Sample records for key par ham

  1. Kyungmin Ham

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your Home as ReadyAppointedKyungmin Ham, Ph.D. Title: Assistant

  2. Cooking with Cooked Ham

    E-Print Network [OSTI]

    Anding, Jenna

    2008-12-09T23:59:59.000Z

    ? teaspoon ground cinnamon (if you like) ? teaspoon ground cloves (if you like) 3-pound fully cooked whole ham How to make it 1. Wash your hands; make sure your cooking area is clean. 2. Peel and squeeze the orange; keep...

  3. Hardware implementation of a Hamming network

    E-Print Network [OSTI]

    Robinson Gonzalez, Moise?s Emanuel

    1991-01-01T23:59:59.000Z

    many different backgrounds, whereas hardware implementations are predominantly done by scientists with a strong back- ground in physics or engineering. One of the main advantages of artificial neural networks is the massive parallelism...HARDWARE IMPLEMENTATION OF A HAMMING NETWORK A Thesis by MOISES EMANUEL ROBINSON GONZALEZ Submitted to the Office of Graduate Studies of Texas ARM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE...

  4. Asymptotics of the quantum Hamming bound for subsystem codes

    E-Print Network [OSTI]

    Andreas Klappenecker; Pradeep Kiran Sarvepalli

    2007-10-23T23:59:59.000Z

    Ashikhmin and Litsyn showed that all binary stabilizer codes - pure or impure - of sufficiently large length obey the quantum Hamming bound, ruling out the possibility that impure codes of large length can outperform pure codes with respect to sphere packing. In contrast we show that impure subsystem codes do not obey the quantum Hamming bound for pure subsystem codes, not even asymptotically. We show that there exist arbitrarily long Bacon-Shor codes that violate the quantum Hamming bound.

  5. CURRICULUM VITAE Julie Br ig ham -Gr ette

    E-Print Network [OSTI]

    Schweik, Charles M.

    CURRICULUM VITAE Julie Br ig ham -Gr ette Address: Department of Geosciences, University of Massachusetts, Box 35820, Amherst, MA 01003-5820, USA Born: Albion, Michigan, 11 Jan 1955 Office phone: (413

  6. Symmetric chains, Gelfand-Tsetlin chains, and the Terwilliger algebra of the binary Hamming scheme

    E-Print Network [OSTI]

    Srinivasan, Murali K.

    Symmetric chains, Gelfand-Tsetlin chains, and the Terwilliger algebra of the binary Hamming scheme of the Terwilliger algebra of the binary Hamming scheme. We also give a representation theoretic characterization constructive proof of the explicit block diagonalization of the Terwilliger algebra of the binary Hamming

  7. Secure Hamming Distance Based Computation and Its Applications

    E-Print Network [OSTI]

    Pinkas, Benny

    Secure Hamming Distance Based Computation and Its Applications Ayman Jarrous and Benny Pinkas University of Haifa Abstract. This paper examines secure two-party computation of func- tions which depend for computing these functions. In particular, we present protocols which are secure in the sense of full

  8. The Communication Complexity of the Hamming Distance Problem

    E-Print Network [OSTI]

    Wei Huang; Yaoyun Shi; Shengyu Zhang; Yufan Zhu

    2006-03-10T23:59:59.000Z

    We investigate the randomized and quantum communication complexity of the Hamming Distance problem, which is to determine if the Hamming distance between two n-bit strings is no less than a threshold d. We prove a quantum lower bound of \\Omega(d) qubits in the general interactive model with shared prior entanglement. We also construct a classical protocol of O(d \\log d) bits in the restricted Simultaneous Message Passing model, improving previous protocols of O(d^2) bits (A. C.-C. Yao, Proceedings of the Thirty-Fifth Annual ACM Symposium on Theory of Computing, pp. 77-81, 2003), and O(d\\log n) bits (D. Gavinsky, J. Kempe, and R. de Wolf, quant-ph/0411051, 2004).

  9. BERKELEY PAR LABBERKELEY PAR LAB Where we ended up

    E-Print Network [OSTI]

    California at Berkeley, University of

    , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 #12;BERKELEY PAR

  10. MONITORING GEOCHIMIQUE PAR COUPLAGE ENTRE LES GAZ

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    on its use. Key words: Geological sequestration of CO2, monitoring, noble gases, carbon isotopes1 MONITORING GEOCHIMIQUE PAR COUPLAGE ENTRE LES GAZ RARES ET LES ISOTOPES DU CARBONE : ETUDE D GAZ RARES ET LES ISOTOPES DU CARBONE : ETUDE D'UN RESERVOIR NATUREL Présentée devant : L

  11. On Subsystem Codes Beating the Hamming or Singleton Bound

    E-Print Network [OSTI]

    Andreas Klappenecker; Pradeep Kiran Sarvepalli

    2007-03-22T23:59:59.000Z

    Subsystem codes are a generalization of noiseless subsystems, decoherence free subspaces, and quantum error-correcting codes. We prove a Singleton bound for GF(q)-linear subsystem codes. It follows that no subsystem code over a prime field can beat the Singleton bound. On the other hand, we show the remarkable fact that there exist impure subsystem codes beating the Hamming bound. A number of open problems concern the comparison in performance of stabilizer and subsystem codes. One of the open problems suggested by Poulin's work asks whether a subsystem code can use fewer syndrome measurements than an optimal MDS stabilizer code while encoding the same number of qudits and having the same distance. We prove that linear subsystem codes cannot offer such an improvement under complete decoding.

  12. PARS II Training Workbook (Course 103) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PARS II Training Workbook (Course 103) PARS II Training Workbook (Course 103) PARS II More Documents & Publications PARS II TRAINING PARS II TRAINING PARS II 104 Contractor Monthly...

  13. Two-Layer Error Control Codes Combining Rectangular and Hamming Product Codes for Cache Error

    E-Print Network [OSTI]

    Zhang, Meilin

    We propose a novel two-layer error control code, combining error detection capability of rectangular codes and error correction capability of Hamming product codes in an efficient way, in order to increase cache error ...

  14. Progress on Problem about Quantum Hamming Bound for Impure Quantum Codes

    E-Print Network [OSTI]

    Zhuo Li; Lijuan Xing

    2009-07-22T23:59:59.000Z

    A famous open problem in the theory of quantum error-correcting codes is whether or not the parameters of an impure quantum code can violate the quantum Hamming bound for pure quantum codes. We partially solve this problem. We demonstrate that there exists a threshold such that an arbitrary quantum code must obey the quantum Hamming bound whenever . We list some values of for small d and binary quantum codes.

  15. presentee par SOPHIE ACHARD

    E-Print Network [OSTI]

    Boyer, Edmond

    THÈSE pr´esent´ee par SOPHIE ACHARD pour obtenir le titre de docteur de L'UNIVERSITÉ JOSEPH FOURIER'ils m'ont apport´ee. De longues et enthousiastes discussions avec Gersende Fort et Pierre Lafaye de

  16. Prsent par Laurence JOUNIAUX

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    .................................. 211 Caractérisation des milieux superficiels par des excitations provoquées : conversions sismo................................................................................................................................................ 307 C-1. PH�NOM�NES TRANSITOIRES SISMO-�LECTROMAGN�TIQUES............... 307 C-2. EFFET DE LA

  17. HAM-5 functions as a MAP kinase scaffold during cell fusion in Neurospora crassa

    SciTech Connect (OSTI)

    Jonkers, Wilfried; Leeder, Abigail C.; Ansong, Charles; Wang, Yuexi; Yang, Feng; Starr, Trevor L.; Camp, David G.; Smith, Richard D.; Glass, N. Louise

    2014-11-20T23:59:59.000Z

    Cell fusion in genetically identical Neurospora crassa germlings and in hyphae is a highly regulated process involving the activation of a conserved MAP kinase cascade that includes NRC1, MEK2 and MAK2. During chemotrophic growth in germlings, the MAP kinase cascade members localize to conidial anastomosis tube (CAT) tips every 4 minutes, perfectly out of phase with another protein that is recruited to the tip: SOFT, a protein of unknown biochemical function. How this oscillation process is initiated, maintained and what proteins regulate the MAP kinase cascade is currently unclear. A global phosphoproteomics approach using an allele of mak-2 (mak-2Q100G) that can be specifically inhibited by the ATP analog 1NM-PP1 was utilized to identify MAK2 kinase targets in germlings that were potentially involved in this process. One such putative target was HAM5, a protein of unknown biochemical function. Previously, ?ham-5 mutants were shown to be deficient for hyphal fusion. Here we show that HAM5-GFP co-localized with NRC1, MEK2 and MAK2 and oscillated with identical dynamics from the cytoplasm to CAT tips during chemotropic interactions. In the ?mak-2 strain, HAM5-GFP localized to punctate complexes that did not oscillate, but still localized to the germling tip, suggesting that MAK2 activity influences HAM5 function/localization. However, MAK2-GFP showed only cytoplasmic and nuclear localization in a ?ham-5 strain and did not localize to puncta, as observed in wild type germlings. Via co-immunoprecipitation experiments, HAM5 was shown to physically interact with MAK2, MEK2 and NRC1, suggesting that it functions as a scaffold/transport hub for the MAP kinase cascade members during oscillation and chemotropic interactions during both germling and hyphal fusion in N. crassa. The identification of HAM5 as a scaffold-like protein will help to link the activation of MAK2 to upstream factors and other proteins involved in this intriguing process of fungal communication.

  18. Secure Computation of Functionalities based on Hamming Distance and its Application to Computing Document Similarity

    E-Print Network [OSTI]

    Pinkas, Benny

    Secure Computation of Functionalities based on Hamming Distance and its Application to Computing, Israel. Abstract This paper examines secure two-party computation of functions which depend only these functions. In particular, we present protocols which are secure in the sense of full simulatability against

  19. Nutr Cancer . Author manuscript Freeze-dried ham promotes azoxymethane-induced mucin-depleted foci

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Nutr Cancer . Author manuscript Page /1 9 Freeze-dried ham promotes azoxymethane-induced mucin and red meat consumption is associated with the risk of colorectal cancer. Meta-analyses have suggested that the risk associated with processed meat is higher. Most processed meats are cured and cooked, which leads

  20. Hamming embedding and weak geometric consistency for large scale image search

    E-Print Network [OSTI]

    Verbeek, Jakob

    Hamming embedding and weak geometric consistency for large scale image search Herve Jegou, Matthijs improves recent methods for large scale image search. State-of-the-art methods build on the bag large datasets. Exper- iments performed on a dataset of one million of images show a signifi- cant

  1. Spin coherence excitation and rephasing with optically shelved atoms B. S. Ham and M. S. Shahriar

    E-Print Network [OSTI]

    Shahriar, Selim

    Spin coherence excitation and rephasing with optically shelved atoms B. S. Ham and M. S. Shahriar the partial storage or shelving of atoms. Unlike direct-rf-excited spin echoes or off-resonant Raman echoes coherence using relatively low intensity la- sers. This technique relies on the shelving of atomic popula

  2. LED PAR38 Lamps

    Broader source: Energy.gov [DOE]

    The following CALiPER reports provide detailed analysis of LED PAR38 lamp performance, covering basic performance characteristics as well as subjective evaluation of beam, shadow, and color quality. Pending reports will offer analysis on flicker, dimming and power quality characteristics; stress testing; and lumen and chromaticity maintenance. These reports are intended to educate the industry on market trends, potential issues, and important areas for improvement.

  3. Integrand and Performance Analysis with ParInt/ParVis

    E-Print Network [OSTI]

    de Doncker, Elise

    , USA E-mail: felise,rrzanny,kkaugars,lcucosg@cs.wmich.edu Abstract We present a survey of the contents://www.cs.wmich.edu/parint. This paper presents integrand analysis results obtained with ParInt1.1 and ParVis. It gives a survey ACR-0000442, EIA-0130857, ACI-0203776 Preprint submitted to Elsevier Science 11 October 2002 #12

  4. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  5. prsente par Jean-Christophe PASSELERGUE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Quadratique per unit - par unité Power System Stabilizer - Stabilisateur de puissance Réactance Commandée par Alternative Current Transmission System - Système de Transmission Flexible à Courant Alternatif High Voltage

  6. Proposed Data Elements for PARS II Web Application | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Proposed Data Elements for PARS II Web Application Proposed Data Elements for PARS II Web Application Proposed Data Elements for PARS II Web Application More Documents &...

  7. Qualitatively an important increase in ham imports can be noted during the last ten years. It has probably been encouraged by an increasing, per capita, of ham consumption and also by

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    probably been encouraged by an increasing, per capita, of ham consumption and also by progressive consumption is beginning to change. French foreign trade in pork also shows conjunctural variations mainly due and consumption in the different countries. Self-supply in !.$.C. with 6 countries, then E.E.C. with 9, slightly

  8. Nutrition and Cancer, 62(5), 567573 Authors' version Freeze-Dried Ham Promotes Azoxymethane-Induced

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Nutrition and Cancer, 62(5), 567­573 Authors' version Freeze-Dried Ham Promotes Azoxymethane, INRA, 180 Tournefeuille, F-31931 Toulouse, France Abstract Processed and red meat consumption with processed meat is higher. Most processed meats are cured and cooked, which leads to formation of free

  9. Fast algorithm for finding the eigenvalue distribution of very large matrices Anthony Hams and Hans De Raedt

    E-Print Network [OSTI]

    Fast algorithm for finding the eigenvalue distribution of very large matrices Anthony Hams and Hans distribution density of states of very large matrices. The salient feature of this method is that for matrices The calculation of the distribution of eigenvalues of very large matrices is a central problem in quantum physics

  10. Effect of Injection and Frozen Storage on the Quality Attributes of Fully Cooked Bone-In Hams

    E-Print Network [OSTI]

    Phillips, Denise G.

    2010-07-14T23:59:59.000Z

    were then injected with CNT (n=8). Hams were cooked to 70oC, chilled (7oC), sliced, vacuum packaged and analyzed for lipid oxidation, color, protein solubility and purge at 0, 28, and 56 of refrigerated storage while sensory evaluation and shear force...

  11. CHALEUR D'ADSORPTION DES GAZ PAR LE CHARBON A BASSE TEMPERATURE (-183) Par REN LEPOINTE.

    E-Print Network [OSTI]

    Boyer, Edmond

    CHALEUR D'ADSORPTION DES GAZ PAR LE CHARBON A BASSE TEMPERATURE (- 183°) Par RENÉ LEPOINTE. Elève au début de l'adsorption que par la suite. L'hydrogène donne un phénomène thermique. Introduction. - De très nombreuses recherches ont été faites sur l'adsorption des gaz par le charbon de bois

  12. ~d'ordre: 164id prsente par

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    de propagation des pollutions par hydrocarbures en milieu souterrain - application au milieu alluvial des pollutions par hydrocarbures en milieu souterrain - application au milieu alluvial Soutenue le 14 pollutions accidentelles par hydrocarbures. Cetté méthodologie s'appuie sur l'intégra- tion d'outils de

  13. Par Pond Fish, Water, and Sediment Chemistry

    SciTech Connect (OSTI)

    Paller, M.H. [Westinghouse Savannah River Company, AIKEN, SC (United States); Wike, L.D.

    1996-06-01T23:59:59.000Z

    The objectives of this report are to describe the Par Pond fish community and the impact of the drawdown and refill on the community, describe contaminant levels in Par Pond fish, sediments, and water and indicate how contaminant concentrations and distributions were affected by the drawdown and refill, and predict possible effects of future water level fluctuations in Par Pond.

  14. PARS II Data Quality Memorandum from Deputy Secretary Poneman...

    Office of Environmental Management (EM)

    PARS II Data Quality Memorandum from Deputy Secretary Poneman (June 19, 2012) PARS II Data Quality Memorandum from Deputy Secretary Poneman (June 19, 2012) PARS II Data Quality.pdf...

  15. avec modifications par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  16. amelioration par aromatherapie: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  17. aromatiques par impact: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  18. aqueuse par dynamique: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  19. analyse par spectrometrie: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  20. activity recall par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  1. aromatiques par spectrometrie: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  2. alimentation par convertisseurs: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  3. atomiques lies par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  4. analyse par activation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  5. accords conclus par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  6. analyse par chromatographie: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  7. assistee par ordinateur: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  8. aerosol anthropogenique par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  9. au traitement par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  10. approche par homogeneisation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  11. assistee par complexation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  12. accumulator ring par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  13. absolu par diffraction: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  14. acceleration ionique par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  15. action research par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  16. atmospherique par scintillation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  17. automatique par tout: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  18. activees par analyse: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  19. approche conceptuelle par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  20. anneaux par imagerie: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  1. autocatalytic recombiner par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  2. apres traitement par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  3. analyse instrumentale par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  4. atopoietique induit par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  5. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  6. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  7. Simulink/PARS Integration Support

    SciTech Connect (OSTI)

    Vacaliuc, B. [ORNL] [ORNL; Nakhaee, N. [Sundance DSP, Inc.] [Sundance DSP, Inc.

    2013-12-18T23:59:59.000Z

    The state of the art for signal processor hardware has far out-paced the development tools for placing applications on that hardware. In addition, signal processors are available in a variety of architectures, each uniquely capable of handling specific types of signal processing efficiently. With these processors becoming smaller and demanding less power, it has become possible to group multiple processors, a heterogeneous set of processors, into single systems. Different portions of the desired problem set can be assigned to different processor types as appropriate. As software development tools do not keep pace with these processors, especially when multiple processors of different types are used, a method is needed to enable software code portability among multiple processors and multiple types of processors along with their respective software environments. Sundance DSP, Inc. has developed a software toolkit called “PARS”, whose objective is to provide a framework that uses suites of tools provided by different vendors, along with modeling tools and a real time operating system, to build an application that spans different processor types. The software language used to express the behavior of the system is a very high level modeling language, “Simulink”, a MathWorks product. ORNL has used this toolkit to effectively implement several deliverables. This CRADA describes this collaboration between ORNL and Sundance DSP, Inc.

  8. MAGNETIC STRUCTURE. ETUDE PAR EFFET MOSSBAUER

    E-Print Network [OSTI]

    Boyer, Edmond

    MAGNETIC STRUCTURE. ETUDE PAR EFFET MOSSBAUER DE QUELQUES PEROVSKITES D'YTTERBIUM P. BONVILLE, F effet Mossbauer sur 170Ybles perovskitesYbM03 (M = Fe, Cr, V) et YA103dopee en 170Yb, et par effet Mossbauer sur s7Fe, YbCr03 et YbVO3 dopees en 5 7Fe. La fonction d'onde fondamentalede Yb,+ dans YAlO et Yb

  9. N attribu par la bibliothque prsente

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , Signal présentée et soutenue publiquement par Héctor-Moisés VALDES-GONZALEZ Ingénieur électricien et MSc GENTIL Président M. Jean-Luc GOUZE Rapporteur M. José RAGOT Rapporteur M. Jean-Marie FLAUS Directeur de thèse M. Lionel BOILLEREAUX Examinateur M. Gonzalo ACU�A Examinateur Thèse préparée au sein de l

  10. Comptes Rendus des JNC 17 -Poitiers 2011 Simulation par lments finis des procds par infusion de rsine

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Comptes Rendus des JNC 17 - Poitiers 2011 Simulation par éléments finis des procédés par infusion de résine Finite Simulation of the liquid infusion processes G. Pacquaut, J. Bruchon, N. Moulin, S permettant de simuler par éléments finis les procé- dés par infusion de résine au travers de renforts fibreux

  11. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  12. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  13. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  14. Quality of pork for the processing into cooked ham : Predictive value of the measurement of meat pH 24 hours post-mortem

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    control of product salubrity and cold storage chain is performed, as well. As regards the persistency Recherche Appliquée aux Industries Agricoles et Alimentaires, 6, rue de l'Université, B.P. 313, 29191 compatible with industrial rates of slaughtering and manufacturing of cooked ham (at least 300 pigs per hour

  15. Optimisation de procds de BIOdpollution des eaux souterraines contamines par des hydrocarbures par un monitoring

    E-Print Network [OSTI]

    Demouchy, Sylvie

    Optimisation de procédés de BIOdépollution des eaux souterraines contaminées par des hydrocarbures contaminés par des hydrocarbures. Ces outils doivent apporter des informations manquantes aux procédés de biodégradation aérobie d'hydrocarbures. Dans un second temps ces outils seront mis en oeuvre sur un site

  16. CONTRIBUTION A L'TUDE DES SOLUTIONS DE GAZ PAR SPECTROGRAPHIE INFRAROUGE Par Mlle G. PAILLARD.

    E-Print Network [OSTI]

    Boyer, Edmond

    disparaît en solution; il y a donc empêchement de la rotation par interactions moléculaires; 2° les ba ndes atmosphé- rique) à l'état de solution se traduisant par une augmentation des interactions moléculaires Perkin-Elmer : un spectrographe simple faisceau à prisme de fluorure de lithium dans la région 2 5oo-6 50

  17. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  18. Cas clinique Pneumopathie induite par l'hydroxyure

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    'un traitement par hydroxyurée pour une fièvre élevée, une toux et des expectorations muqueuses associées à des

  19. CHAMBRE A TINCELLES CYLINDRIQUE A FILS AVEC ENREGISTREMENT PAR FERRITES

    E-Print Network [OSTI]

    Boyer, Edmond

    lues sur chaque matrice, par groupe de 32 en 8 fois chacune. L'enre- FIG. 3. Acquisition des données

  20. prsente par VOLPE Pierre-Nicolas

    E-Print Network [OSTI]

    Boyer, Edmond

    THESE présentée par VOLPE Pierre-Nicolas Pour obtenir le grade de Docteur de l'Université Joseph Science (Tsukuba, Japon) Soutenue le 19 Octobre 2009 Composition du Jury : (Rapporteur) Jocelyn Achard) Pierre Muret (Co-Directeur de thèse) Franck Omnès (Co-Directeur de thèse) Julien Pernot tel-00436438

  1. Squestration biologique du carbone par les cyanobactries

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . ______________________________________________________________________________________________________ TITRE en anglais Biological carbon sequestration by cyanobacteria1 Séquestration biologique du carbone par les cyanobactéries THESE PRESENTEE POUR L'OBTENTION DU, qui peuvent fixer du CO2 sous forme de biomasse et carbonate de calcium. Ce dernier, insoluble dans l

  2. AGirenPArTenAriAT despartenariats

    E-Print Network [OSTI]

    la gestion des écosystèmes majeurs de la région1 . Le séminaire Les intérieurs du Maroc a par'Institut national de recherche halieutique au Maroc,l'�colenationaled'ingénieursdeTunisoul'Institutnatio- nal

  3. INSTITUT NATIONAL POLYTECHNIQUE DE GRENOBLE N attribu par la bibliothque

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ou friction stir welding (FSW) 4 A-1 Principe du soudage par friction malaxage (friction stir welding septembre 2004 Titre : Genèse des microstructures lors du soudage par friction malaxage d'alliages d MATIERES i INTRODUCTION 1 CHAPITRE I. Etude bibliographique 4 A. Procédé de soudage par friction malaxage

  4. Asservissement par PID Application du PWM au pont en H

    E-Print Network [OSTI]

    Tardieu, Samuel

    Plan Asservissement par PID PWM Ponts en H Application du PWM au pont en H Bibliographie Asservissement par PID, PWM et Ponts en H Siwar, Cédric, Samuel Télécom Paristech 4 mars 2011 Siwar, Cédric, Samuel ROSE 1 / 33 4 mars 2011 #12;Plan Asservissement par PID PWM Ponts en H Application du PWM au pont

  5. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  6. NOMBRE DE RAYONS 03B1 MIS PAR UNE PRPARATION DE DPOT ACTIF DU THORIUM MESURE PAR SON RAYONNEMENT PNTRANT

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    NOMBRE DE RAYONS 03B1 ÉMIS PAR UNE PRÉPARATION DE DÉPOT ACTIF DU THORIUM MESURÉE PAR SON cm de Pb. Résultats. 1. But du travail. - Le Radiothorium, le Thorium X et le dépôt actif du Thorium sont généralement dosés par leur rayonnement y provenant de Thorium (C + Cfl). A cet effet, à l

  7. Grant Title: DISSEMINATION AND IMPLEMENTATION RESEARCH IN HEALTH (R01, R03, R21) Funding Opportunity Number: PAR-13-055, PAR-13-056, PAR-13-054. CFDA Number(s): 93.242, 93.399,

    E-Print Network [OSTI]

    Farritor, Shane

    Opportunity Number: PAR-13-055, PAR-13-056, PAR-13-054. CFDA Number(s): 93.242, 93.399, 93.213, 93.172, 93

  8. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  9. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  10. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  11. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  12. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  13. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  14. PEP TALK - Policy - EVMS - PARS Update - Mel Frank, Chief, Project...

    Broader source: Energy.gov (indexed) [DOE]

    and Project Management (APM) Glossary of Terms Handbook FINAL VERSION 9-30-2014 Earned Value (EV) Analysis and Project Assessment & Reporting System (PARS II) - APM Road...

  15. PARS II Training Materials | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagementOPAM PolicyOfEnergyOutreach toOverviewOverview P - .PARS

  16. PAR and Supply Distribution System The PAR Program is administered by Materials Logistics (Central Distribution)

    E-Print Network [OSTI]

    Oliver, Douglas L.

    Logistics (Central Distribution) Services, a division of Materials Management. · The PAR Program is focused Administration: 1. See attached exhibit Models, 1-3 2. See Related Materials Management Forms 3. Weekly action group meeting(s) established to continue the work and ensuring good supply chain/materials management

  17. aux etats-unis par: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  18. adp-ribose par immunoassay: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: , David Wessel, and Kathy Yelick UC Berkeley Par Lab End-of-Project Party May 30, 2013 12;BERKELEY PAR LAB Par Lab Timeline 2 Initial Meetings...

  19. APPLICATION DES PALIERS A GAZ AUX GYROSCOPES Par G. GOBERT,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    43 APPLICATION DES PALIERS A GAZ AUX GYROSCOPES Par G. GOBERT, Centre d'Études Nucléaires de Saclay. Résumé. 2014 L'étude des frottements dans les paliers à lubrification par gaz permet de cons- truire un avec, au centre, une turbine à réaction. Ces rotors sont placés entre deux butées coniques métalliques

  20. Feuilletage lisse de S5 par surfaces complexes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Feuilletage lisse de S5 par surfaces complexes Smooth foliation of S5 by complex surfaces Guillaume´esum´e En 2002 Meersseman-Verjovsky [2] ont construit un feuilletage de codimension un de S5 par feuilles codimension un sur S5 avec une seule feuille compacte, ´etait optimal du point de vue du nombre de feuilles

  1. STRUCTURE DES COUCHES DE NIOBIUM PRPARES PAR PULVRISATION TRIODE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    415 STRUCTURE DES COUCHES DE NIOBIUM PRÉPARÉES PAR PULVÉRISATION TRIODE EXISTENCE D'UNE PHASE, Bellevue Résumé. 2014 Par pulvérisation cathodique, le niobium, normalement cubique centré (a = 3,29 Å. Abstract. 2014 Sputtering of normally b. c. c. Niobium (a = 3.29 Å) on Sodium Chloride gives amorphous

  2. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  3. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  4. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  5. The Inverse Effect of Annual-Mean State and Annual-Cycle Changes on ENSO SOON-IL AN,* YOO-GEUN HAM,1 JONG-SEONG KUG,# AXEL TIMMERMANN,@

    E-Print Network [OSTI]

    Kang, In-Sik

    The Inverse Effect of Annual-Mean State and Annual-Cycle Changes on ENSO SOON-IL AN,* YOO-GEUN HAM that climate background state changes control both ENSO and the annual-cycle amplitude in opposing ways. 1 climate variability might lead to the generation of deterministic chaos, hence explaining the irregularity of the

  6. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  7. LECTRISATION ET CONDUCTION LECTRIQUE DES HYDROCARBURES LIQUIDES par L. BRUNINGHAUS.

    E-Print Network [OSTI]

    Boyer, Edmond

    ÉLECTRISATION ET CONDUCTION ÉLECTRIQUE DES HYDROCARBURES LIQUIDES par L. BRUNINGHAUS. Sommaire. - I. Electrisation des hydrocarbures. - Les hydrocarbures liquides s'électrisent (négativement) lorsqu'ils s hydrocarbures. - Les hydrocarbures liquides mani- festent trois régimes de conduction : 1° En couches épaisses

  8. ADVISORY ALERT: Dekker, Ltd. Digital Signature - PARS II...

    Energy Savers [EERE]

    so that you may continue working with PARS II reports. Please note: Once you complete the process of accepting the Dekker, LTd. digital signature, this warning will not re-appear....

  9. INSTITUT NATIONAL POLYTECHNIQUE DE GRENOBLE attribu par la bibliothque

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    14 novembre 2006 Titre : Détection d'objets enfouis sur le fond marin par ondes sismo-acoustiques de'objets enfouis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Utilisation des ondes sismo-acoustiques de surface . . . . . . . . . . . . . . . . . 2 SONAR sismo

  10. The L Prize PAR 38 Competition: A New Start

    Broader source: Energy.gov [DOE]

    This March 27, 2012 webcast presented information on the newly reopened L Prize® PAR 38 competition. Moderated by James Brodrick, DOE Lighting Program Manager, the webcast featured an overview of...

  11. PRODUCTION DE TRITIUM DANS LE THORIUM PAR DES PROTONS DE 135 MeV Par M. LEFORT, G. SIMONOFF et X. TARRAGO

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    959 PRODUCTION DE TRITIUM DANS LE THORIUM PAR DES PROTONS DE 135 MeV Par M. LEFORT, G. SIMONOFF et thorium par des protons de 135 MeV accélérés au synchro-cyclotron d'Orsay. Le tritium était extrait des measured the cross-section of tritium production by bombardement of thorium by 135 MeV protons in the Orsay

  12. DTERMINATION PRCISE DE L'NERGIE DES RAYONS 03B1 EMIS PAR LE THORIUM Par M. GEORGES PHILBERT, Mme JEANNINE GNIN et M. LOPOLD VIGNERON,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    16 DÉTERMINATION PRÉCISE DE L'ÉNERGIE DES RAYONS 03B1 EMIS PAR LE THORIUM Par M. GEORGES PHILBERT. Sommaire. 2014 Du thorium, de l'ionium et du polonium ont été introduits ensemble dans une émulsion, les et autres nous ont permis de ne pas être gênés par les dérivés radioactifs du thorium. L

  13. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  14. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  15. DESCRIPTION PAR L'OPRATEUR DENSIT DU MOUVEMENT STATISTIQUE DE L'EXCITON LECTRONIQUE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    excitations electro- niques elementaires de l'agrégat. Le probleme est le suivant : dans 1'hypothese ou Fon sait (a I'aide d'un piege energetique, ou par interference d'excitations optiques ou par excitation

  16. TUDE CALORIMTRIQUE DU RAYONNEMENT DU DPT ACTIF DU THORIUM Par L. WINAND,

    E-Print Network [OSTI]

    Boyer, Edmond

    ÉTUDE CALORIMÉTRIQUE DU RAYONNEMENT DU DÉPÔT ACTIF DU THORIUM Par L. WINAND, Laboratoire Curie signalerons seulement que le circuit galvanométrique est composé (1) L. wINAVD, Étude de l'énergie dégagée par

  17. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  18. Sur les thories des dilectriques Par Tcheslas BIALOBJESKI

    E-Print Network [OSTI]

    Boyer, Edmond

    pôle de la batterie (l'autre pôle étant au sol), il se produit par induction une charge Fig. 1 décharge du condensateur en réunissant les armatures entre elles, les charges inductives se neutralisent en- sateur plan. Faisons communiquer une armature de ce condensateur avec une batterie de petits accumula

  19. Universite des Sciences et Technologies de Lille Travaux presentes par

    E-Print Network [OSTI]

    Madeleine, Jean-Baptiste

    Universit´e des Sciences et Technologies de Lille Travaux pr´esent´es par M. Olivier Boucher en vue de l'obtention de L'HABILITATION A DIRIGER DES RECHERCHES EN SCIENCES PHYSIQUES Effets radiatifs-Jacques Morcrette Rapporteur Didier Tanr´e Examinateur U.F.R de Physique Fondamentale Laboratoire d'Optique Atmosph

  20. INTERPRTATION GOMTRIQUE DES INTGRALES DE FRESNEL ; Par M. N. OUMOFF.

    E-Print Network [OSTI]

    Boyer, Edmond

    281 INTERPRÉTATION GÉOMÉTRIQUE DES INTÉGRALES DE FRESNEL ; Par M. N. OUMOFF. I. - Pour représenter ', a pour valeur : Elle représente toujours l'intégrale A de Fresnel si l'on compte les boucles de -1 3) représente l'intégrale B de Fresnel sous des conditions analogues. Les maximum de B sont

  1. Contrle du comportement ingestif et mrycique par les neuropeptides

    E-Print Network [OSTI]

    Boyer, Edmond

    Contrôle du comportement ingestif et mérycique par les neuropeptides L. BUÉNO, P. RIVIÈRE Station. Neuropeptidergic control of feeding behavior and rumination in sheep. In sheep as in other species. Introduction. L'hypothèse de l'existence d'une régulation centrale neuropeptidergique de l'appétit est récente

  2. projet conjoint parrain par la Fondation Shell et Shell Gabon, des chercheurs de l'Institution

    E-Print Network [OSTI]

    Baker, Robert J.

    projet conjoint parrainé par la Fondation Shell et Shell Gabon, des chercheurs de l, le Cameroun et la Guinée-Équatoriale. Le pays est baigné par un climat tropical humide avec une'orientation par écholocation des Microchiroptères représente une adaptation évolutive unique à la vie nocturne

  3. SUR UN SILICATE DE CADMIUM LUMINESCENT Par A. LEVIALDI et V. LUZZATI.

    E-Print Network [OSTI]

    Boyer, Edmond

    SUR UN SILICATE DE CADMIUM LUMINESCENT Par A. LEVIALDI et V. LUZZATI. Sommaire. - �tude de quelques propriétés d'un silicate de cadmium (1) luminescent. Leur interpré- tation par la théorie des trappes de silicate de cadmium par des radiations ultra- violettes de longueur d'onde voisine de ), = 2537 A

  4. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  5. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  6. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  7. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  8. LA DIFFUSION DE LA LUMIRE PAR LE MTHANE ET SES HOMOLOGUES GAZEUX par MM. J. CABANNES et J. GAUZIT,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    hydrocarbures saturés gazeux de la série grasse n'est pas complètement polarisée. Le facteur de dépolarisation molécules voisines. Dans le travail actuel, nous avons choisi comme sujets d'expérience les hydrocarbures;183 2. Préparation des hydrocarbures. - Nous avons préparé les terrnes de la série par le procédé

  9. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  10. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  11. PALIERS POUR ROTORS TOURNANT A GRANDE VITESSE Par G. GOBERT,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    l'air comprimé comme gaz. Le principe consiste à sépa- rer, par un film gazeux, un plan mobile d atmosphérique aux abords du gicleur, due soit à un écoulement où la vitesse du gaz atteint la célérité locale du turbine (poids = 27 g). ~ b = butée : 4 gicleurs 0 1 mm sur 0 20 mm. 4 gicleurs 0 1 mm sur 0 34 mm. Modèle

  12. Design Studies and Commissioning Plans for PARS Experimental Program

    E-Print Network [OSTI]

    Mete, O; Xia, G; Dover, M; Wigram, M; Wright, J; Zhang, J; Smith, J

    2015-01-01T23:59:59.000Z

    PARS (Plasma Acceleration Research Station) is an electron beam driven plasma wakefield acceleration test stand proposed for VELA/CLARA facility in Daresbury Laboratory. In order to optimise various operational configurations, 2D numerical studies were performed by using VSIM for a range of parameters such as bunch length, radius, plasma density and positioning of the bunches with respect to each other for the two-beam acceleration scheme. In this paper, some of these numerical studies and considered measurement methods are presented.

  13. Optimisation combinatoire Modelisation MIP Sujet 1 : Modelisation par la programmation

    E-Print Network [OSTI]

    Miller, Andrew J.

    discr`ete (par opposition `a continue) Probl`eme d' optimisation : min f (x) s. `a x X o`u l'ensemble X Domaines d'application Industriel Automobile: gestion de la diversit´e Production ´energ´etique , x2 0 x1 , x2 ZZ Classification: Application industrielle. Probl`eme Lin´eaire (facile) en nombres

  14. Regression inverse par tranches sur flux de donnees

    E-Print Network [OSTI]

    Boyer, Edmond

    'un mod`ele semi-param´etrique sous-jacent incluant une direction EDR (Effective Dimension Reduction'il existe une d´erive de la direction EDR ou bien des blocs de donn´ees aberrantes, et nous illustrons notre´eaire engendr´e par : ici dans le cadre d'un mod`ele `a un seul indice, nous parlons de direction EDR

  15. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  16. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  17. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  18. Analyse Statistique de la Pollution par les PM10 en Haute-Normandie

    E-Print Network [OSTI]

    Boyer, Edmond

    Analyse Statistique de la Pollution par les PM10 en Haute-Normandie Fran¸cois-Xavier Jolloisa travail porte sur l'analyse de la pollution par les particules PM10 en r´egion Haute- Normandie entre 2004´eaires et les m´elanges de mod`eles lin´eaires, on mod´elise les effets des vari- ables sur la pollution par

  19. tion des environs par quatre groupes prin-cipaux de polluants : i) les hydrocarbures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    tion des environs par quatre groupes prin- cipaux de polluants : i) les hydrocarbures aromatiques simples; ii) les hydrocarbures aliphatiques ; iii) les hydrocarbures aroma- tiques polycycliques (HAP

  20. Text-Alternative Version: L Prize-PAR 38 Competition: A New Start

    Broader source: Energy.gov [DOE]

    Below is the text-alternative version of the "L Prize-PAR 38 Competition: A New Start" webcast, held March 27, 2012.

  1. LANL breaks ground on key sediment control project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your Home as ReadyAppointedKyungmin Ham,

  2. Institut National Polytechnique de Grenoble No. attribu par la bibliothque

    E-Print Network [OSTI]

    Boyer, Edmond

    'un système de conversion de type VSC-HVDC. Stabilité - Contrôle des perturbations. Directeurs de thèse : M;#12;Table des matières 1 Introduction 17 2 Présentation des systèmes HVDC 25 2.1 Intérêts par rapport à une Modélisation des systèmes VSC-HVDC 31 3.1 Modélisation de la source puissance

  3. The Epic of Pabuji ki par in Performance

    E-Print Network [OSTI]

    Wickett, Elizabeth

    2010-10-19T23:59:59.000Z

    Occasional Paper 3 World Oral Literature Project v o i c e s o f v a n i s h i n g w o r l d s The Epic of Pabuji ki par in performance Elizabeth Wickett Published by: World Oral Literature Project University of Cambridge Museum of Archaeology... and Anthropology Downing Street Cambridge CB2 3DZ United Kingdom email: oralliteratureproject@gmail.com office phone: +44 (0)1223 333508 www.oralliterature.org ISBN: 978-0-9566052-1-4 © 2010 World Oral Literature Project All rights reserved. No parts...

  4. PARS II Enhancements - Igor Pedan, MA-63 | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagementOPAM PolicyOfEnergyOutreach toOverviewOverview P - .PARS II

  5. Par Pastoril e Agr cola S A | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |JilinLuOpenNorthOlympiaAnalysis) JumpPalcan sPaquin Energy and FuelPar

  6. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  7. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  8. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  9. Cooking with Cooked Ham (Spanish) 

    E-Print Network [OSTI]

    Anding, Jenna

    2008-12-09T23:59:59.000Z

    ://AgriLifebookstore.org Los programas educativos de Texas AgriLife Extension Service est?n disponibles para todas las personas, sin distinci?n de raza, color, sexo, discapacidad, religi?n, edad u origen nacional. Emitido para el desarrollo del Trabajo de la Extensi...

  10. Cooking with Cooked Ham (Spanish)

    E-Print Network [OSTI]

    Anding, Jenna

    2008-12-09T23:59:59.000Z

    ), por Jenna Anding, Profesora Asociada y Extensionista Especialista en Nutrici?n, El Sistema Texas A&M. Producido por AgriLife Communications, El Sistema Texas A&M Las publicaciones de Texas AgriLife Extension se pueden encontrar en Internet en: http..., El Sistema Texas A&M. Revisi?n ...

  11. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  12. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  13. Adsorption du mthanol par la montmorillonite (1) Faza ANNABI-BERGAYA

    E-Print Network [OSTI]

    Boyer, Edmond

    Adsorption du méthanol par la montmorillonite (1) Faïza ANNABI-BERGAYA C.N.R.S., Centre de Cedex. RÉSUMÉ L'adsorption du méthanol gazeux par des montmorillonites Li, Na, Ba et Ca, a été 1. R. Adsorption, Le recoupement des résultats a permis de mettre en évidence les points suivants

  14. REMARQUES SUR LE MMOIRE DE MM. NAGAOKA ET HONDA; Par CH.-ED. GUILLAUME.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    621 REMARQUES SUR LE MÉMOIRE DE MM. NAGAOKA ET HONDA; Par CH.-ED. GUILLAUME. 11 est facile de voir que le plissement des courbes d'aimantation et d'allongement constaté par MM. Nagaoka et Honda et Honda indique un point singulier des alliages, ou s'il s'agit d'un fait fortuit. J'ajou- terai que

  15. REMARQUES SUR LE TRAVAIL DE MM. NAGAOKA ET HONDA ; Par M. CH.-D. GUILLAUME

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    633 REMARQUES SUR LE TRAVAIL DE MM. NAGAOKA ET HONDA ; Par M. CH.-ÉD. GUILLAUME Les recherches de MM. Nagaolia et Honda sur la inagnéto- striction donnent lieu à deux genres de remarques : les unes que pour une proportion insignifiante dans les résultats énoncés par MM. Nagaoka et Honda, et que les

  16. Volatilit du dpt actif du thorium Par T. BARRATT et A. B. WOOD

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    198 Volatilité du dépôt actif du thorium Par T. BARRATT et A. B. WOOD [Woolwich Polytechnic]. Marsden et Darwini avaient proposé pour la série de transformations du thorium A le schéma suivant, Cet et thoriums C faites par Mlle Meitner 2 et Marsden et Wilson3ayant donné des résultats contradictoires, les

  17. MESURE DU PARCOURS MOYEN DES RAYONS 03B1 DU THORIUM PAR LA MTHODE PHOTOGRAPHIQUE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    MESURE DU PARCOURS MOYEN DES RAYONS 03B1 DU THORIUM PAR LA MÉTHODE PHOTOGRAPHIQUE Par Mme HENRIETTE thorium dans l'émulsion des plaques photo- graphiques, on déduit leur parcours moyen dans l'air à150 thorium a déjà fait l'objet de plusieurs mesures dont les résultats ne sont pas toujours concordants. Les

  18. PRESSION DE VAPEUR SATURANTE DU LITHIUM ENTRE 462 ET 642 Par Mlle M. MAUCHERAT,

    E-Print Network [OSTI]

    Boyer, Edmond

    d'Imphy) : ce mé- tal résiste très bien à l'action corrosive du lithium, je l'ai adopté aprèsPRESSION DE VAPEUR SATURANTE DU LITHIUM ENTRE 462° ET 642° Par Mlle M. MAUCHERAT, Faculté des Sciences de Marseille. Sommaire. - Dans ce travail on étudie la tension de vapeur saturante du lithium par

  19. Absorption du rayonnement 12 et 8 millimtres par les vapeurs de propane sous pression

    E-Print Network [OSTI]

    Boyer, Edmond

    Absorption du rayonnement 12 et 8 millimètres par les vapeurs de propane sous pression A. Battaglia des pertes diélectriques (03B5") présentées par le propane gazeux aux fréquences de 24 et 36 GHz, à la Birnbaum. Abstract. 2014 Experimental study of dielectric losses (03B5") presented by gaseous propane

  20. Pars Plana Vitrectomy in Eyes Containing a Treated Posterior Uveal Melanoma

    E-Print Network [OSTI]

    Foster, William

    Pars Plana Vitrectomy in Eyes Containing a Treated Posterior Uveal Melanoma WILLIAM J. FOSTER, MD PURPOSE: To determine the safety of pars plana vitrec- tomy in eyes containing a treated posterior uveal treated with 125 I plaque radiotherapy (seven pa- tients) or transpupillary thermotherapy (two patients

  1. Diffraction de Fresnel des electrons diffuss lastiquement et inlastiquement par des crans semi-transparents

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1353 Diffraction de Fresnel des electrons diffusés élastiquement et inélastiquement par des écrans 1980) Résumé. 2014 L'application du principe de Huygens-Fresnel à l'étude de la diffraction par le bord légèrement divergent rend compte de l'allure générale des franges de Fresnel observées en microscopie

  2. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  3. EuroPar 2009 POGGI: Puzzle-Based Online Games on Grid Infrastructures POGGI: Puzzle-Based Online Games

    E-Print Network [OSTI]

    Iosup, Alexandru

    : The Lunar Lockout Puzzle Lunar Lockout, Yamamoto & Yoshigahara, 1998 #12;EuroPar 2009 ­ POGGI: Puzzle

  4. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  5. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  6. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  7. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  8. CONTRIBUTION A L'AUGMENTATION DE LA SENSIBILIT DES THERMOPILES Par MM. PIERRE BARCHEWITZ et JEAN TURCK.

    E-Print Network [OSTI]

    Boyer, Edmond

    tombant sur la thermopile et dans ce cas, on demande à celle-ci d'avoir un temps de réponse aussi faible- trique, celle-ci s'échauffe, sa température qui était initialement égale à la température To de la rayonnement, par conductibilité calorifique, par convection, par effet Peltier ou effet Joule, il s'établit un

  9. COMPTITION FISSION-SPALLATION DANS LES CIBLES DE THORIUM BOMBARDES PAR PROTONS DE 155 MeV

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    338. COMPÉTITION FISSION-SPALLATION DANS LES CIBLES DE THORIUM BOMBARDÉES PAR PROTONS DE 155 Me isotopes du thorium et de l'actinium, par bombardement de Th 232 par des protons de 155 MeV. Ces sections were made on the formation of several isotopes of thorium, and actinium, by bombarding Th 232 by 155 Me

  10. Meta-compilation non intrusive du filtrage par contraintes Non intrusive meta-compilation of matching by constraints

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    M´eta-compilation non intrusive du filtrage par contraintes Non intrusive meta´eta-compilation non intrusive du filtrage par contraintes Historique 31 ao^ut 2004 V 0.8 cr´eation du document 15 inria-00280939,version1-20May2008 #12;MANIFICO ­ M´eta-compilation non intrusive du filtrage par

  11. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  12. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  13. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  14. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  15. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  16. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  17. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  18. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  19. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  20. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  1. Contamination des mollusques bivalves par des phycotoxines : interactions entre niveaux de toxicit et rponses physiologiques

    E-Print Network [OSTI]

    Boyer, Edmond

    1 Contamination des mollusques bivalves par des phycotoxines : interactions entre niveaux de principaux types de phycotoxines peuvent contaminer les mollusques bivalves : les toxines diarrhéiques (DSP nécessite de connaître au préalable les conditions initiales de contamination des mollusques ainsi que les

  2. u.s. Dl!PAR1'M:ENT OF ENERGY EERE PROJECT MANAGEMENT CENTER

    Broader source: Energy.gov (indexed) [DOE]

    PAR1'M:ENT OF ENERGY EERE PROJECT MANAGEMENT CENTER NEPA DETERlIIINATION RECIPIENT :University of California San Diego PROJECT TITL.E: San Diego Center for Algae Biotechnology Page...

  3. LA SARCOSPORIDIOSE DES RUMINANTS AU MAROC ETUDE EPIDEMIOLOGIQUE PAR DEUX TECHNIQUES HISTOLOGIQUES

    E-Print Network [OSTI]

    Boyer, Edmond

    LA SARCOSPORIDIOSE DES RUMINANTS AU MAROC ETUDE EPIDEMIOLOGIQUE PAR DEUX TECHNIQUES HISTOLOGIQUES Agronomique et Vétérinaire Hassan Il. B.P. 704 - Rabat - Agdal. Maroc &dquo; Département de Parasitologie

  4. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  5. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  6. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  7. REMARQUES SUR LE MMOIRE DE MM. NAGAOKA ET HONDA; Par CH.-ED. GUILLAUME.

    E-Print Network [OSTI]

    Boyer, Edmond

    621 REMARQUES SUR LE M�MOIRE DE MM. NAGAOKA ET HONDA; Par CH.-ED. GUILLAUME. 11 est facile de voir que le plissement des courbes d'aimantation et d'allongement constaté par MM. Nagaoka et Honda et Honda indique un point singulier des alliages, ou s'il s'agit d'un fait fortuit. J'ajou- terai que

  8. Sur le parcours des rayons 03B1 de l'uranium Par Lon BLOCH,

    E-Print Network [OSTI]

    Boyer, Edmond

    Sur le parcours des rayons 03B1 de l'uranium Par Léon BLOCH, Agrégé de l'Université de Paris parcours des rayons x de l'uranium a été dé- terminé par Bragg1 au moyen d'une méthode indirecte. Bragg a mesuré l'ionisatiol totale due au rayonnement de l'uranium lorsque la substance est recouverte d

  9. LA GESTION DE L'EAU PAR LES ASSOCIATIONS DE PROPRITAIRES FONCIERS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    LA GESTION DE L'EAU PAR LES ASSOCIATIONS DE PROPRI�TAIRES FONCIERS Méthodologie pour un, est posée la question du devenir de ces structures et de leur participation à une gestion de l'eau à gestion à long terme de ces structures et de la ressource en eau, notamment par les acteurs locaux grâce à

  10. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  11. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  12. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  13. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  14. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  15. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  16. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  17. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  18. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  19. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  20. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  1. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  2. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  3. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  4. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  5. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  6. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  7. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  8. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  9. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  10. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  11. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  12. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  13. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  14. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  15. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  16. A review of "La Rochefoucauld par quatre chemins. Les Maximes et leurs ambivalence" by Eric Turcat

    E-Print Network [OSTI]

    Grele, Denis D.

    2014-01-01T23:59:59.000Z

    82 seventeenth-century news Eric Turcat. La Rochefoucauld par quatre chemins. Les Maximes et leurs ambivalence. Biblio 17, v. 206. Tübingen: Gunter Narr Verlag, 2013. 220 pp. ISBN 978-63-8233-6803-8. $65.91. Review by denis d. grélé, university...(s). For his part, Eric Turcat does not recoil from the challenge and offers in La Rochefoucauld par quatre chemins, not one but four possible methods of understanding apparent disparate fragments of thoughts. Each chapter of his book is devoted to one...

  17. Rglage du PID numrique par rduction de la complexit du rgulateur

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Réglage du PID numérique par réduction de la complexité du régulateur Zito Gianluca*, Landau Ioan procédure de synthèse des régulateurs PID numériques pour les systèmes d'ordre élevé est présentée. Cette modèle du système. L'estimation des paramètres du PID est faite par un algorithme du type identication en

  18. Le hakka, par Hilary Chappell et Laurent Sagart Le dialecte hakka est parl par quelque 35 millions de locuteurs, principalement dans le nord du

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    répandu hors de Chine, en particulier en Malaisie, dans le nord de Bornéo, en Guyane, au Surinam et à ont pu entraîner une forte animosité avec les populations chinoises plus anciennement établies. Cette («Puntis») dans la province de Canton. Méprisés par la société cantonaise, et assimilés aux She, population

  19. Les agricultures familiales refltent une trs grande diversit. Elles se caractrisent par une multitude de techniques, une richesse de savoir-faire et par une savante combinaison

    E-Print Network [OSTI]

    'arganiers, région de Tafraout, Maroc L'agriculture familiale ne saurait se passer de l'arbre et de la forêt. �pineux endémique du Maroc, l'arganier est parfaitement adapté à l'aridité. Les hommes ne le plantent pas mais 1998 « réserve de la biosphère » par l'Unesco. ©IRD-GenevièveMichon MAROC Les agricultures familiales

  20. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  1. TUDE DU FACTEUR DE MULTIPLICATION DANS LA PILE DE SACLAY Par B. JACROT, F. NETTER et V. RAIEVSKI,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    31 ÉTUDE DU FACTEUR DE MULTIPLICATION DANS LA PILE DE SACLAY Par B. JACROT, F. NETTER et V facteur de multiplication effectif dans une pile,par des expériences en régime sous-critique. Ces méthodes sont appliquées à la déter- mination de l'effet sur la réactivité de différents paramètres de la pile

  2. LA DISTILLATION a t introduite en Occident avec l'alchimie au cours du XIIe sicle. Par convention, on

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    LA DISTILLATION a été introduite en Occident avec l'alchimie au cours du XIIe siècle. Par Pseudo-Geber, distingue plusieurs façons de distiller et propose même une classi- fication de ces distillat (per descensum). La distillation par élévation des vapeurs, ou per ascensum, nécessite l

  3. LA RPARTITION DE L'OZONE ATMOSPHRIQUE EN FONCTION DE L'ALTITUDE Par M. D. BARBIER.

    E-Print Network [OSTI]

    Boyer, Edmond

    LA RÉPARTITION DE L'OZONE ATMOSPHÉRIQUE EN FONCTION DE L'ALTITUDE Par M. D. BARBIER. Observatoire observations en déter- minant la distribution de l'ozone par une série de Charlier du type A. En général on ne peut déterminer que la quantité totale d'ozone et la hauteur moyenne de la distribution, ces quantités

  4. Vers une formule de Stirling de la factorielle de Bhargava pour des entiers reconnaissables par un automate

    E-Print Network [OSTI]

    Dumont, Serge

    Vers une formule de Stirling de la factorielle de Bhargava pour des entiers reconnaissables par un¸con intrins`eque en th´eorie des nombres. Ainsi l'estimation de cette fonction par la formule de Stirling se r savoir quel est l'analogue de la formule de Stirling pour un sous ensemble E ? Quels sont les propri

  5. Grant Title: INITIATIVE FOR MAXIMIZING STUDENT DEVELOPMENT (IMSD) (R25) Funding Opportunity Number: PAR-13-082. CFDA Number(s): 93.859.

    E-Print Network [OSTI]

    Farritor, Shane

    : PAR-13-082. CFDA Number(s): 93.859. Agency/Department: National Institutes of Health (NIH), National

  6. MESURE DES INTENSITS PAR CEINTURE DE ROGOWSKI UTILISATION D'UNE SPIRE COMPENSATRICE

    E-Print Network [OSTI]

    Boyer, Edmond

    , specially in gaseous dis- charge, with « Rogowski belt » placed around conductor. The presence mesurer I (fig. 1). Le flux FIG. 1. de l'induction=Bo créé par ce courant, à travers les spires de l de la valeur de l'induction magnétique en tout point, le vecteur induction conservant toujours. une

  7. Dimensionnement et gestion d'un systme de stockage thermique par hydro-accumulation : application la

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Dimensionnement et gestion d'un système de stockage thermique par hydro-accumulation : application de stockage thermique de type hydro-accumulation destiné à une chaufferie collective multi, mix-énergétique, stockage thermique, hydro-accumulation, dimensionnement optimal, gestion, graphe d

  8. SUR LA CAUSE DE L'LECTRISATION DES NUAGES ORAGEUX; PAR M. H. PELLAT.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , Peltier a admis, pour expliquer les phé- nomènes électriques dont notre atmosphère est le siège, que le Peltier, qui est, non une hypothèse, mais bien une réalité. On sait, en effet, que par le beau temps le milieu isolant augmente en s'éloignant de la surface d'un conducteur, celle-ci est chargée d

  9. Louvain-la-Neuve, le 27 janvier 2011 Hunza ! : images du Pakistan, par Benoit Sneessens

    E-Print Network [OSTI]

    Nesterov, Yurii

    Louvain-la-Neuve, le 27 janvier 2011 « Hunza ! » : images du Pakistan, par Benoit Sneessens Du 1er trois ans, l'artiste a parcouru à pieds les sentiers escarpés de la vallée de Hunza, au Nord du Pakistan reportages à l'étranger, s'envole pour le Pakistan. Le but de son expédition : confronter l'image du pays

  10. LES GRANDEURS CARACTRISTIQUES DE LA PILE DE CHATILLON (1) Par L. KOWARSKI.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    751. LES GRANDEURS CARACTÉRISTIQUES DE LA PILE DE CHATILLON (1) Par L. KOWARSKI. Laboratoire du de la pile de Châtillon : cuve à eau lourde, barres actives contenant de l'oxyde d'uranium, bloc régime actuel de fonctionnement de la pile ainsi que la puissance qu'elle développe. Il termine en

  11. MESURE DES RACTIVITS DANS UNE PILE (1) Par JACQUES BERNOT et VICTOR RAIEVSKI,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    359. MESURE DES RÉACTIVITÉS DANS UNE PILE (1) Par JACQUES BERNOT et VICTOR RAIEVSKI, Service de la Pile de Saclay, Commissariat à l'Énergie atomique. Sommaire. 2014 Nous reprenons ici de façon plus'une pile. Cette méthode de comptage, appliquée à une pile essentiellement sous-critique, nécessite la

  12. DISTILLATION DES LIQUIDES SOUS L'INFLUENCE DE L'LECTRICIT STATIQUE; PAR M. D. GERNEZ.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    36I DISTILLATION DES LIQUIDES SOUS L'INFLUENCE DE L'ÉLECTRICITÉ STATIQUE; PAR M. D. GERNEZ. La décharge, la distillation se produit aussitôt en sens in- verse (2). Ce phénomène est extrêmemen t n e sens suivant lequel se produit cette distillation est contraire à celui que sem- bleraient indiquer les

  13. Friction dependence of shallow granular flows from discrete par-ticle simulations

    E-Print Network [OSTI]

    Al Hanbali, Ahmad

    Friction dependence of shallow granular flows from discrete par- ticle simulations Anthony Thornton relation for the macroscopic bed friction or basal roughness obtained from micro-scale discrete particle simulations of steady flows. We systematically vary the bed friction by changing the contact friction

  14. ED n364 : Sciences Fondamentales et Appliques Nattribu par la bibliothque

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    NUMERIQUE DU SOUDAGE PAR FROTTEMENT-MALAXAGE NUMERICAL SIMULATION OF THE FRICTION STIR WELDING PROCESS,version1-8Apr2008 #12;- 4 - ABSTRACT Despite considerable interests in the Friction Stir Welding (FSW the different stages of the Friction Stir Welding (FSW) process. A splitting method is utilized: a) the material

  15. Digestion des glucides cytoplasmiques de la fverole par le veau prruminant

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Digestion des glucides cytoplasmiques de la féverole par le veau préruminant J. M. BESLE B. LASSALAS, P. THIVEND Laboratoire de la Digestion des Ruminants, LN.R.A. Theix 63110 Beaumont France. Summary. Digestion of field bean cytoplasmic carbohydrates by the preruminant calf. Three veal calves

  16. Digestion des glucides de la levure d'alcanes par le veau prruminant

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Digestion des glucides de la levure d'alcanes par le veau préruminant J. M. BESLE, Bernadette LASSALAS, P. THIVEND Laboratoire de la Digestion des Ruminanfs, 1.N.R.A., Theix, 63110 Beaumont France. Summary. Digestion of alkane yeast carbohydrates by the preruminant calf. Four 15-day old preruminant

  17. Action de l'manation du radium sur les sels de thorium Par HERCHFINKEL

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    417 Action de l'émanation du radium sur les sels de thorium Par HERCHFINKEL [Faculté des Sciences'une solution d'azotate de thorium abandonnée a elle-même pendant plusieurs mois dégage une cer- taine quantité'on fait agir une forte quantité d'émanation de radium sur le même sPl de thorium il se produit en- core

  18. LES NEUTRONS DE FISSION ET LA RACTION EN CHAINE Par L. KOWARSKI.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    neutrons lors de la fission de l'uranium (Collège de France, mars1939, et Columbia University), à la, dont l'exploration fut la première étape dans la marche vers la conquête de l'énergie 'atomique. C et complétée par Frisch et Joliot, de la fission de l'uranium. Cette réaction, exothermique à un

  19. Jules Diawara, cole Centrale Paris (Laboratoire de Gnie des Procds et Matriaux) prsente par

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Jules Diawara, École Centrale Paris (Laboratoire de Génie des Procédés et Matériaux) 1 présentée par Jules Diawara Pour l'obtention du grade de Docteur de l'École Centrale des Arts et Manufactures tel-00658768,version1-11Jan2012 #12;Jules Diawara, École Centrale Paris (Laboratoire de Génie des

  20. Elaboration de pices micro composites hautes caractristiques mcaniques par fabrication additive (SLM) en conditions ractives

    E-Print Network [OSTI]

    Jeanjean, Louis

    fabrication additive (fabrication rapide) par fusion laser d'un lit de poudre (Selective Laser Melting ou SLM laser melting, fusion laser, métallurgie des poudres, réactions métal-gaz, composites. #12;Profil requis thermodynamique et cinétique réactionnelles sera encouragée. Mots clefs : Fabrication additive, SLM, selective

  1. Paternal age related schizophrenia (PARS): latent subgroups detected by k-means clustering analysis

    E-Print Network [OSTI]

    Ahn, Hongshik

    1 Paternal age related schizophrenia (PARS): latent subgroups detected by k-means clustering of schizophrenia with distinct etiology, pathophysiology and symptoms. This study uses a k-means clustering-R) and olfaction (University of Pennsylvania Smell Identification Test; UPSIT). We conducted a series of k-means

  2. OBSERVATION PAR MICROSCOPIE LECTRONIQUE D'AMAS DE LACUNES DANS LE NICKEL TREMP

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    285 OBSERVATION PAR MICROSCOPIE ÉLECTRONIQUE D'AMAS DE LACUNES DANS LE NICKEL TREMPÉ G. LOZES (1 décembre 1970) Résumé. 2014 Des échantillons de nickel de haute pureté ont été étudiés, après trempe, à la, dans le nickel, une forte tendance à l'agglomération, et qu'en dehors des amas visibles, il se forme d

  3. HISOIRE DU RSEAU DE L'INSERTION PAR L'ACTIVIT CONOMIQUE Philippe Brgeon

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    « Le travail du social » dirigée par Alain Vilbrod, aux éditions l'Harmattan Il s'appuie sur un travail'insertion ?, Les éditions l'harmattan (Ed.) (2008) 276" #12;2 2 de vue du nombre de salariés en insertion concernés

  4. CMENTATION DU NIOBIUM PAR DES SILICIURES DE TITANE ET DE CHROME EN VUE DE RALISER

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    551 CÉMENTATION DU NIOBIUM PAR DES SILICIURES DE TITANE ET DE CHROME EN VUE DE RÉALISER DES of titanium 2014 and chromium modified silicide coatings suitable for oxidation protection of niobium. One, susceptibles de protéger le niobium et ses alliages contre l'oxydation. Le disiliciure de niobium pur n

  5. BALAYAGE THERMIQUE DES ANNEAUX DE PEROT ET FABRY Par J. ROIG,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    is heated by a coil wound on the circumference, the required power being a few watts. The mounting is rigid. Résumé. - I. Récepteur photographique. - Une image du. diamètre des anneaux se forme sur la plaque. La. Une came de forme géométrique simple, commandée par un moteur synchrone, agit sur le rhéostat de

  6. ACARYOCHLORIS EXPLAINING THE RIDDLE OF CHLOROPHYLL D IN RED ALGAE AND EXPANDING PAR FOR OXYGENIC PHOTOSYNTHESIS

    E-Print Network [OSTI]

    Oregon, University of

    ACARYOCHLORIS ­ EXPLAINING THE RIDDLE OF CHLOROPHYLL D IN RED ALGAE AND EXPANDING PAR FOR OXYGENIC strain is shown to live epi- phytically on the red alga Gelidium caulacantheum, which itself is harvested by the red alga. Availability of far red light, however, is relatively unaffected by DOM or red

  7. LED Lighting Flicker and Potential Health Concerns: IEEE Standard PAR1789 Update

    E-Print Network [OSTI]

    Lehman, Brad

    LED Lighting Flicker and Potential Health Concerns: IEEE Standard PAR1789 Update Arnold Wilkins for mitigating health risks to viewers" has been formed to advise the lighting industry, ANSI/NEMA, IEC, EnergyStar and other standards groups about the emerging concern of flicker in LED lighting. This paper introduces

  8. PArAmedic AcAdemy College of Rural and Community Development

    E-Print Network [OSTI]

    Hartman, Chris

    PArAmedic AcAdemy College of Rural and Community Development Community and Technical College 907-455-2895 www.ctc.uaf.edu/programs/paramedic/ The paramedic academy prepares students to take the national para Medical Board. The paramedic academy offers the highest level of education avail- able to prepare for work

  9. La reprsentationdescauses de l'tat de sant par les infirmiers etlespointsde vueenvisagsdespatientset desaidantsnaturels

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    La représentationdescauses de l'état de santé par les infirmiers etlespointsde la représentation d'infirmiers hospitaliers expérimentés (n=44) et les différences de points de vue dans la relation soignant-soigné, nous faisons d'une part l'hypothèse que ces infirmiers exhiberont une

  10. Conception centree utilisateur de prototypes interactifs pour la gestion de contenu multimedia par similarite

    E-Print Network [OSTI]

    Dupont, Stéphane

    Conception centr´ee utilisateur de prototypes interactifs pour la gestion de contenu multimedia par de donn´ees mul- timedia, adapt´ees `a des cas d'utilisation divers et pro- fils d'utilisateurs vari similaire? L'interface utilisateur au service des cas d'utilisation La navigation et manipulation de

  11. LA GESTION DE RESULTAT PAR LES MONTAGES FINANCIERS DE TITRISATION : LE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 LA GESTION DE RESULTAT PAR LES MONTAGES FINANCIERS DE TITRISATION : LE CAS DES SOCIETES FRAN�AISES COTEES Patrick BOISSELIER Professeur des universités Conservatoire National des Arts et Métiers gestion Centre de Recherche en Ingénierie Financière et Finances publiques (Université de Nice

  12. Gestion de la Qualit de Service par les Hypercubes dans un Environnement

    E-Print Network [OSTI]

    Boyer, Edmond

    Gestion de la Qualité de Service par les Hypercubes dans un Environnement de Routage Multipoint : Cas des Protocoles PIM-SM et MPLS Mohamed Dafir ECH-CHERIF EL KETTANI Ecole Nationale Supérieure d mettre en °uvre une politique efficace de gestion de la Qualité de Service liée au groupe. Dans cet

  13. DIFFUSION ELASTIQUE DES NEUTRONS PAR LE TRITIUM A 14 MeV

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    DIFFUSION ELASTIQUE DES NEUTRONS PAR LE TRITIUM A 14 MeV Laboratoire de Neutronique, CNRS, Toulouse of neutrons from tritium is studied with a thin scatterer close to a Cs1 scintillator. The experimental. Le diffuseur utilisé est une cible mince contenant 2,22 an3 de tritium absorbé dans une épaisseur de

  14. Sur le rapport isoperimetrique du tetra`edre par Jean-Pierre Demailly

    E-Print Network [OSTI]

    Demailly, Jean-Pierre

    Sur le rapport isop´erim´etrique du t´etra`edre par Jean-Pierre Demailly Professeur `a l triangle ABC, comment choisir le quatri`eme sommet D de fa¸con que le rapport isop´erim´etrique du t´etra`edre´egalit´es contradictoires 0 = - µ + edre

  15. The role of uPAR signaling in lung cancer Background and significance

    E-Print Network [OSTI]

    Gleeson, Joseph G.

    The role of uPAR signaling in lung cancer Background and significance Lung cancer is the leading of lung cancer ­ non-small-cell-lung cancer (about 85% of all lung cancer cases) and small- cell-lung cancer (about 15%) (Herbst et al., 2008). Small cell lung carcinoma (SCLC) is rapidly growing and often

  16. Projet Autoroutier Pilote Aubonne -Belmont pour une Initiative Lausannoise d'Evaluation par Simulation

    E-Print Network [OSTI]

    Bierlaire, Michel

    par Simulation Simulation-based evaluation of the impact of telematics in the Lausanne area: a pilot, either on the efficiency of the road network or the security of its users. The PAPABILES pilot of the network, using a state- of-the-art simulation tool (MITSIM), developed at the Massachusetts Institute

  17. Project Plan 7930 Cell G PaR Remote Handling System Replacement

    SciTech Connect (OSTI)

    Kinney, Kathryn A [ORNL

    2009-10-01T23:59:59.000Z

    For over 40 years the US Department of Energy (DOE) and its predecessors have made Californium-252 ({sup 252}Cf) available for a wide range of industries including medical, nuclear fuels, mining, military and national security. The Radiochemical Engineering Development Center (REDC) located within the Oak Ridge National Laboratory (ORNL) processes irradiated production targets from the High Flux Isotope Reactor (HFIR). Operations in Building 7930, Cell G provide over 70% of the world's demand for {sup 252}Cf. Building 7930 was constructed and equipped in the mid-1960s. Current operations for {sup 252}Cf processing in Building 7930, Cell G require use of through-the-wall manipulators and the PaR Remote Handling System. Maintenance and repairs for the manipulators is readily accomplished by removal of the manipulator and relocation to a repair shop where hands-on work can be performed in glove boxes. Contamination inside cell G does not currently allow manned entry and no provisions were created for a maintenance area inside the cell. There has been no maintenance of the PaR system or upgrades, leaving operations vulnerable should the system have a catastrophic failure. The Cell G PaR system is currently being operated in a run to failure mode. As the manipulator is now 40+ years old there is significant risk in this method of operation. In 2006 an assessment was completed that resulted in recommendations for replacing the manipulator operator control and power centers which are used to control and power the PaR manipulator in Cell G. In mid-2008 the chain for the bridge drive failed and subsequent examinations indicated several damaged links (see Figure 1). To continue operations the PaR manipulator arm is being used to push and pull the bridge as a workaround. A retrieval tool was fabricated, tested and staged inside Cell G that will allow positioning of the bridge and manipulator arm for removal from the cell should the PaR system completely fail. A fully functioning and reliable Par manipulator arm is necessary for uninterrupted {sup 252}Cf operations; a fully-functioning bridge is needed for the system to function as intended.

  18. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  19. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  20. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  1. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  2. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  3. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  4. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  5. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  6. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  7. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  8. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  9. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  10. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  11. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  12. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  13. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  14. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  15. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  16. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  17. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  18. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  19. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  20. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  1. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  2. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  3. CALiPER Report 20.1: Quality of Beam, Shadow, and Color in LED PAR38 Lamps

    Broader source: Energy.gov [DOE]

    View the video about CALiPER Report 20.1 which focuses on human-evaluated characteristics, including beam quality, shadow quality, and color quality in LED PAR38 lamps.

  4. RUTILIUS, LECTEUR CRITIQUE DE CLAUDIEN POETE L'intertexte virgilien et sa rception. Textes rassembls par Christina

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    réception. Textes rassemblés par Christina Filoche », Mémoire, discours, images, EAD 1865, Dijon, 2007, p'intertexte virgilien et sa réception., C. Filoche (Ed.) (2007) 158-183" #12;Or ce n'est pas le cas chez Rutilius, qui

  5. PHNOMNES DITS HYDRO-LECTRIQUES ET HYDROMAGNTIQUES; PAR M. C.-A. BJERKNES (1),

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    509 PH�NOM�NES DITS HYDRO-�LECTRIQUES ET HYDROMAGN�TIQUES; PAR M. C.-A. BJERKNES (1), Professeur à corps hydro- électrisés s'attirent ou se repoussent, suivant que leurs vibrations sont concordantes ou- minuent en même temps). Un hydro-aimant, formé ou bien d'une splzère oscillante ou de deux pulsateurs

  6. CONCEPTION OPTIMALE DES SYSTEMES INSTRUMENTS DE SECU RIT : UNE APPROCHE PAR LES BLOCS DIAGRAMMES DE FIABILIT

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    par les normes de sécurité IEC 61508 et IEC 61511. L'étude proposée s'inscrit dans le contexte de l conception d'un SIS, utilisé dans le document ISATR84.00.022002 relatif à la norme IEC 61508, qui doit les SIS, deux normes de sécurité sont utilisées : l'IEC 61508 (IEC61508, 1998) et l'IEC 61511 (IEC

  7. La pollution marine est gnralement provoque par les eaux uses, d'origines

    E-Print Network [OSTI]

    La pollution marine est généralement provoquée par les eaux usées, d'origines domestiques long des bassins-versants qui débouchent sur la mer. Pollution marine 16 Métaux Ils présentent trois indique généralement l'existence d'autres sources de pollution. © Ssuaphoto / Dreamstime.com © Uatp1

  8. EFFETS DES FAIBLES IRRADIATIONS SUR L'URANIUM Par Y. QUR,

    E-Print Network [OSTI]

    Boyer, Edmond

    489. EFFETS DES FAIBLES IRRADIATIONS SUR L'URANIUM Par Y. QU�R�, Centre d'�tudes Nucléaires de fragments de fission dans l'uranium, on présente quelques résultats de mesure de longueur et de résistivité modifiés. Abstract. 2014 After recalling Brinkman's model for the action of fission fragments on uranium

  9. rsistances trouves semblent dpendre de la rsistance de la pile; on les limine par divers procds, et notamment en renver-

    E-Print Network [OSTI]

    Boyer, Edmond

    501 résistances trouvées semblent dépendre de la résistance de la pile; on les élimine par divers procédés, et notamment en renver- sant le sens du courant de pile. G. LIPPAMANN R.-T. GLAZEBROOK. 2014 un même pôle de la pile par les deux condensateurs à comparer ; il y a équilibre dans le pont, au

  10. REACTIONS (p, 2pxn) SUR LE THORIUM 232 DE 30 A 120 MeV Par HENRI GAUVIN,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    836. REACTIONS (p, 2pxn) SUR LE THORIUM 232 DE 30 A 120 MeV Par HENRI GAUVIN, Laboratoire Joliot isotopes 224, 225, 226, 227, 228 de l'actinium dans le thorium 232 bombardé par des protons de 30 à 120 Me (224 to 228) in the bombardment of thorium 232 with 30 to 120 MeV protons. In the low energy range (30

  11. UNE SOURCE DE LUMIRE POUR LE DOSAGE ISOTOPIQUE DE L'URANIUM PAR SPECTROMTRIE D'MISSION

    E-Print Network [OSTI]

    Boyer, Edmond

    65 A. UNE SOURCE DE LUMI�RE POUR LE DOSAGE ISOTOPIQUE DE L'URANIUM PAR SPECTROM�TRIE D'�MISSION Par tétrachlorure ou au tétraiodure d'uranium qui émettent le spectre optique de l'uranium avec une intensité, une de routine. Abstract. 2014 A process is described for producing and exciting electrodeless uranium

  12. K-Area and Par Pond Sewage Sludge Application Sites groundwater monitoring report: Second quarter 1993

    SciTech Connect (OSTI)

    Not Available

    1993-10-01T23:59:59.000Z

    During second quarter 1993, samples from the three monitoring wells at the K-Area site (KSS series) and the three monitoring wells at the Par Pond site (PSS series) were analyzed for constituents required by South Carolina Department of Health and Environmental Control Construction Permit 13,173 and for other constituents as part of the Savannah River Site (SRS) Groundwater Monitoring Program. This report describes monitoring results that exceeded the final Primary Drinking Water Standards (PDWS) or the SRS flagging criteria. During second quarter 1993, no constituents exceeded the final PDWS or any other flagging criteria at the K-Area and Par Pond Sewage Sludge Application Sites. During first quarter 1993, aluminum and iron exceeded the SRS Flag 2 criteria in one or more of the KSS and the PSS wells. These constituents were not analyzed second quarter 1993. In the KSS well series, the field measurement for alkalinity ranged as high as 35 mg/L in well KSS 1D. Alkalinity measurements were zero in the PSS wells, except for a single measurement of 1 mg/L in well PSS 1D. Historical and current water-level elevations at the K-Area Sewage Sludge Application Site indicate that the groundwater flow direction is south to southwest (SRS grid coordinates). The groundwater flow direction at the Par Pond Sewage Sludge Application Site could not be determined second quarter 1993.

  13. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  14. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  15. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  16. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  17. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  18. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  19. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  20. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  1. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  2. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  3. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  4. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  5. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  6. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  7. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  8. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  9. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  10. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  11. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  12. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  13. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  14. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  15. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  16. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  17. HAM and HPM: Another attack to reason

    E-Print Network [OSTI]

    Francisco M. Fernández

    2009-12-15T23:59:59.000Z

    We discuss two recent applications of homotopy analysis method and homotopy perturbation method and conclude that the results are completely useless from both mathematical and physical points of view.

  18. HAM and HPM: Another attack to reason

    E-Print Network [OSTI]

    Fernández, Francisco M

    2009-01-01T23:59:59.000Z

    We discuss two recent applications of homotopy analysis method and homotopy perturbation method and conclude that the results are completely useless from both mathematical and physical points of view.

  19. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  20. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  1. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  2. Grant Title: NIDCD PHASE I/II PRELIMINARY CLINICAL TRIALS IN COMMUNICATION DISORDERS Funding Opportunity Number: PAR-12-123. CFDA Number(s): 93.173.

    E-Print Network [OSTI]

    Farritor, Shane

    Opportunity Number: PAR-12-123. CFDA Number(s): 93.173. Agency/Department: National Institutes of Health (NIH

  3. Grant Title: MENTAL HEALTH RESEARCH DISSERTATION GRANT TO INCREASE DIVERSITY (R36) Funding Opportunity Number: PAR-12-103. CFDA Number(s): 93.242.

    E-Print Network [OSTI]

    Farritor, Shane

    Opportunity Number: PAR-12-103. CFDA Number(s): 93.242. Agency/Department: Department of Health and Human

  4. Grant Title: BEHAVIORAL SCIENCE TRACK AWARD FOR RAPID TRANSITION (B/START) (R03) Funding Opportunity Number: PAR-12-251. CFDA Number(s): 93.279.

    E-Print Network [OSTI]

    Farritor, Shane

    Opportunity Number: PAR-12-251. CFDA Number(s): 93.279. Agency/Department: Department of Health and Human

  5. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  6. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  7. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  8. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  9. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  10. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  11. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  12. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  13. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  14. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  15. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  16. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  17. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  18. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  19. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  20. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  1. Rsum -Les films amorphes GeSe-j vapors obliquement ont une structure colonnaire trs marque. La contraction induite par photo-irradiation a t

    E-Print Network [OSTI]

    Boyer, Edmond

    -induced contraction of a-GeSe3 films has been studied with small-angle neutron scattering and scanning electron/. On illumination the films densify, and a previous small-angle neutron scattering (SANS) study /3/ showed. La contraction induite par photo-irradiation a été étudiée par diffusion des neutrons aux petits

  2. The role of uPAR in inducing a cancer stem cell-like phenotype in breast cancer and allowing cells to develop endocrine therapy resistance

    E-Print Network [OSTI]

    Eastman, Boryana M.

    2012-01-01T23:59:59.000Z

    1-1. uPAR over-expression in MDA-MB- 468 cells induces CSC-and prevents apoptosis in MDA-MB-231 breast cancer cells. J1. uPAR over-expression in MDA-MB-468 cells induces CSC-like

  3. FOURNET, M. & BEDIN, V. (1998). L'ingnierie de formation entre traditionalisme et modernisme ; les nouvelles formes de formation continue vues par des dirigeants de PME-PMI. Formation Emploi, n 63, 43-

    E-Print Network [OSTI]

    Boyer, Edmond

    1998-01-01T23:59:59.000Z

    ; les nouvelles formes de formation continue vues par des dirigeants de PME-PMI. Formation Emploi, n° 63 modernisme Les nouvelles formes de formation continue vues par des dirigeants de PME-PMI Michel Fournet et

  4. L'agriculture familiale se dfinit par le recours quasi-exclusif du travail familial, sans sa-laris permanents,et par des interrelations fortes entre les agriculteurs et leur exploitation.Le

    E-Print Network [OSTI]

    1 #12;L'agriculture familiale se définit par le recours quasi-exclusif à du travail familial, sans agricultures familiales. Avec ses 500 millions d'exploitations, elles font vivre 2,6 milliards de personnes et, les agricultures familiales sont présentes sur tous les continents et dans tous les écosystèmes. Cette

  5. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  6. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  7. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  8. Les rotations positives donnent, toutes choses gales d'ailleurs, une dflexion plus grande et par consquent une plus petite

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    On an electrostatic field produced by varying magnetic induction (Champ électrostatique produit par une induction communication avec les pôles d'une batterie d'accumulateurs dont le milieu est au sol. Quand Article published'une sorte de gélatine qui, d'après l'auteur, conduit juste assez pour prendre une charge sta- tique, trop

  9. sonde) (1). Lia, sonde contient un petit compteur de Geiger-Mller aliment par une pile de 75o V,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    78 A sonde) (1). Lia, sonde contient un petit compteur de Geiger-Müller alimenté par une pile de 75o V, en parallèle avec un condensateur de 25 00o pF; l'appareil est donc autonome. Les piles cet appareil, des piles ayant des éléments (1) Modèle du Commissariat à l'Énergie atomique. de 0 = 2I

  10. PROBLMES POSS PAR S SOUTERRAINES PROFONDES Laboratoire de Mcanique des Solides, Ecole Polytechnique, 91 128 Palaiseau Cedex.

    E-Print Network [OSTI]

    Boyer, Edmond

    - considérablement développée. Elle concerne des produits entreposés de façon provisoire (hydrocarbures, air comprimé utilisées pour le stockage des hydrocarbures. Ce ne sont pas les ouvrages qui posent les problèmes les plus la saumure formée est remplacée par des hydrocarbures, figure 1. Leur profondeur varie de 200 à 2000

  11. MATERIAUX 2010 18-22 octobre 2010 Nantes, France Nanostructures originales obtenues par dcomposition catalytique d'hydrocarbure

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    décomposition catalytique d'hydrocarbure M.C. Amamra 1 , J-M. Lihrmann 2 , A. Thorel 3 1 LIMHP-CNRS, Av. J RESUME: L'arc électrique et la décomposition catalytique d'hydrocarbures peuvent produire diverses par décomposition catalytique d'hydrocarbures, ainsi que des fibrilles de quelques nanomètres de

  12. Nonlinear Dual Mode Adaptive Control of PAR2 : a 2-dof Planar Parallel manipulator, with Real-time experiments

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Nonlinear Dual Mode Adaptive Control of PAR2 : a 2-dof Planar Parallel manipulator, with Real with nonlinear dual mode adap- tive control of a redundant manipulator for a pick-and- place scenario with high-time experiments show the performance improvements obtained by the proposed control approach in comparison

  13. DOE Publishes CALiPER Report on Dimming, Flicker, and Power Quality Characteristics of LED PAR38 Lamps

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy's CALiPER program has released Report 20.2, which is part of a series of investigations on LED PAR38 lamps. Report 20.2 focuses on dimming, flicker, and power quality...

  14. Oui, Monsieur Vonglis, l'tat, c'tait bien lui ! Mais quel tat ? Par Isabelle STOREZ-BRANCOURT

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    éditions L'Harmattan, une mise au point roborative sur la monarchie absolue1 . Mise au point, en effet Bourbons ­ n'est pas une royauté limitée par un 1 Bernard Vonglis, La monarchie absolue française, L'Harmattan

  15. Enjeux et limites du pilotage par les indicateurs en management public, l'exemple de la recherche

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    'appeler le New Public Management (NPM dans la suite du texte, traduit en français par Nouvelle Gestion dangereux d'une telle croyance. Nous avons pris ici le parti, non pas de mener une critique globale du NPM

  16. ED no 432 : "Science des Metiers de l'Ingenieur" no attribue par la biblioth`eque

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ED no 432 : "Science des M´etiers de l'Ing´enieur" no attribu´e par la biblioth . . .University of Applied Sciences Magdeburg-Stendal . . .Rapporteur Pr. Zhaoxin Laurent Li scientifiques et techniques, la disponibilit´e, l'atmosph`ere conviviale qui est si bien entretenue. J

  17. Dlivr par l'Universit Paul-Valry-Montpellier 3 Prpare au sein de l'cole doctorale Territoires, Temps,

    E-Print Network [OSTI]

    Boyer, Edmond

    Délivré par l'Université Paul-Valéry-Montpellier 3 Préparée au sein de l'école doctorale ENTRE LA TEIGNE DU CHOU PLUTELLA XYLOSTELLA (L.) ET SES PRINCIPAUX PARASITOIDES EN CONDITIONS TROPICALES avec le chou peut être envisagée pour réduire les populations de la teigne. Les études en laboratoire

  18. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  19. K-Area and Par Pond Sewage Sludge Application Sites Groundwater Monitoring Report: Third quarter 1993

    SciTech Connect (OSTI)

    Not Available

    1994-01-01T23:59:59.000Z

    Samples from the three wells at the K-Area Sewage Sludge Application Site (KSS wells) and the three wells at the Par Pond Sewage Sludge Application Site (PSS wells) are analyzed quarterly for constituents required by South Carolina Department of Health and Environmental Control Construction Permit 13,173 and, as requested, for other constituents as part of the Savannah River Site (SRS) Groundwater Monitoring Program. Annual analyses for other constituents, primarily metals, also are required by the permit. Iron and lead, permit-required constituents, and aluminum presently exceed SRS flagging standards in samples from the two sites. Elevated concentrations of metals at these sites, not reported during 1992, may be the reflection of a recent change in analytical methodology.

  20. K-Area and Par Pond Sewage Sludge Application Sites Groundwater Monitoring Report. First quarter 1993

    SciTech Connect (OSTI)

    Not Available

    1993-07-01T23:59:59.000Z

    Samples from the three wells at the K-Area Sewage Sludge Application Site (KSS wells) and the three wells at the Par Pond Sewage Sludge Application Site (PSS wells) are analyzed quarterly for constituents required by South Carolina Department of Health and Environmental Control Construction Permit 13,173 and, as requested, for other constituents as part of the Savannah River Site Groundwater Monitoring Program. Annual analyses for other constituents, primarily metals, also are required by the permit. During first quarter 1993, no permit-required constituents exceeded standards at the two sites except iron, which was elevated in one KSS well and two PSS wells. Aluminum, not required by the permit, was the only other constituent that exceeded standards. Elevated levels of aluminum and iron at these two sites may be concurrent with a change in analytical methodology. As in previous quarters, chlordane concentrations did not exceed the detection limit in any of the wells.

  1. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  2. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  3. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  4. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  5. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  6. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  7. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  8. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  9. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  10. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  11. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  12. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  13. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  14. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  15. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  16. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  17. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  18. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  19. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  20. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  1. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  2. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  3. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  4. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  5. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  6. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  7. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  8. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  9. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  10. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  11. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  12. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  13. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  14. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  15. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  16. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  17. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  18. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  19. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  20. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  1. CALiPER Report 20.1: Subjective Evaluation of Beam Quality, Shadow Quality, and Color Quality for LED PAR38 Lamps

    Broader source: Energy.gov [DOE]

    This December 3, 2013 webinar explored the findings of CALiPER 20.1: Subjective Evaluation of Beam Quality, Shadow Quality, and Color Quality for LED PAR38 Lamps and discussed what attributes to...

  2. SPECTRE D'MISSION DES RADICAUX OH ET OD Par L. HERMAN, P. FELENBOK et Mme R. HERMAN (*),

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    83. SPECTRE D'ÉMISSION DES RADICAUX OH ET OD Par L. HERMAN, P. FELENBOK et Mme R. HERMAN OH et (0,8), (0,9), (0,10), (0,11) et (1,11) de OD appartenant au système B 2 03A32014 A 2 03A3 a été deux niveaux ont été redéterminées pour OH et OD. Les perturbations observées dans la structure de

  3. OFFRE D'EMPLOI Le Conservatoire botanique national du Massif central est un tablissement public, agr par le Ministre

    E-Print Network [OSTI]

    -Loire, du Parc naturel régional Livradois-Forez, du Syndicat mixte d'aménagement territorial du Haut botanique national définies par l'article L414-10 du code de l'environnement comme suit : Contribuer, dans code de l'environnement dans la mesure compatible avec le respect des habitats et des espèces et

  4. Maroc, terre d'origines... Cette exposition a t produite par le Centre de Documentation et de Recherche Archologique

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Maroc, terre d'origines... Cette exposition a été produite par le Centre de Documentation et de Recherche Archéologique Départemental (CDERAD), avec le concours du Commissariat Général du Temps du Maroc en France et du Service de Coopération et d'Action Culturelle de l'Ambassade de France au Maroc, et

  5. Sonie directionnelle en basse frquence Effet sur des sons purs latraliss uniquement par des diffrences de temps

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Sonie directionnelle en basse fréquence Effet sur des sons purs latéralisés uniquement par des varie elle aussi en fonction de l'azimut. Ce phénomène est connu en tant que sonie directionnelle et variation de sonie observée pour différents azimuts était supérieure à ce qui pouvait être attendu des

  6. [)r PAR1 rMF.Nr o Dr (.FIrMr( A .IF]CNC)I,OGIi,

    E-Print Network [OSTI]

    Guidoni, Leonardo

    [)r PAR1 rMF.Nr o Dr (.FIrMr( A E .IF]CNC)I,OGIi, f)Ã?]I I-ARMACo @ ;^.*r.l-EN,.m BANDO Dl SELEZIONE n. 17 PER lL CONFERIMENTO Dt N. 1 ASSEGNO PER LO SVOLGIMENTO Dl ATTIVITA DI RICERCA DI CATEGORIA B riunita la Commissione esaminatrice per il bando di selezione n. 17 relativo al conferimento di n. 1

  7. La distribution d'automobiles neuves en Europe est rgie par un rglement d'exemption aux rgles de la

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    La distribution d'automobiles neuves en Europe est régie par un règlement d'exemption aux règles de contexte, les concessionnaires doivent repenser leur métier de distributeurs automobiles pour transformer les menaces en opportunités. Les spéculations sur l'avenir du système de la distribution automobile en

  8. PaR Tensile Truss for Nuclear Decontamination and Decommissioning - 12467

    SciTech Connect (OSTI)

    Doebler, Gary R. [PaR Systems Inc., 707 County Road E West, Shoreview, MN 55126 (United States)

    2012-07-01T23:59:59.000Z

    Remote robotics and manipulators are commonly used in nuclear decontamination and decommissioning (D and D) processes. D and D robots are often deployed using rigid telescoping masts in order to apply and counteract side loads. However, for very long vertical reaches (15 meters or longer) and high lift capacities, a telescopic is usually not practical due to the large cross section and weight required to make the mast stiff and resist seismic forces. For those long vertical travel applications, PaR Systems has recently developed the Tensile Truss, a rigid, hoist-driven 'structure' that employs six independent wire rope hoists to achieve long vertical reaches. Like a mast, the Tensile Truss is typically attached to a bridge-mounted trolley and is used as a platform for robotic manipulators and other remotely operated tools. For suspended, rigid deployment of D and D tools with very long vertical reaches, the Tensile Truss can be a better alternative than a telescoping mast. Masts have length limitations that can make them impractical or unworkable as lengths increase. The Tensile Truss also has the added benefits of increased safety, ease of decontamination, superior stiffness and ability to withstand excessive side loading. A Tensile Truss system is currently being considered for D and D operations and spent fuel recovery at the Fukushima Daiichi Nuclear Power Plant in Japan. This system will deploy interchangeable tools such as underwater hydraulic manipulators, hydraulic shears and crushers, grippers and fuel grapples. (authors)

  9. CALiPER Report 20.3: Robustness of LED PAR38 Lamps

    SciTech Connect (OSTI)

    Poplawski, Michael E.; Royer, Michael P.; Brown, Charles C.

    2014-12-31T23:59:59.000Z

    Three samples of 40 of the Series 20 PAR38 lamps underwent multi-stress testing, whereby samples were subjected to increasing levels of simultaneous thermal, humidity, electrical, and vibrational stress. The results do not explicitly predict expected lifetime or reliability, but they can be compared with one another, as well as with benchmark conventional products, to assess the relative robustness of the product designs. On average, the 32 LED lamp models tested were substantially more robust than the conventional benchmark lamps. As with other performance attributes, however, there was great variability in the robustness and design maturity of the LED lamps. Several LED lamp samples failed within the first one or two levels of the ten-level stress plan, while all three samples of some lamp models completed all ten levels. One potential area of improvement is design maturity, given that more than 25% of the lamp models demonstrated a difference in failure level for the three samples that was greater than or equal to the maximum for the benchmarks. At the same time, the fact that nearly 75% of the lamp models exhibited better design maturity than the benchmarks is noteworthy, given the relative stage of development for the technology.

  10. Quality control summary report for the RFI/RI assessment of the submerged sediment core samples taken at Par Pond, Pond C, and L-Lake

    SciTech Connect (OSTI)

    Koch, J. II

    1996-12-01T23:59:59.000Z

    This report presents a summary of the sediment characterization performed under the direction of the Westinghouse Savannah River Company`s (WSRC) Environmental Protection Department/Environmental Monitoring Section (EPD/EMS) in support of Par Pond, Pond C, and L- Lake. This characterization will be a screening study and will enable the Environmental Sciences Section (ESS) to develop a defensible contaminants of concern list for more extensive characterization of the Par Pond, Pond C, and L-Lake.

  11. TUDE DES CIBLES MINCES CHARGES DE TRITIUM UTILISES DANS LES ACCLRATEURS PRODUISANT DES NEUTRONS RAPIDES PAR LA RACTION D-T

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    61 �TUDE DES CIBLES MINCES CHARG�ES DE TRITIUM UTILIS�ES DANS LES ACC�L�RATEURS PRODUISANT DES [titane-tritium]préparées par le Département des Radioéléments de Saclay. Dix sept cibles ont été ainsi rendement. Abstract. 2014 This study permits the determination of the efficiency of titan-tritium targets

  12. Optimisation de pilotage d'installation rsidentielle de chauffage par micro-cognration

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ,.Optimisation. ABSTRACT. Micro Combined Heat and Power systems for residential building are a key technology) and by Dynamic Programming. The two methods are compared with an application case. KEYWORDS : Micro Combined Heat for the reduction of consumed energy, by combining both decentralized power supply and high overall efficiency

  13. Device calibration impacts security of quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16T23:59:59.000Z

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  14. An experimental study of a six key handprint chord keyboard

    E-Print Network [OSTI]

    Wolstein, Sheldon Aaron

    1986-01-01T23:59:59.000Z

    er Dr. R. Quinn Brackett Head o Department Dr. Leland T. Blank May 1986 ABSTRACT An Exper1mental Study of a Six Key Handprlnt Chord Keyboard (May 1986) Sheldon Aaron Wolstein, B. S. , Texas ASM University Cha1r of Advisory Committee: Dr... PRACTICE ARTICLE UITA 7Z 7B IUU IUB 1U7 11U 111 LIST OF TABLES Page TABLE I Results of Typing Test: Means and Standard Deviations 25 TABLE 2 Means and Variances for Letter Sequence Times 28 TABLE 3 Analysis of Variance for Letter Sequence...

  15. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  16. Effects of color coding on keying time and errors

    E-Print Network [OSTI]

    Wooldridge, Brenda Gail

    1983-01-01T23:59:59.000Z

    were to determine the effects if any oi' color coding upon the error rate and location time of special func- tion keys on a computer keyboard. An ACT-YA CRT keyboard interfaced with a Kromemco microcomputer was used. There were 84 high schoool... to comnunicate with more and more computer-like devices. The most common computer/human interface is the terminal, consisting of a display screen, and keyboard. The format and layout on the display screen of computer-generated information is generally...

  17. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  18. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  19. DOE Announces More Key Administration Posts | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartmentConsumersDevelopmentDepartmentofKey

  20. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues

  1. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey

  2. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy- FORTechnology Key to

  3. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKey

  4. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,KeyTex

  5. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  6. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA Key

  7. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyA

  8. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAA

  9. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAAA

  10. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  11. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteriesmetal-organic frameworks |A photo ofMay 2015andKEY

  12. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to Preserving

  13. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to PreservingIron

  14. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental AssessmentsGeoffrey Campbell isOklahoma City, USA OklahomaTiratIs Key

  15. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) MappingOctober 12,U.S.U.S. DOEJoanKaye D. Lathrop,KevinKey

  16. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Nobel Laureate's

  17. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  18. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  19. Encryption Key Search using Java-based ALiCE Grid

    E-Print Network [OSTI]

    Virkar, Ameya

    Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

  20. $?$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Jameel-Un Nabi; Irgaziev Bakhadir

    2011-08-04T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model results. This study can prove useful for the core-collapse simulators.

  1. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  2. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19T23:59:59.000Z

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  3. Key Science Observations of AGNs with KaVA Array

    E-Print Network [OSTI]

    Kino, Motoki; Zhao, Guang-Yao; Sohn, Bong Won

    2015-01-01T23:59:59.000Z

    KaVA (KVN and VERA Array) is a new combined VLBI array with KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). First, we briefly review the imaging capabilities of KaVA array which actually achieves more than three times better dynamic range than that achieved by VERA alone. The KaVA images clearly show detailed structures of extended radio jets in AGNs. Next, we represent the key science program to be led by KaVA AGN sub working group. We will conduct the monitoring observations of Sgr A* and M87 because of the largeness of their central super-massive black hole angular sizes. The main science goals of the program are (i) testing magnetically-driven-jet paradigm by mapping velocity fields of the M87 jet, and (ii) obtaining tight constraints on physical properties of radio emitting region in Sgr A*.

  4. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  5. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  6. JOURNAL DE PHYSIQUE Colloque C6, supplment au no8, Tome 39, aot 1978, page C6-1631 Ce document a t prpar par les membres du Groupe de travail 4 prs du Comit Consultatif de Ther

    E-Print Network [OSTI]

    Boyer, Edmond

    version anglaise sera publiée dans Metrologia gnées par le symbole T T 6 . au début de 1979. Article

  7. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  8. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  9. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    at zero and increase to $47 per ton of CO2 emissions by 2030. Higher electricity prices reduce demandSixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions Summary of Key................................................................ 10 Wholesale Electricity Prices

  10. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  11. Direct and Reverse Secret-Key Capacities of a Quantum Channel

    E-Print Network [OSTI]

    Braunstein, Samuel L.

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

  12. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01T23:59:59.000Z

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  13. Origin of a complex key innovation in an obligate insectplant mutualism

    E-Print Network [OSTI]

    Krenn, Harald W.

    Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

  14. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-Print Network [OSTI]

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  15. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  16. Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser

    E-Print Network [OSTI]

    Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

  17. On the security of some password-based key agreement schemes

    E-Print Network [OSTI]

    on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19

  18. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  19. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770­2 [7] is vulnerable to a replay attack and also

  20. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks

    E-Print Network [OSTI]

    Hu, Jiankun

    A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Kejie propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous, the wireless sensor network can achieve higher key connectivity and higher resilience. I. INTRODUCTION Wireless

  1. Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates

    E-Print Network [OSTI]

    Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat the environmental correlates exert of the realized fitness of a species (Johnson and O'Neil 2001). They include

  2. Evaluation of the effects of a highway improvement project on Key deer

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30T23:59:59.000Z

    assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

  3. A Remark on Secret-Key Generation over Correlated Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    A Remark on Secret-Key Generation over Correlated Fading Channels Ashish Khisti ECE Dept. Univ@ee.ucla.edu Abstract-- We study secret-key agreement with public discussion over a flat-fading wiretap channel model. INTRODUCTION In recent years there has been a significant interest in developing secret-key agreement protocols

  4. Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion Ashish Khisti Member, IEEE Abstract Fundamental limits of secret-key generation over a two-way, reciprocal and block establish upper and lower bounds on the secret-key generation capacity with public discussion. The upper

  5. Secret-key Agreement with Channel State Information at the Transmitter

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-key Agreement with Channel State Information at the Transmitter Ashish Khisti, Member of secret-key agreement over a wiretap channel with state parameters. The transmitter com- municates discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound

  6. Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach Ashish: akhisti@comm.utoronto.ca Abstract--Fundamental limits of secret-key agreement over reciprocal wireless source generation. The resulting secret-key involves contributions of both channel sequences and source

  7. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number

  8. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  9. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  10. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    SciTech Connect (OSTI)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01T23:59:59.000Z

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  11. les corps qui entourent la lame jouent le rle de la toile dans la premire exprience; par consquent, il est probable que de l'lec-

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Sciences and available at http://dx.doi.org/10.1051/jphystap:018880070015501 #12;I56 avoir déterminé ces grandeurs par l'expérience, ce physicien exa- mine jusqu'à quel point les valeurs obtenues peuvent s ni = 2. Mais voici maintenant la partie importante de la question, telle qu'elle se pose pour 1VI

  12. Etude de l'empoussirement des poudres par un test de fluidisation Study of dustiness of powders by a fluidized bed test

    E-Print Network [OSTI]

    Boyer, Edmond

    1 Etude de l'empoussièrement des poudres par un test de fluidisation Study of dustiness of powders by a fluidized bed test MOUFAREJ ABOU JAOUDE Marie-Thérèsea , LEFRANCOIS Emmanuelb , LE BIHAN Olivierc of this study is to use a fluidized bed as a dustiness test based on entrainment and elutriation phenomena

  13. JOURNAL DE PHYSIQUE Colloque C6, supplment au no 12, Tome 35, Dcembre 1974,page C6-487 TUDE PAR SPECTROMTRIE MOSSBAUER

    E-Print Network [OSTI]

    Boyer, Edmond

    SPECTROMÉTRIE MOSSBAUER DES SOLUTIONS SOLIDES Fe-N CUBIQUES ET TÉTRAGONALES J. FOCT Laboratoire de Métallurgie détectés par spectrométrie Mossbauer permettent de préciserles distributionsd'interstitiels dansl sont comparés aux valeurs publiées dans Fe-C et Fe-N. Abstract. - Mossbauer spectra of Fe-N solid

  14. JOURNAL DE PHYSIQUE Colloytte Cl, supple'ment au 110 1, Tome 35, Janvier 1974, page Cl-81 TUDE PAR EFFET MOSSBAUER DE FERRITES

    E-Print Network [OSTI]

    Boyer, Edmond

    EFFET MOSSBAUER DE FERRITES DE NICKEL-FER NON ST(ECHIOMÉTRIQUES : INFLUENCE DE L'ORDRE DIRECTIONNEL L-Briand, 92190 Meudon-Bellevue, France Résumé. - On a entrepris de mettre en évidence par effet Mossbauer l. - It has been undertaken to show by Mossbauer effect the directional order which appears in ferrites

  15. TUDE EXPRIMENTALE DE LA CINTIQUE DE LA PILE DE CHATILLON ParA. ERTAUD, R. BEAUG, H. FAUQUEZ et L. VAUTREY,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    17 A. ÉTUDE EXPÉRIMENTALE DE LA CINÉTIQUE DE LA PILE DE CHATILLON ParA. ERTAUD, R. BEAUGÉ, H courbes de montée en puissance de la pile et leur liaison avec sa réactivité permet de déterminer expérimentalement la variation de réactivité de la pile lorsque les paramètres suivants varient : - niveau d

  16. Article publi par le Laboratoire de Construction en Bton de l'EPFL Paper published by the Structural Concrete Laboratory of EPFL

    E-Print Network [OSTI]

    Dalang, Robert C.

    concrete Stress fields Strut-and-tie modelling Testing a b s t r a c t The strength and deformation by the Structural Concrete Laboratory of EPFL Article publié par le Laboratoire de Construction en Béton de l'EPFL Paper published by the Structural Concrete Laboratory of EPFL Title: Behaviour of nodal regions

  17. Des six projets de recherche en concurrence, Graphene est l'un des deux slectionns par le programme FET (Future and emerging tech-

    E-Print Network [OSTI]

    Halazonetis, Thanos

    Des six projets de recherche en concurrence, Graphene est l'un des deux sélectionnés par le reconnu en nano-électronique et en matériaux et représentant suisse du projet Graphene (Graphene agship). Aujourd'hui l'Europe lance un projet de recherche d'une envergure sans précédent ( agship). Graphene

  18. LES REPRESENTATIONS DE L'ACCOMPAGNEMENT ET DE LA REMISE AU TRAVAIL DES CHOMEURS DANS LE RESEAU DE L'INSERTION PAR

    E-Print Network [OSTI]

    Boyer, Edmond

    social » dirigée par Alain Vilbrod, aux éditions l'Harmattan Il s'appuie sur un travail socio'insertion ?, �ditions l'harmattan (Ed.) (2008) 276" #12;2 2 traitement du chômage dans ce champ de l'insertion, il s

  19. Article publi par le Laboratoire de Construction en Bton de l'EPFL Paper published by the Structural Concrete Laboratory of EPFL

    E-Print Network [OSTI]

    Dalang, Robert C.

    by the Structural Concrete Laboratory of EPFL Article publié par le Laboratoire de Construction en Béton de l'EPFL Paper published by the Structural Concrete Laboratory of EPFL Title: Assessment of Shear Strength campaign carried out at Ecole Polytechnique Fédérale de Lausanne on 2 reinforced concrete girders and 10

  20. Article publi par le Laboratoire de Construction en Bton de l'EPFL Paper published by the Structural Concrete Laboratory of EPFL

    E-Print Network [OSTI]

    Dalang, Robert C.

    by the Structural Concrete Laboratory of EPFL Article publié par le Laboratoire de Construction en Béton de l'EPFL Paper published by the Structural Concrete Laboratory of EPFL Title: Design for punching of prestressed concrete slabs Authors: Clément T., Ramos A.P., Fernández Ruiz M., Muttoni A. Published in: Structural

  1. Article publi par le Laboratoire de Construction en Bton de l'EPFL Paper published by the Structural Concrete Laboratory of EPFL

    E-Print Network [OSTI]

    Dalang, Robert C.

    by the Structural Concrete Laboratory of EPFL Article publié par le Laboratoire de Construction en Béton de l'EPFL Paper published by the Structural Concrete Laboratory of EPFL Title: Background to the Model Code 2010. J., Sigrist V. Published in: Structural Concrete, Ernst & Sohn DOI 10.100 2 / suc o .2 012 00064

  2. NUCLATION DE L'TAT MIXTE DANS LE NIOBIUM SUPRACONDUCTEUR Par B. P. LETELLIER, J. C. RENARD et Y. A. ROCHER,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    819. NUCLÉATION DE L'ÉTAT MIXTE DANS LE NIOBIUM SUPRACONDUCTEUR Par B. P. LETELLIER, J. C. RENARD d'établissement de l'état mixte ont été étudiées expérimen- talement dans le niobium supraconducteur in superconducting niobium samples. Above HC1 and below the superheating field HSH, a few vortices are nucleated

  3. CONTRIBUTION A L'TUDE DE L'OXYDATION DU NIOBIUM par Messieurs D. MOLLIMARD, J. BARDOLLE, D. SIMON, C. PERRIN et G. DALIBARD

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    599 CONTRIBUTION A L'ÉTUDE DE L'OXYDATION DU NIOBIUM par Messieurs D. MOLLIMARD, J. BARDOLLE, D. SIMON, C. PERRIN et G. DALIBARD Résumé. 2014 Le présent travail est une étude de l'oxydation du Niobium work, Niobium oxidation is studied in various conditions of tempera- ture and pressure with respect

  4. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09T23:59:59.000Z

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  5. Generalized decoding, effective channels, and simplified security proofs in quantum key distribution

    SciTech Connect (OSTI)

    Renes, Joseph M. [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany); Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck-Forschungsgruppe, Institut fuer Optik, Information und Photonik, Universitaet Erlangen-Nuernberg, Staudtstrasse 7, D-91058 Erlangen (Germany); Grassl, Markus [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany)

    2006-08-15T23:59:59.000Z

    Prepare and measure quantum key distribution protocols can be decomposed into two basic steps: delivery of the signals over a quantum channel and distillation of a secret key from the signal and measurement records by classical processing and public communication. Here we formalize the distillation process for a general protocol in a purely quantum-mechanical framework and demonstrate that it can be viewed as creating an 'effective' quantum channel between the legitimate users Alice and Bob. The process of secret key generation can then be viewed as entanglement distribution using this channel, which enables application of entanglement-based security proofs to essentially any prepare and measure protocol. To ensure secrecy of the key, Alice and Bob must be able to estimate the channel noise from errors in the key, and we further show how symmetries of the distillation process simplify this task. Applying this method, we prove the security of several key distribution protocols based on equiangular spherical codes.

  6. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

    2008-01-01T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  7. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

    2008-12-10T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  8. Accurate measurement of heteronuclear dipolar couplings by phase-alternating R-symmetry (PARS) sequences in magic angle spinning NMR spectroscopy

    SciTech Connect (OSTI)

    Hou, Guangjin, E-mail: hou@udel.edu, E-mail: tpolenov@udel.edu; Lu, Xingyu, E-mail: luxingyu@udel.edu, E-mail: lexvega@comcast.net; Vega, Alexander J., E-mail: luxingyu@udel.edu, E-mail: lexvega@comcast.net; Polenova, Tatyana, E-mail: hou@udel.edu, E-mail: tpolenov@udel.edu [Department of Chemistry and Biochemistry, University of Delaware, Newark, Delaware 19716, USA and Pittsburgh Center for HIV Protein Interactions, University of Pittsburgh School of Medicine, 1051 Biomedical Science Tower 3, 3501 Fifth Ave., Pittsburgh, Pennsylvania 15261 (United States)

    2014-09-14T23:59:59.000Z

    We report a Phase-Alternating R-Symmetry (PARS) dipolar recoupling scheme for accurate measurement of heteronuclear {sup 1}H-X (X = {sup 13}C, {sup 15}N, {sup 31}P, etc.) dipolar couplings in MAS NMR experiments. It is an improvement of conventional C- and R-symmetry type DIPSHIFT experiments where, in addition to the dipolar interaction, the {sup 1}H CSA interaction persists and thereby introduces considerable errors in the dipolar measurements. In PARS, phase-shifted RN symmetry pulse blocks applied on the {sup 1}H spins combined with ? pulses applied on the X spins at the end of each RN block efficiently suppress the effect from {sup 1}H chemical shift anisotropy, while keeping the {sup 1}H-X dipolar couplings intact. Another advantage over conventional DIPSHIFT experiments, which require the signal to be detected in the form of a reduced-intensity Hahn echo, is that the series of ? pulses refocuses the X chemical shift and avoids the necessity of echo formation. PARS permits determination of accurate dipolar couplings in a single experiment; it is suitable for a wide range of MAS conditions including both slow and fast MAS frequencies; and it assures dipolar truncation from the remote protons. The performance of PARS is tested on two model systems, [{sup 15}N]-N-acetyl-valine and [U-{sup 13}C,{sup 15}N]-N-formyl-Met-Leu-Phe tripeptide. The application of PARS for site-resolved measurement of accurate {sup 1}H-{sup 15}N dipolar couplings in the context of 3D experiments is presented on U-{sup 13}C,{sup 15}N-enriched dynein light chain protein LC8.

  9. Environmental assessment for the natural fluctuation of water level in Par Pond and reduced water flow in Steel Creek below L-Lake at the Savannah River Site

    SciTech Connect (OSTI)

    NONE

    1995-08-01T23:59:59.000Z

    The Savannah River Operations Office Strategic Plan directs Savannah River Site (SRS) to find ways to reduce operating costs, and to determine what site infrastructure must be maintained and what infrastructure is surplus. Because of the mission change, L-Lake, Par Pond, and the river water system are no longer needed to support current missions and therefore provide an opportunity for operating cost reduction. If SRS determines that L-Lake, Par Pond, and the river water system are no longer needed to support future missions and are considered surplus, appropriate NEPA documentation will be prepared. The purpose of the proposed action in this Environmental Assessment is to begin an examination of the need for the Site`s river water system by (1) developing data needed to evaluate the potential environmental impacts of further reducing or eliminating the flow demands from the Site`s river water system and; (2) evaluating the potential of reducing operating costs by allowing the water level in Par Pond to fluctuate naturally through reduced pumping. This action also includes reducing the current flow rates from L-Lake to Steel Creek to natural stream flows while maintaining full pool. The recently approved Par Pond CERCLA Interim Action Proposed Plan (IAPP) committed to evaluate in a NEPA document the environmental consequences of this proposed action. This document evaluated the remediation of human health and ecological risks associated with the three year drawdown of Par Pond. Should any of the parameters sampled in the reservoir and streams (e.g., water quality, biota, etc.) exceed established threshold levels during the implementation of the proposed action, water would again be pumped into the reservoir to minimize any impacts by bringing the water level back to an appropriate level about 58.2 m (195 ft).

  10. CORN DEVELOPMENT AND KEY GROWTH STAGES Brent Bean and Carl Patrick, Extension Agronomist and Entomologist

    E-Print Network [OSTI]

    Mukhtar, Saqib

    CORN DEVELOPMENT AND KEY GROWTH STAGES Brent Bean and Carl Patrick, Extension Agronomist to have the soil profile full of water prior to tas

  11. Modeling Metal Fatigue As a Key Step in PV Module Life Time Prediction (Presentation)

    SciTech Connect (OSTI)

    Bosco, N.

    2012-02-01T23:59:59.000Z

    This presentation covers modeling metal fatigue as a key step in photovoltaic (PV) module lifetime predictions. Described are time-dependent and time-independent case studies.

  12. HOUSING GUIDE FOR VISITING RESEARCHERS Keys to better understanding French rental rules

    E-Print Network [OSTI]

    Jeanjean, Louis

    HOUSING GUIDE FOR VISITING RESEARCHERS Keys to better understanding French rental rules Document written by the Housing Working Group of the association EURAXESS FRANCE #12;Housing guide Euraxess France................................................................................................................P.3 o Key Principles of House Renting in France...........................................P.4 o

  13. Using Walk-SAT and Rel-SAT for Cryptographic Key Search Fabio Massacci

    E-Print Network [OSTI]

    Massacci, Fabio

    search [...]. Second, improvements in machine speed, memory size and implementations extended the rangeUsing Walk-SAT and Rel-SAT for Cryptographic Key Search Fabio Massacci Dip. di Informatica e of cryptographic algorithms. Thus, cryptographic key search is often THE search problem for many governments

  14. Fast DES Implementations for FPGAs and its Application to a Universal KeySearch Machine ?

    E-Print Network [OSTI]

    of DES with strong emphasis on high­speed performance. Techniques like pipelining and loop unrolling were, We designed a universal key­search machine and used a high speed DES implementation for FPGAsFast DES Implementations for FPGAs and its Application to a Universal Key­Search Machine ? Jens

  15. Fast DES Implementations for FPGAs and its Application to a Universal Key-Search Machine ?

    E-Print Network [OSTI]

    with strong emphasis on high-speed performance. Techniques like pipelining and loop unrolling were used designed a universal key-search machine and used a high speed DES implementation for FPGAs as an algorithmFast DES Implementations for FPGAs and its Application to a Universal Key-Search Machine ? Jens

  16. Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky #

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky a public­key encryption scheme for Alice that allows PIR searching over encrypted documents. Our solution­trivially small communication complexity. The main technique of our solution also allows for Single­Database PIR

  17. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  18. A Method for Obtaining Digital Signatures and PublicKey Cryptosystems

    E-Print Network [OSTI]

    Goldwasser, Shafi

    re­ vealing an encryption key does not thereby reveal the corresponding decryption key. This has two, or the entire work requires specific permission as does republication, or systematic or multiple reproduction . Formally, D(E(M) = M: (1) (b) Both E and D are easy to compute. (c) By publicly revealing E the user does

  19. Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives

    E-Print Network [OSTI]

    Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas portfolio of technology options that can provide abundant energy to power economic development and still

  20. The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean

    E-Print Network [OSTI]

    The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean Phoebe J. Lam1 concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll a key source of bioavailable Fe to the HNLC North Pacific. Keywords: iron, continental margin, HNLC 1