and directly shows the origin of the difficulties in convergence that were present in the old truncated forms called standard-DDR. For all cases in which the reductions of the double to single sums were obtained in our previous work, leading to explicit demonstration of convergence, these new expressions are seen to be identical to the previous ones. We present, as a glossary, the most simplified explicit results for the DDR's in the cases of imaginary amplitudes of forms $(E/m)^\\lambda[\\ln (E/m)]^n$, that cover the cases of practical interest in particle physics phenomenology at high energies. We explicitly study the expressions for the cases with $\\lambda$ negative odd integers, that require identification of cancelation of singularities, and provide the corresponding final results.

  17. on equilibrium points of logarithmic and newtonian potentials

    E-Print Network [OSTI]

    2006-07-18

    Thus the question is whether such a field must always have an equilibrium point, that is a point upon which a free electron (or wire) once placed would remain.

  18. Scott Runnels of Computational Physics to teach at West Point

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    at West Point Runnels has been selected for a two-year faculty post in the Department of Physics and Nuclear Engineering at West Point. March 19, 2013 Scott Runnels Scott Runnels...

  19. Improvements in floating point addition/subtraction operations

    DOE Patents [OSTI]

    Farmwald, P.M.

    1984-02-24

    Apparatus is described for decreasing the latency time associated with floating point addition and subtraction in a computer, using a novel bifurcated, pre-normalization/post-normalization approach that distinguishes between differences of floating point exponents.

  20. A Martingale Approach to Point Processes in the Plane

    E-Print Network [OSTI]

    Merzbach, Ely; Nualart, David

    1988-02-05

    A rigorous definition of two-parameter point processes is given as a distribution of a denumerable number of random points in the plane. A characterization with stopping lines and relation with predictability are obtained. Using the one...

  1. Period tripling accumulation point for complexified Henon map

    E-Print Network [OSTI]

    O. B. Isaeva; S. P. Kuznetsov

    2005-09-06

    Accumulation point of period-tripling bifurcations for complexified Henon map is found. Universal scaling properties of parameter space and Fourier spectrum intrinsic to this critical point is demonstrated.

  2. Physically Observable Cryptography Silvio Micali

    E-Print Network [OSTI]

    Reyzin, Leonid

    Physically Observable Cryptography Silvio Micali Leonid Reyzin November 29, 2003 Abstract.) inherent in the physical execution of any cryptographic algorithm. Such "physical observation attacks mathematically impregnable systems. The great practicality and the inherent availability of physical attacks

  3. CenterPoint Energy Low-Rise Multi Family Program

    Broader source: Energy.gov [DOE]

    Note: This Incentive is only available to customers in the CenterPoint Energy Houston electric territory.

  4. CenterPoint Energy Healthcare Energy Efficiency Program

    Broader source: Energy.gov [DOE]

    Note: Program is only available to electric customers in CenterPoint Energy's service territory (greater Houston, Texas area)

  5. Key residues for the oligomerization of A{beta}42 protein in Alzheimer's disease

    SciTech Connect (OSTI)

    Ngo, Sam [Department of Neurology, Brain Research Institute, Molecular Biology Institute, University of California, Los Angeles, CA 90095 (United States)] [Department of Neurology, Brain Research Institute, Molecular Biology Institute, University of California, Los Angeles, CA 90095 (United States); Guo, Zhefeng, E-mail: zhefeng@ucla.edu [Department of Neurology, Brain Research Institute, Molecular Biology Institute, University of California, Los Angeles, CA 90095 (United States)] [Department of Neurology, Brain Research Institute, Molecular Biology Institute, University of California, Los Angeles, CA 90095 (United States)

    2011-10-28

    Highlights: Black-Right-Pointing-Pointer A{beta} oligomers are neurotoxins and likely the causing agents for Alzheimer's disease. Black-Right-Pointing-Pointer A{beta}42 fusion protein form globular oligomers. Black-Right-Pointing-Pointer A{beta}42 fusion protein oligomers contain SDS-resistant tetramers and hexamers. Black-Right-Pointing-Pointer Cysteine substitutions at residues 31, 32, 34, 39-41 disrupt A{beta}42 oligomerization. -- Abstract: Deposition of amyloid fibrils consisting of amyloid {beta} (A{beta}) protein as senile plaques in the brain is a pathological hallmark of Alzheimer's disease. However, a growing body of evidence shows that soluble A{beta} oligomers correlate better with dementia than fibrils, suggesting that A{beta} oligomers may be the primary toxic species. The structure and oligomerization mechanism of these A{beta} oligomers are crucial for developing effective therapeutics. Here we investigated the oligomerization of A{beta}42 in the context of a fusion protein containing GroES and ubiquitin fused to the N-terminus of A{beta} sequence. The presence of fusion protein partners, in combination with a denaturing buffer containing 8 M urea at pH 10, is unfavorable for A{beta}42 aggregation, thus allowing only the most stable structures to be observed. Transmission electron microscopy showed that A{beta}42 fusion protein formed globular oligomers, which bound weakly to thioflavin T and Congo red. SDS-PAGE shows that A{beta}42 fusion protein formed SDS-resistant hexamers and tetramers. In contrast, A{beta}40 fusion protein remained as monomers on SDS gel, suggesting that the oligomerization of A{beta}42 fusion protein is not due to the fusion protein partners. Cysteine scanning mutagenesis at 22 residue positions further revealed that single cysteine substitutions of the C-terminal hydrophobic residues (I31, I32, L34, V39, V40, and I41) led to disruption of hexamer and tetramer formation, suggesting that hydrophobic interactions between these residues are most critical for A{beta}42 oligomerization.

  6. Chaos, Dirac observables and constraint quantization

    E-Print Network [OSTI]

    Bianca Dittrich; Philipp A. Hoehn; Tim A. Koslowski; Mike I. Nelson

    2015-08-08

    There is good evidence that full general relativity is non-integrable or even chaotic. We point out the severe repercussions: differentiable Dirac observables and a reduced phase space do not exist in non-integrable constrained systems and are thus unlikely to occur in a generic general relativistic context. Instead, gauge invariant quantities generally become discontinuous, thus not admitting Poisson-algebraic structures and posing serious challenges to a quantization. Non-integrability also renders the paradigm of relational dynamics cumbersome, thereby straining common interpretations of the dynamics. We illustrate these conceptual and technical challenges with simple toy models. In particular, we exhibit reparametrization invariant models which fail to be integrable and, as a consequence, can either not be quantized with standard methods or lead to sick quantum theories without a semiclassical limit. These troubles are qualitatively distinct from semiclassical subtleties in unconstrained quantum chaos and can be directly traced back to the scarcity of Dirac observables. As a possible resolution, we propose to change the method of quantization by refining the configuration space topology until the generalized observables become continuous in the new topology and can acquire a quantum representation. This leads to the polymer quantization method underlying loop quantum cosmology and gravity. Remarkably, the polymer quantum theory circumvents the problems of the quantization with smooth topology, indicating that non-integrability and chaos, while a challenge, may not be a fundamental obstruction for quantum gravity.

  7. Sur les surfaces lorentziennes compactes sans points conjugus

    E-Print Network [OSTI]

    Mounoud, Pierre

    Sur les surfaces lorentziennes compactes sans points conjugués CHRISTOPHE BAVARD PIERRE MOUNOUD Nous prouvons l'existence de métriques sans points conjugués dans toute com- posante connexe de l lorentziens sans points conjugués non plats contraste avec la situation riemannienne (théorème de E. Hopf). We

  8. SPATIAL POINT PROCESSES AND GRAPH BASED STATISTICAL FEATURES

    E-Print Network [OSTI]

    Jyväskylä, University of

    2010 2000 Mathematics Subject Classification. 60G55, 62-07, 62M30. ISSN 1457-9235 #12;SPATIAL POINT Classification. 60G55, 62-07, 62M30. 1 #12;Spatial point processes and graph based statistical features Tuomas library has been developed for the computation of the graph-based summaries. Keywords: Spatial point

  9. Coarser connected topologies and non-normality points

    E-Print Network [OSTI]

    Yengulalp, Lynne Christine

    2009-01-01

    point of the Stone-Cech remainder of a space a non-normality point of the remainder? We will discuss the question in the case that X is a discrete space and then when X is a metric space without isolated points. We show that under certain set...

  10. COE March 4, 2009 Fractal Point Events in Physics, Biology,

    E-Print Network [OSTI]

    Teich, Malvin C.

    -CONVERSION: ENTANGLED PHOTONS Laser c(2) Crystal Signal Idler Pump kr wr r ks ws s ki wi i wr = ws + wi RANDOM POINT EVENTS IN NEUROPHYSIOLOGY WHAT ARE THE COUNTING STATISTICS OF THESE POINT EVENTS? #12;COE ­ March 4, 2009 COUNTING STATISTICS FOR POINT EVENTS IN THE MAMMALIAN AUDITORY SYSTEM Eighth

  11. Seven points in P2 and the universal Kummer threefold

    E-Print Network [OSTI]

    California at Berkeley, University of

    Sturmfels (Seven points in P2 and the universal Kummer threefoldSep 27, 2012 6 / 17 #12;Weyl group on P6Seven points in P2 and the universal Kummer threefold Qingchun Ren UC Berkeley Joint work Sam, Gus Schrader and Bernd Sturmfels (Seven points in P2 and the universal Kummer threefoldSep 27

  12. Access Point Selection for Improving Throughput Fairness in Wireless LANs

    E-Print Network [OSTI]

    Siris, Vasilios A.

    Access Point Selection for Improving Throughput Fairness in Wireless LANs Vasilios A. Siris investigate the problem of access point selection in wireless LANs based on the IEEE 802.11 standard, when solely at the wireless stations, which passively monitor the activity of each access point's channel

  13. Best Entry Points for Structured Document Retrieval Part I: Characteristics

    E-Print Network [OSTI]

    Lalmas, Mounia

    Best Entry Points for Structured Document Retrieval ­ Part I: Characteristics Jane Reida , Mounia documents. This paper examines the concept of best entry points, which are document components from which investigates the basic characteristics of best entry points. Keywords: Structured document retrieval, focussed

  14. An Evaluation of Volumetric Interest Points University of Cambridge

    E-Print Network [OSTI]

    Martin, Ralph R.

    An Evaluation of Volumetric Interest Points Tsz-Ho Yu University of Cambridge Cambridge, UK thy23 the first performance eval- uation of interest points on scalar volumetric data. Such data encodes 3D shape detectors of interest points in volumetric data, in terms of repeatability, number and nature of interest

  15. Redevelopment and the Politics of Place in Bayview-Hunters Point

    E-Print Network [OSTI]

    Dillon, Lindsey

    2011-01-01

    2011. 2011. Hunters Point Shipyard: A Shifting Landscape.Point/Hunters Point Shipyard Phase II: Urban Design1973. Hunters Point Naval Shipyard Economic Re-Use Study.

  16. Break-Even Cost for Residential Solar Water Heating in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Cassard, H.; Denholm, P.; Ong, S.

    2011-02-01

    This paper examines the break-even cost for residential rooftop solar water heating (SWH) technology, defined as the point where the cost of the energy saved with a SWH system equals the cost of a conventional heating fuel purchased from the grid (either electricity or natural gas). We examine the break-even cost for the largest 1,000 electric and natural gas utilities serving residential customers in the United States as of 2008. Currently, the break-even cost of SWH in the United States varies by more than a factor of five for both electricity and natural gas, despite a much smaller variation in the amount of energy saved by the systems (a factor of approximately one and a half). The break-even price for natural gas is lower than that for electricity due to a lower fuel cost. We also consider the relationship between SWH price and solar fraction and examine the key drivers behind break-even costs. Overall, the key drivers of the break-even cost of SWH are a combination of fuel price, local incentives, and technical factors including the solar resource location, system size, and hot water draw.

  17. Compound nucleus decay: Comparison between saddle point and scission point barriers

    SciTech Connect (OSTI)

    Santos, T. J.; Carlson, B. V.

    2014-11-11

    One of the principal characteristics of nuclear multifragmentation is the emission of complex fragments of intermediate mass. An extension of the statistical multifragmentation model has been developed, in which the process can be interpreted as the near simultaneous limit of a series of sequential binary decays. In this extension, intermediate mass fragment emissions are described by expressions almost identical to those of light particle emission. At lower temperatures, similar expressions have been shown to furnish a good description of very light intermediate mass fragment emission but not of the emission of heavier fragments, which seems to be determined by the transition density at the saddle-point rather than at the scission point. Here, we wish to compare these different formulations of intermediate fragmment emission and analyze the extent to which they remain distinguishable at high excitation energy.

  18. Dual-domain point diffraction interferometer

    DOE Patents [OSTI]

    Naulleau, Patrick P. (5239 Miles Ave., Apt. A, Oakland, CA 94618); Goldberg, Kenneth Alan (1195 Keeler Ave., Berkeley, CA 94708)

    2000-01-01

    A hybrid spatial/temporal-domain point diffraction interferometer (referred to as the dual-domain PS/PDI) that is capable of suppressing the scattered-reference-light noise that hinders the conventional PS/PDI is provided. The dual-domain PS/PDI combines the separate noise-suppression capabilities of the widely-used phase-shifting and Fourier-transform fringe pattern analysis methods. The dual-domain PS/PDI relies on both a more restrictive implementation of the image plane PS/PDI mask and a new analysis method to be applied to the interferograms generated and recorded by the modified PS/PDI. The more restrictive PS/PDI mask guarantees the elimination of spatial-frequency crosstalk between the signal and the scattered-light noise arising from scattered-reference-light interfering with the test beam. The new dual-domain analysis method is then used to eliminate scattered-light noise arising from both the scattered-reference-light interfering with the test beam and the scattered-reference-light interfering with the "true" pinhole-diffracted reference light. The dual-domain analysis method has also been demonstrated to provide performance enhancement when using the non-optimized standard PS/PDI design. The dual-domain PS/PDI is essentially a three-tiered filtering system composed of lowpass spatial-filtering the test-beam electric field using the more restrictive PS/PDI mask, bandpass spatial-filtering the individual interferogram irradiance frames making up the phase-shifting series, and bandpass temporal-filtering the phase-shifting series as a whole.

  19. State observer for synchronous motors

    DOE Patents [OSTI]

    Lang, Jeffrey H. (Waltham, MA)

    1994-03-22

    A state observer driven by measurements of phase voltages and currents for estimating the angular orientation of a rotor of a synchronous motor such as a variable reluctance motor (VRM). Phase voltages and currents are detected and serve as inputs to a state observer. The state observer includes a mathematical model of the electromechanical operation of the synchronous motor. The characteristics of the state observer are selected so that the observer estimates converge to the actual rotor angular orientation and velocity, winding phase flux linkages or currents.

  20. Atmospheric Radiation Measurement (ARM) Data from Oliktok Point, Alaska (an AMF3 Deployment)

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Located at the North Slope of Alaska on the coast of the Arctic Ocean, Oliktok Point is extremely isolated, accessible only by plane. From this remote spot researchers now have access to important data about Arctic climate processes at the intersection of land and sea ice. As of October 2013, Oliktok Point is the temporary home of ARM’s third and newest ARM Mobile Facility, or AMF3. The AMF3 is gathering data using about two dozen instruments that obtain continuous measurements of clouds, aerosols, precipitation, energy, and other meteorological variables. Site operators will also fly manned and unmanned aircraft over sea ice, drop instrument probes and send up tethered balloons. The combination of atmospheric observations with measurements from both the ground and over the Arctic Ocean will give researchers a better sense of why the Arctic sea ice has been fluctuating in fairly dramatic fashion over recent years. AMF3 will be stationed at Oliktok Point.

  1. Target Selection for the LBTI Exozodi Key Science Program

    E-Print Network [OSTI]

    Weinberger, Alycia J; Kennedy, Grant M; Roberge, Aki; Defrère, Denis; Hinz, Philip M; Millan-Gabet, Rafael; Rieke, George; Bailey, Vanessa P; Danchi, William C; Haniff, Chris; Mennesson, Bertrand; Serabyn, Eugene; Skemer, Andrew J; Stapelfeldt, Karl R; Wyatt, Mark C

    2015-01-01

    The Hunt for Observable Signatures of Terrestrial planetary Systems (HOSTS) on the Large Binocular Telescope Interferometer will survey nearby stars for faint emission arising from ~300 K dust (exozodiacal dust), and aims to determine the exozodiacal dust luminosity function. HOSTS results will enable planning for future space telescopes aimed at direct spectroscopy of habitable zone terrestrial planets, as well as greater understanding of the evolution of exozodiacal disks and planetary systems. We lay out here the considerations that lead to the final HOSTS target list. Our target selection strategy maximizes the ability of the survey to constrain the exozodi luminosity function by selecting a combination of stars selected for suitability as targets of future missions and as sensitive exozodi probes. With a survey of approximately 50 stars, we show that HOSTS can enable an understanding of the statistical distribution of warm dust around various types of stars and is robust to the effects of varying levels ...

  2. Astronomical Observations of Volatiles on Asteroids

    E-Print Network [OSTI]

    Rivkin, Andrew S; Emery, Joshua P; Howell, Ellen S; Licandro, Javier; Takir, Driss; Vilas, Faith

    2015-01-01

    We have long known that water and hydroxyl are important components in meteorites and asteroids. However, in the time since the publication of Asteroids III, evolution of astronomical instrumentation, laboratory capabilities, and theoretical models have led to great advances in our understanding of H2O/OH on small bodies, and spacecraft observations of the Moon and Vesta have important implications for our interpretations of the asteroidal population. We begin this chapter with the importance of water/OH in asteroids, after which we will discuss their spectral features throughout the visible and near-infrared. We continue with an overview of the findings in meteorites and asteroids, closing with a discussion of future opportunities, the results from which we can anticipate finding in Asteroids V. Because this topic is of broad importance to asteroids, we also point to relevant in-depth discussions elsewhere in this volume.

  3. Thermal Effects of Rotation in Random Classical Zero-Point Radiation

    E-Print Network [OSTI]

    Yefim S. Levin

    2007-04-27

    The rotating reference system, two-point correlation functions, and energy density are used as the basis for investigating thermal effects observed by a detector rotating through random classical zero-point radiation. The RS consists of Frenet -Serret orthogonal tetrads where the rotating detector is at rest and has a constant acceleration vector. The CFs and the energy density at the rotating reference system should be periodic with rotation period because CF and energy density measurements is one of the tools the detector can use to justify the periodicity of its motion. The CFs have been calculated for both electromagnetic and massless scalar fields in two cases, with and without taking this periodicity into consideration. It turned out that only periodic CFs have some thermal features and particularly the Planck's factor with the temperature T= h w /k . Regarding to the energy density of both electromagnetic and massless scalar field it is shown that the detector rotating in the zero-point radiation observes not only this original zero-point radiation but, above that, also the radiation which would have been observed by an inertial detector in the thermal bath with the Plank's spectrum at the temperature T. This effect is masked by factor 2/3(4 gamma^2-1) for the electromagnetic field and 2/9 (4 gamma ^2-1) for the massless scalar field, where the Lorentz factor gamma=(1 - v^2 / c^2)^(1/2). Appearance of these masking factors is connected with the fact that rotation is defined by two parameters, angular velocity w and the radius of rotation, in contrast with a uniformly accelerated linear motion which is defined by only one parameter, acceleration a. Our calculations involve classical point of view only and to the best of our knowledge these results have not been reported in quantum theory yet.

  4. Properties of Fourier spectrum of the signal, generated at the accumulation point of period-tripling bifurcations

    E-Print Network [OSTI]

    O. B. Isaeva

    2005-07-11

    Universal regularities of the Fourier spectrum of signal, generated by complex analytic map at the period-tripling bifurcations accumulation point are considered. The difference between intensities of the subharmonics at the values of frequency corresponding to the neighbor hierarchical levels of the spectrum is characterized by a constant $\\gamma=21.9$ dB?, which is an analogue of the known value $\\gamma_F=13.4$ dB, intrinsic to the Feigenbaum critical point. Data of the physical experiment, directed to the observation of the spectrum at period-tripling accumulation point, are represented.

  5. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  6. Self-potential observations during hydraulic fracturing

    SciTech Connect (OSTI)

    Moore, Jeffrey R.; Glaser, Steven D.

    2007-09-13

    The self-potential (SP) response during hydraulic fracturing of intact Sierra granite was investigated in the laboratory. Excellent correlation of pressure drop and SP suggests that the SP response is created primarily by electrokinetic coupling. For low pressures, the variation of SP with pressure drop is linear, indicating a constant coupling coefficient (Cc) of -200 mV/MPa. However for pressure drops >2 MPa, the magnitude of the Cc increases by 80% in an exponential trend. This increasing Cc is related to increasing permeability at high pore pressures caused by dilatancy of micro-cracks, and is explained by a decrease in the hydraulic tortuosity. Resistivity measurements reveal a decrease of 2% prior to hydraulic fracturing and a decrease of {approx}35% after fracturing. An asymmetric spatial SP response created by injectate diffusion into dilatant zones is observed prior to hydraulic fracturing, and in most cases this SP variation revealed the impending crack geometry seconds before failure. At rupture, injectate rushes into the new fracture area where the zeta potential is different than in the rock porosity, and an anomalous SP spike is observed. After fracturing, the spatial SP distribution reveals the direction of fracture propagation. Finally, during tensile cracking in a point load device with no water flow, a SP spike is observed that is caused by contact electrification. However, the time constant of this event is much less than that for transients observed during hydraulic fracturing, suggesting that SP created solely from material fracture does not contribute to the SP response during hydraulic fracturing.

  7. Observation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access to scienceSpeedingLightweight MaterialsGas and OilPublictearing

  8. Observation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access to scienceSpeedingLightweight MaterialsGas and

  9. Observation

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield MunicipalTechnical Report:Speeding accessby aLEDSpeeding accessSpeeding access

  10. The Statistics of the Points Where Nodal Lines Intersect a Reference Curve

    E-Print Network [OSTI]

    Amit Aronovitch; Uzy Smilansky

    2007-06-27

    We study the intersection points of a fixed planar curve $\\Gamma$ with the nodal set of a translationally invariant and isotropic Gaussian random field $\\Psi(\\bi{r})$ and the zeros of its normal derivative across the curve. The intersection points form a discrete random process which is the object of this study. The field probability distribution function is completely specified by the correlation $G(|\\bi{r}-\\bi{r}'|) = $. Given an arbitrary $G(|\\bi{r}-\\bi{r}'|)$, we compute the two point correlation function of the point process on the line, and derive other statistical measures (repulsion, rigidity) which characterize the short and long range correlations of the intersection points. We use these statistical measures to quantitatively characterize the complex patterns displayed by various kinds of nodal networks. We apply these statistics in particular to nodal patterns of random waves and of eigenfunctions of chaotic billiards. Of special interest is the observation that for monochromatic random waves, the number variance of the intersections with long straight segments grows like $L \\ln L$, as opposed to the linear growth predicted by the percolation model, which was successfully used to predict other long range nodal properties of that field.

  11. NS&T MANAGEMENT OBSERVATIONS

    SciTech Connect (OSTI)

    Gianotto, David

    2014-06-01

    The INL Management Observation Program (MOP) is designed to improve managers and supervisors understanding of work being performed by employees and the barriers impacting their success. The MOP also increases workers understanding of managements’ expectations as they relate to safety, security, quality, and work performance. Management observations (observations) are designed to improve the relationship and trust between employees and managers through increased engagement and interactions between managers and researchers in the field. As part of continuous improvement, NS&T management took initiative to focus on the participation and quality of observations in FY 14. This quarterly report is intended to (a) summarize the participation and quality of management’s observations, (b) assess observations for commonalities or trends related to facility or process barriers impacting research, and (c) provide feedback and make recommendations for improvements NS&T’s MOP.

  12. NS&T Management Observations

    SciTech Connect (OSTI)

    Gianotto, David

    2014-09-01

    The INL Management Observation Program (MOP) is designed to improve managers and supervisors understanding of work being performed by employees and the barriers impacting their success. The MOP also increases workers understanding of managements’ expectations as they relate to safety, security, quality, and work performance. Management observations (observations) are designed to improve the relationship and trust between employees and managers through increased engagement and interactions between managers and researchers in the field. As part of continuous improvement, NS&T management took initiative to focus on the participation and quality of observations in FY 14. This quarterly report is intended to (a) summarize the participation and quality of management’s observations, (b) assess observations for commonalities or trends related to facility or process barriers impacting research, and (c) provide feedback and make recommendations for improvements NS&T’s MOP.

  13. Accelerated Expansion: Theory and Observations

    E-Print Network [OSTI]

    David Polarski

    2001-09-20

    The present paradigm in cosmology is the usual Big-Bang Cosmology in which two stages of accelerated expansion are incorporated: the inflationary phase in the very early universe which produces the classical inhomogeneities observed in the universe, and a second stage of acceleration at the present time as the latest Supernovae observations seem to imply. Both stages could be produced by a scalar field and observations will strongly constrain the microscopic lagrangian of any proposed model.

  14. Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using "Omics" Citation Details In-Document Search Title: Unveiling Microbial Carbon Cycling...

  15. Introduction Soil compaction is the key physical feature that can prevent sustainable woodland

    E-Print Network [OSTI]

    Introduction Soil compaction is the key physical feature that can prevent sustainable woodland risk of physical instability and windthrow due to underdeveloped root systems. This Best Practice

  16. Key Benefits in Using Ethanol-Diesel Blends | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Benefits in Using Ethanol-Diesel Blends Key Benefits in Using Ethanol-Diesel Blends Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER...

  17. Low-Temperature Biodiesel Research Reveals Potential Key to Successful Blend Performance (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-02-01

    Relatively low-cost solutions could improve reliability while making biodiesel blends an affordable option. While biodiesel has very low production costs and the potential to displace up to 10% of petroleum diesel, until now, issues with cold weather performance have prevented biodiesel blends from being widely adopted. Some biodiesel blends have exhibited unexplained low-temperature performance problems even at blend levels as low as 2% by volume. The most common low-temperature performance issue is vehicle stalling caused by fuel filter clogging, which prevents fuel from reaching the engine. Research at the National Renewable Energy Laboratory (NREL) reveals the properties responsible for these problems, clearing a path for the development of solutions and expanded use of energy-conserving and low-emissions alternative fuel. NREL researchers set out to study the unpredictable nature of biodiesel crystallization, the condition that impedes the flow of fuel in cold weather. Their research revealed for the first time that saturated monoglyceride impurities common to the biodiesel manufacturing process create crystals that can cause fuel filter clogging and other problems when cooling at slow rates. Biodiesel low-temperature operational problems are commonly referred to as 'precipitates above the cloud point (CP).' NREL's Advanced Biofuels team spiked distilled soy and animal fat-derived B100, as well as B20, B10, and B5 biodiesel blends with three saturated monoglycerides (SMGs) at concentration levels comparable to those of real-world fuels. Above a threshold or eutectic concentration, the SMGs (monomyristin, monopalmitin, and monostearin) were shown to significantly raise the biodiesel CP, and had an even greater impact on the final melting temperature. Researchers discovered that upon cooling, monoglyceride initially precipitates as a metastable crystal, but it transforms over time or upon slight heating into a more stable crystal with a much lower solubility and higher melting temperature - and with increased potential to cause vehicle performance issues. This explains why fuel-filter clogging typically occurs over the course of long, repeated diurnal cooling cycles. The elevated final melting points mean that restarting vehicles with clogged filters can be difficult even after ambient temperatures have warmed to well above CP. By examining how biodiesel impurities affect filtration and crystallization during warming and cooling cycles, NREL researchers uncovered an explanation for poor biodiesel performance at low temperatures. The observation of a eutectic point, or a concentration below which SMGs have no effect, indicates that SMGs do not have to be completely removed from biodiesel to solve low-temperature performance problems.

  18. Jacobi fields, conjugate points and cut points on timelike geodesics in special spacetimes

    E-Print Network [OSTI]

    Leszek M. Soko?owski; Zdzis?aw A. Golda

    2015-07-09

    Several physical problems such as the `twin paradox' in curved spacetimes have purely geometrical nature and may be reduced to studying properties of bundles of timelike geodesics. The paper is a general introduction to systematic investigations of the geodesic structure of physically relevant spacetimes. The investigations are focussed on the search of locally and globally maximal timelike geodesics. The method of dealing with the local problem is in a sense algorithmic and is based on the geodesic deviation equation. Yet the search for globally maximal geodesics is non-algorithmic and cannot be treated analytically by solving a differential equation. Here one must apply a mixture of methods: spacetime symmetries (we have effectively employed the spherical symmetry), the use of the comoving coordinates adapted to the given congruence of timelike geodesics and the conjugate points on these geodesics. All these methods have been effectively applied in both the local and global problems in a number of simple and important spacetimes and their outcomes have already been published in three papers. Our approach shows that even in Schwarzschild spacetime (as well as in other static spherically symetric ones) one can find a new unexpected geometrical feature: instead of one there are three different infinite sets of conjugate points on each stable circular timelike geodesic curve. Due to problems with solving differential equations we are dealing solely with radial and circular geodesics.

  19. Loop quantum gravity and observations

    E-Print Network [OSTI]

    A. Barrau; J. Grain

    2015-10-28

    Quantum gravity has long been thought to be completely decoupled from experiments or observations. Although it is true that smoking guns are still missing, there are now serious hopes that quantum gravity phenomena might be tested. We review here some possible ways to observe loop quantum gravity effects either in the framework of cosmology or in astroparticle physics.

  20. Observational Study PAUL R. ROSENBAUM

    E-Print Network [OSTI]

    George, Edward I.

    . Howell John Wiley & Sons, Ltd, Chichester, 2005 #12;Observational Study Observational Studies Defined describing the subjects before treatment. As a consequence, random assignment tends to make the groups comparable both in terms of measured char- acteristics and characteristics that were not or could

  1. Microsoft PowerPoint - work_proposal_video_OFES_videoconference...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Collaborators are key participants in all aspects of the program Domestic Princeton Plasma Physics Lab U. Texas FRC U. Alaska UC-Davis UC-Los Angeles UC-San Diego CompX...

  2. EERE PowerPoint 97-2004 Template: Green Version

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    is uncertain at EGS conditions because key rate reactions are unknown Increased fracture permeability after reaction with CO 2 -brine at 200C (Smith et al, 2013) 2 | US DOE...

  3. Liquid Phase 3D Printing for Quickly Manufacturing Metal Objects with Low Melting Point Alloy Ink

    E-Print Network [OSTI]

    Wang, Lei

    2014-01-01

    Conventional 3D printings are generally time-consuming and printable metal inks are rather limited. From an alternative way, we proposed a liquid phase 3D printing for quickly making metal objects. Through introducing metal alloys whose melting point is slightly above room temperature as printing inks, several representative structures spanning from one, two and three dimension to more complex patterns were demonstrated to be quickly fabricated. Compared with the air cooling in a conventional 3D printing, the liquid-phase-manufacturing offers a much higher cooling rate and thus significantly improves the speed in fabricating metal objects. This unique strategy also efficiently prevents the liquid metal inks from air oxidation which is hard to avoid otherwise in an ordinary 3D printing. Several key physical factors (like properties of the cooling fluid, injection speed and needle diameter, types and properties of the printing ink, etc.) were disclosed which would evidently affect the printing quality. In addit...

  4. Electrochemical Surface Potential due to Classical Point Charge...

    Office of Scientific and Technical Information (OSTI)

    Potential due to Classical Point Charge Models Drives Anion Adsorption to the Air-Water Interface Citation Details In-Document Search Title: Electrochemical Surface Potential...

  5. Update Invalid Reservation Points for Transmission Service Requests...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Teams Customer Training Interconnection Notices Rates Standards of Conduct Tariff TF Web Based Training Update: Invalid Reservation Points for Transmission Service Requests on...

  6. Topological phase diagram and saddle point singularity in a tunable...

    Office of Scientific and Technical Information (OSTI)

    Topological phase diagram and saddle point singularity in a tunable topological crystalline insulator Citation Details In-Document Search This content will become publicly...

  7. FIXED POINT INDICES AND MANIFOLDS WITH COLLARS Chen ...

    E-Print Network [OSTI]

    2005-05-05

    Brasiliero de Topologia 53 (1988), 59–67, Universidade de Sao Paulo, Sao Carlos S. P., Brasil. [8]. , A de Moivre like formula for fixed point theory, Proceedings ...

  8. ChargePoint is Helping Electrify America's Transportation | Department...

    Broader source: Energy.gov (indexed) [DOE]

    of plug-in electric vehicles (PEVs), the Energy Department supported the ChargePoint America project in 2009 under the American Recovery and Reinvestment Act. At the...

  9. Generating and executing programs for a floating point single...

    Office of Scientific and Technical Information (OSTI)

    Generating and executing programs for a floating point single instruction multiple data instruction set architecture Citation Details In-Document Search Title: Generating and...

  10. New York Nuclear Profile - Nine Mile Point Nuclear Station

    U.S. Energy Information Administration (EIA) Indexed Site

    Nine Mile Point Nuclear Station" "Unit","Summer capacity (mw)","Net generation (thousand mwh)","Summer capacity factor (percent)","Type","Commercial operation date","License...

  11. singularities, swallowtails and dirac points. an analysis for families

    E-Print Network [OSTI]

    2012-07-05

    Jul 5, 2012 ... in graphene). Of particular interest are Dirac points in triply periodic materials, such as the Gyroid network: they can be viewed as mag-.

  12. Energy Department Authorizes Dominion's Proposed Cove Point Facility...

    Office of Environmental Management (EM)

    Department announced today that it has conditionally authorized Dominion Cove Point LNG, LP to export domestically produced liquefied natural gas (LNG) to countries that do...

  13. Point-Wise Quantification of Craniofacial Stephanie Lanche

    E-Print Network [OSTI]

    -splines) transformations. Qualitative and quantitative validations of the presented methods were carried out This thesis presents a methodology of point-wise quantification of craniofacial asymmetry. The asymmetry

  14. CenterPoint Energy A/C Distributor Program

    Broader source: Energy.gov [DOE]

    Note:  This incentive is only available to customers within CenterPoint Energy’s electric service territory (greater Houston area, Texas)

  15. Optimizing minimum free-energy crossing points in solution: Linear...

    Office of Scientific and Technical Information (OSTI)

    Optimizing minimum free-energy crossing points in solution: Linear-response free energyspin-flip density functional theory approach Citation Details In-Document Search Title:...

  16. MAGIC observation of the GRB080430 afterglow

    E-Print Network [OSTI]

    Aleksi?, J; Antonelli, L A; Antoranz, P; Backes, M; Baixeras, C; Balestra, S; Barrio, J A; Bastieri, D; González, J Becerra; Becker, J K; Bednarek, W; Berdyugin, A; Berger, K; Bernardini, E; Biland, A; Bock, R K; Bonnoli, G; Bordas, P; Tridon, D Borla; Bosch-Ramon, V; Bose, D; Braun, I; Bretz, T; Britzger, D; Camara, M; Carmona, E; Carosi, A; Colin, P; Commichau, S; Contreras, J L; Cortina, J; Costado, M T; Covino, S; Dazzi, F; De Angelis, A; del Pozo, E de Cea; Reyes, R De los; De Lotto, B; De Maria, M; De Sabata, F; Mendez, C Delgado; Doert, M; Domínguez, A; Prester, D Dominis; Dorner, D; Doro, M; Elsaesser, D; Errando, M; Ferenc, D; Fernández, E; Firpo, R; Fonseca, M V; Font, L; Galante, N; López, R J García; Garczarczyk, M; Gaug, M; Godinovic, N; Goebel, F; Hadasch, D; Herrero, A; Hildebrand, D; Höhne-Mönch, D; Hose, J; Hrupec, D; Hsu, C C; Jogler, T; Klepser, S; Krähenbühl, T; Kranich, D; La Barbera, A; Laille, A; Leonardo, E; Lindfors, E; Lombardi, S; Longo, F; López, M; Lorenz, E; Majumdar, P; Maneva, G; Mankuzhiyil, N; Mannheim, K; Maraschi, L; Mariotti, M; Martínez, M; Mazin, D; Meucci, M; Miranda, J M; Mirzoyan, R; Miyamoto, H; Moldón, J; Moles, M; Moralejo, A; Nieto, D; Nilsson, K; Ninkovic, J; Orito, R; Oya, I; Paoletti, R; Paredes, J M; Pasanen, M; Pascoli, D; Pauss, F; Pegna, R G; Perez-Torres, M A; Persic, M; Peruzzo, L; Prada, F; Prandini, E; Puchades, N; Puljak, I; Reichardt, I; Rhode, W; Ribó, M; Rico, J; Rissi, M; Rügamer, S; Saggion, A; Saito, T Y; Salvati, M; Sánchez-Conde, M; Satalecka, K; Scalzotto, V; Scapin, V; Schweizer, T; Shayduk, M; Shore, S N; Sierpowska-Bartosik, A; Sillanpää, A; Sitarek, J; Sobczynska, D; Spanier, F; Spiro, S; Stamerra, A; Steinke, B; Strah, N; Struebig, J C; Suric, T; Takalo, L; Tavecchio, F; Temnikov, P; Tescaro, D; Teshima, M; Torres, D F; Turini, N; Vankov, H; Wagner, R M; Zabalza, V; Zandanel, F; Zanin, R; Zapatero, J; de Ugarte-Postigo, A

    2015-01-01

    Context: Gamma-ray bursts are cosmological sources emitting radiation from the gamma-rays to the radio band. Substantial observational efforts have been devoted to the study of gamma-ray bursts during the prompt phase, i.e. the initial burst of high-energy radiation, and during the long-lasting afterglows. In spite of many successes in interpreting these phenomena, there are still several open key questions about the fundamental emission processes, their energetics and the environment. Aim: Independently of specific gamma-ray burst theoretical recipes, spectra in the GeV/TeV range are predicted to be remarkably simple, being satisfactorily modeled with power-laws, and therefore offer a very valuable tool to probe the extragalactic background light distribution. Furthermore, the simple detection of a component at very-high energies, i.e. at $\\sim 100$\\,GeV, would solve the ambiguity about the importance of various possible emission processes, which provide barely distinguishable scenarios at lower energies. Me...

  17. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  18. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Na¨im Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  19. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  20. Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    (and tamper-resistance), limited computing power and memory space, inability to perform public challenges for communication security: no public-key cryptography can be used, only symmetric algorithms is that there is no communication overhead due to evolution of keys ­ this is important, since energy consumption for communication