National Library of Energy BETA

Sample records for key provisions including

  1. Introduction Adhesion complexes play key roles in many events, including

    E-Print Network [OSTI]

    Hardin, Jeff

    Introduction Adhesion complexes play key roles in many events, including cell migration cell adhesion are remarkably similar in Caenorhabditis elegans, Drosophila and humans (Hynes and Zhao to reveal much about the basic, conserved molecular mechanisms that mediate and regulate cell adhesion

  2. The seamless provisioning of services and applications across heterogeneous wireless systems will play a key role in

    E-Print Network [OSTI]

    Havinga, Paul J.M.

    is scalable, is able to use the available resources efficiently (like network, energy, and money), and makes for seamless provision of mobile services over heterogeneous wireless networks. The SMART architecture the heterogeneous network transparent to, but nevertheless under control of the user. User-friendliness, security

  3. #include #include

    E-Print Network [OSTI]

    Kessler, Christoph

    ] (where a[n] = +infty). C's * bsearch() can't be used, it requires a[j]==key. */ int findloc( void *key Combine­CRCW BSP­Quicksort * variant by Gerbessiotis/Valiant JPDC 22(1994) * implemented in NestStep­C. */ int N=10; // default value /** findloc(): find largest index j in [0..n­1] with * a[j

  4. Key to Juniperus of Central Asia (from Turkmenistan/Iran through the former Soviet rev. 2/2011 Union, Pakistan and the Western Himalayas, including Nepal)

    E-Print Network [OSTI]

    Adams, Robert P.

    /2011 Union, Pakistan and the Western Himalayas, including Nepal) 1a. All leaves acicular (subulate, jointed

  5. KEY PERSONNEL

    National Nuclear Security Administration (NNSA)

    KEY PERSONNEL 7062015 TITLE NAME President Christopher C. Gentile Vice President, Engineering Robin Stubenhofer Vice President, Integrated Supply Chain Rick Lavelock Director,...

  6. Strategic goods provision in Hezbollah's resistance

    E-Print Network [OSTI]

    Bartels, Elizabeth M. (Elizabeth Murphy)

    2010-01-01

    The provision of goods and services is thought to be a key way that groups are able to gain political power. However, current work has offered a highly fragmentary view of what specific gains can be made with what type of ...

  7. DOE Challenge Home Recommended Quality Management Provisions

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Recommended Quality Management Provisions RECOMMENDED QUALITY MANAGEMENT PROVISIONS QM Provision Builder Documentation & Verification Requirements RaterVerifier Requirements QM...

  8. UKERC ENERGY RESEARCH ATLAS: CARBON CAPTURE AND STORAGE (version 10 February 2008) Section 1: An overview which includes a broad characterisation of research activity in the sector and the key research challenges

    E-Print Network [OSTI]

    Haszeldine, Stuart

    UKERC ENERGY RESEARCH ATLAS: CARBON CAPTURE AND STORAGE (version 10 February 2008) Section 1 Research and Technology Development (RTD) Programmes. Section 8: UK participation in energy-related EU international initiatives, including those supported by the International Energy Agency. Version 1.2 published

  9. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  10. DOE Challenge Home Recommended Quality Management Provisions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Recommended Quality Management Provisions DOE Challenge Home Recommended Quality Management Provisions DOE Challenge Home Recommended Quality Management Provisions. qm6-14-13.pdf...

  11. Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships Mohammad, ymu}@uow.edu.au Abstract. In this paper, we revisit security notions for dedicated-key hash functions notions for dedicated-key hash functions. The provision of this set of enhanced properties has been

  12. Reliable and efficient PUF-based key generation using pattern matching

    E-Print Network [OSTI]

    Paral, Zdenek (Sid)

    We describe a novel and efficient method to reliably provision and re-generate a finite and exact sequence of bits, for use with cryptographic applications, e.g., as a key, by employing one or more challengeable Physical ...

  13. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  14. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  15. Architecture BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Architecture BA (Hons) Key details Duration: 4 years (honours degree) Delivery type: Day Intake in the subject of Architecture, including a portfolio of Design, Technical and Theoretical courses covering all aspects of Architectural Theory and Practice. The course has been designed with reference to the RIBA

  16. Impact of Renewable Fuels Standard/MTBE Provisions of S. 1766

    Reports and Publications (EIA)

    2002-01-01

    This service report addresses the Renewable Fuels Standard (RFS)/methyl tertiary butyl ether (MTBE) provisions of S. 1766. The 'S. 1766' Case reflects provisions of S. 1766 including a renewable fuels standard (RFS) reaching five billion gallons by 2012, a complete phase-out of MTBE within four years, and the option for states to waive the oxygen requirement for reformulated gasoline (RFG).

  17. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  18. Analyses of Selected Provisions of Proposed Energy Legislation: 2003

    Reports and Publications (EIA)

    2003-01-01

    This study responds to a July 31, 2003 request from Senator Byron L. Dorgan. The study is based primarily on analyses the Energy Information Administration has previously done for studies requested by Congress. It includes analysis of the Renewable Portfolio Standard, Renewable Fuels Standard, production in the Alaskan National Wildlife Refuge, the construction of an Alaskan Natural Gas pipeline, and various tax provisions.

  19. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  20. Proposed Provisions on Seismic Design of Steel Shear Walls, proposed to BSSC TS6 by A. Astaneh, May 29, 2002 of 91 Tentatively

    E-Print Network [OSTI]

    Astaneh-Asl, Abolhassan

    Proposed Provisions on Seismic Design of Steel Shear Walls, proposed to BSSC TS6 by A. Astaneh, May 29, 2002 of 91 Tentatively Proposed Seismic Design Provisions and Commentary for Steel Shear Walls to the BSSC and the TS6's efforts in having seismic design provisions for steel shear walls included

  1. Pump apparatus including deconsolidator

    DOE Patents [OSTI]

    Sonwane, Chandrashekhar; Saunders, Timothy; Fitzsimmons, Mark Andrew

    2014-10-07

    A pump apparatus includes a particulate pump that defines a passage that extends from an inlet to an outlet. A duct is in flow communication with the outlet. The duct includes a deconsolidator configured to fragment particle agglomerates received from the passage.

  2. DESIGN OF A RURAL WATER PROVISION SYSTEM TO DECREASE ARSENIC EXPOSURE IN BANGLADESH

    E-Print Network [OSTI]

    Agogino, Alice M.

    DESIGN OF A RURAL WATER PROVISION SYSTEM TO DECREASE ARSENIC EXPOSURE IN BANGLADESH Johanna Louise in South Asia. During fieldwork in four sub-districts of Bangladesh, ARUBA reduced groundwater arsenic concentrations as high as 680 ppb to below the Bangladesh standard of 50 ppb. Key results from three trips

  3. Top Six Areawide Contract Provisions Forgotten

    Broader source: Energy.gov (indexed) [DOE]

    TOP SIX AREAWIDE CONTRACT PROVISIONS FORGOTTEN LINDA L. COLLINS Hosted by: FEDERAL UTILITY PARTNERSHIP WORKING GROUP SEMINAR November 5-6, 2014 Cape Canaveral. Florida ONE * Term...

  4. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  5. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  6. Key Reference Agilent Technologies

    E-Print Network [OSTI]

    Anlage, Steven

    is provided "as is", and is subject to being changed, without notice, in future editions. Further with the User and should any of the contract terms conflict with these terms, the contract terms shall control enables you to define the number of points in a step sweep. When you press this key, the current value

  7. Key Research Results Achievement

    E-Print Network [OSTI]

    ) evaluated several common figures of merit used to compare the electrical and optical performance of TCsKey Research Results Achievement NREL research significantly contributed to inadequate existing not yet at performance levels of TCOs, demonstrate a much better combination of transmission

  8. Key Research Results Achievement

    E-Print Network [OSTI]

    % energy savings in new buildings and major renovations. Researchers at the National Renewable Energy%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvancedEnergy to use signifi- cantly less energy--reducing operating costs and greenhouse gas emissions. This new K-12

  9. EPACT2005: Status of Provisions (Update) (released in AEO2007)

    Reports and Publications (EIA)

    2007-01-01

    The Energy Policy Act 2005 (EPACT) was signed into law by President Bush on August 8, 2005, and became Public Law 109-058. A number of provisions from EPACT2005 were included in the Annual Energy Outlook 2006 (AEO) projections. Many others were not considered in AEO2006particularly, those that require funding appropriations or further specification by federal agencies or Congress before implementation.

  10. Unifying classical and quantum key distillation

    E-Print Network [OSTI]

    Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

    2007-02-28

    Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

  11. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  12. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  13. Data Provision Instructions for All DOE Geothermal Technologies...

    Office of Environmental Management (EM)

    Data Provision Instructions for All DOE Geothermal Technologies Office Funds Recipients Data Provision Instructions for All DOE Geothermal Technologies Office Funds Recipients DATA...

  14. U-116: IBM Tivoli Provisioning Manager Express for Software Distributi...

    Broader source: Energy.gov (indexed) [DOE]

    IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities PLATFORM: IBM Tivoli Provisioning Manager Express for Software Distribution 4.x ABSTRACT:...

  15. Key Management in Historical Context

    E-Print Network [OSTI]

    ;Rolling Keys Why change keys? --- cryptoperiod (intrinsic to cryptosystem) --- management issuesKey Management in Historical Context Whitfield Diffie Internet Corporation for Assigned Names to become the security or insecurity of the message. #12;Key management systems both reflect and shape

  16. Democratic Institutions and Provision of Public Good

    E-Print Network [OSTI]

    Saha, Sarani

    2007-01-01

    2003. [3] R. T. Deacon and S. Saha. Public Good Provision byof a Public Good Sarani Saha PhD Candidate Donald Brenof a Public Good Sarani Saha PhD Candidate Donald Bren

  17. How to discover the API key needed for table creation in the Provisioning

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy Resources JumpNew Jersey:Hopkinsville,Advanced ResearchHow can IHow

  18. Page 1 of 6 MULTI-USE LIST FOR THE PROVISION OF SAP AND ENTERPRISE SYSTEMS

    E-Print Network [OSTI]

    Greenslade, Diana

    Page 1 of 6 MULTI-USE LIST FOR THE PROVISION OF SAP AND ENTERPRISE SYSTEMS RESOURCES Ref: 098 and implementation of business systems, including requirements specification, process analysis and design, business and metrics reporting, benchmarking, and surveying. Project and Program Management Including but not limited

  19. Energy Independence and Security Act of 2007: Summary of Provisions (released in AEO2008)

    Reports and Publications (EIA)

    2008-01-01

    The Energy Independence and Security Act of 2007 was signed into law on December 19, 2007, and became Public Law 110-140. Provisions in EISA2007 that require funding appropriations to be implemented, whose impact is highly uncertain, or that require further specification by federal agencies or Congress are not included in Annual Energy Outlook 2008 (AEO). For example, the Energy Information Administration (EIA) does not try to anticipate policy responses to the many studies required by EISA2007, nor to predict the impact of research and development (R&D) funding authorizations included in the bill. Moreover, AEO2008 does not include any provision that addresses a level of detail beyond that modeled in the National Energy Modeling System (NEMS), which was used to develop the AEO2008 projections. AEO2008 addresses only those provisions in EISA2007 that establish specific tax credits, incentives, or standards.

  20. Mechanical Engineering BEng / BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Mechanical engineers play key roles in all industrial sectors, from aerospace and oil and gas, through food for Mechanical Engineering graduates in many sectors, including power production, oil and petrochemicals, manufacturing, power plant, medical engineering and many others l Whatever your final career path, developing

  1. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  2. CAREER RESOURCES Canadian Key Business Directory

    E-Print Network [OSTI]

    Thompson, Michael

    CAREER RESOURCES BOOKS Canadian Key Business Directory - Includes the largest companies in Canada companies - Search by name, geography, SIC code and more! - Online version available through library: http://www.jobsetc.gc.ca/eng/ - Training, career and worker information - Career Exploration resources

  3. PUBLIC HEALTH SIGNIFICANCE OF GROUPS INCLUDED IN THE KEY COMMON NAME PUBLIC HEALTH SIGNIFICANCE

    E-Print Network [OSTI]

    fever. Mosquito . . . . . . . . . . . . . . transmit malaria, encephalitis, yellow fever, dengue fever. Ked or Louse Fly . . . . . . . occasionally bite man. Kissing Bug fever, relaps ing fever. Sun Spider . . . . . . . . . . . . . non-venomous bite. Termite

  4. Policy on Keys and Keycards Policy on Keys and Keycards

    E-Print Network [OSTI]

    Sridhar, Srinivas

    department is responsible for the total cost of lock changes and new keys/cards to secure areas compromised has been compromised, and avoid potentially significant costs due to theft, vandalism, or excessive be given access to keys/cards that permit entry to buildings and locked spaces on the University campuses

  5. Dynamic Resource Provisioning Condor Week 2012

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    to the Grid ­ Highly available facility ­ Testbed for network and storage fabrics · Condor is important part (JDEM analysis development, Grid Developers and Integration test stands, Storage/dCache Developers, LQCDFermiCloud Dynamic Resource Provisioning Condor Week 2012 Steven Timm timm@fnal.gov Fermilab Grid

  6. Amendment 80 vessel replacement 1 Implementation and of Amendment 80 Vessel Replacement Provisions

    E-Print Network [OSTI]

    Amendment 80 vessel replacement 1 Implementation and of Amendment 80 Vessel Replacement Provisions identified and limited the vessels that could be used to fish for certain species of BSAI groundfish in a particular sector of the groundfish fishery. The final rule included this vessel restriction based on NMFS

  7. Energy Improvement and Extension Act of 2008: Summary of Provisions (released in AEO2009)

    Reports and Publications (EIA)

    2009-01-01

    The Emergency Economic Stabilization Act of 2008 (Public Law 110-343), which was signed into law on October 3, 2008, incorporates EIEA2008 in Division B. Provisions in EIEA2008 that require funding appropriations to be implemented, whose impact is highly uncertain or that require further specification by federal agencies or Congress, are not included in Annual Energy Outlook 2009.

  8. Energy Provisions of the California Green Building Standards Code Page 2 CHAPTER 4, RESIDENTIAL MANDATORY MEASURES

    E-Print Network [OSTI]

    Energy Provisions of the California Green Building Standards Code Page 2 CHAPTER 4, RESIDENTIAL Building (Energy Budget) and the annual TDV energy consumption for lighting and components not regulated for energy use components included in the performance compliance approach for the Standard Design Building

  9. Reliable Provisioning of Data-Centric and Event-Based

    E-Print Network [OSTI]

    Dustdar, Schahram

    Reliable Provisioning of Data-Centric and Event-Based Applications in the Cloud DISSERTATION zur A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at #12;#12;Reliable Provisioning of Data-Centric a set of novel methods and tools for reliable provisioning of data-centric and event-based applications

  10. Energy-Constrained Provisioning for Scientific Workflow Ensembles

    E-Print Network [OSTI]

    Deelman, Ewa

    --cloud computing; energy efficiency; workflow scheduling; resource provisioning I. INTRODUCTION Cloud computing address the problem of energy-efficient resource provisioning and task scheduling with energy constraints and evaluate two energy-aware algorithms that can be used for resource provisioning and task scheduling

  11. NAME GRAD'NG KEY .

    E-Print Network [OSTI]

    MA 165 EXAM 3 Fall 2002 Page 1/4. NAME GRAD'NG KEY . Page 1 / 18. STUDENT ID Page 2 / 32. Page 3 /18. RECITATION INSTRUCTOR. Page 4 / 32.

  12. Diversity & Flexibility Key to Sustainability | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Diversity & Flexibility Key to Sustainability Diversity & Flexibility Key to Sustainability Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting...

  13. Countries Gasoline Prices Including Taxes

    Gasoline and Diesel Fuel Update (EIA)

    Crude oil, gasoline, heating oil, diesel, propane, and other liquids including biofuels and natural gas liquids. Natural Gas Exploration and reserves, storage, imports and...

  14. Key China Energy Statistics 2012

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  15. Key China Energy Statistics 2011

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  16. Key Issues | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKey

  17. Key Steps | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKeyKey Steps

  18. Neutralino relic density including coannihilations

    E-Print Network [OSTI]

    Paolo Gondolo; Joakim Edsjo

    1997-11-25

    We give an overview of our precise calculation of the relic density of the lightest neutralino, in which we included relativistic Boltzmann averaging, subthreshold and resonant annihilations, and coannihilation processes with charginos and neutralinos.

  19. INFORMATION: THE KEY TO SUSTAINABILITY

    E-Print Network [OSTI]

    Bateman, Ian J.

    of construction and demolition wastes and the introduction of demolition plans. Examples of information sources in the UK, Europe and the US are provided. Key words: waste management, construction, demolition, secondary sector so are concerned with re-use and recycling construction and demolition waste (C & D). However many

  20. Few-key Text Entry Revisited: Mnemonic Gestures on Four Keys

    E-Print Network [OSTI]

    Wobbrock, Jacob O.

    of Roman letters for high learnability. We compare this new 4-key method to predominant 3-key and 5-key present a new 4-key method that relies on mnemonic gestures reminiscent of Roman letters. Our method-key methods rely on two keys to move a selector left and right and a third key to select a letter. Although

  1. 2016 Power Rate Schedules and General Rate Schedule Provisions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Provisions (FY 2016-2017) October 2015 United States Department of Energy Bonneville Power Administration 905 N.E. 11th Avenue Portland, OR 97232 Bonneville Power...

  2. Guidelines for Provision and Interchange of Geothermal Data Assets

    Office of Energy Efficiency and Renewable Energy (EERE)

    This document presents guidelines related to provision and interchange of data assets in the context of the National Geothermal Data System.

  3. Identify key design elements of desired function

    E-Print Network [OSTI]

    Nawroth, Janna C.

    DESIGN Identify key design elements of desired function Identify functionally equivalent implementation of key design elements (e.g. structure, physiology, kinematics etc.) Quantify functional and standardize fabrication for repeatability . Test phase: Quantify implementation of key design elements

  4. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  5. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key

  6. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

  7. Key Opportunities and Challenges for Program Sustainability ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  8. GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald

    E-Print Network [OSTI]

    Ma, Lena

    GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald Contact: Soil and Water information systems (GIS), geostatistical and statistical methods, space-time landscape modeling, remote laboratory. Available software include: MS Office Suite; MS SQL database; ArcGIS Suite (ESRI) including

  9. Key regulatory drivers affecting shipments of mixed transuranic waste from Los Alamos National Laboratory to the Waste Isolation Pilot Plant

    SciTech Connect (OSTI)

    Schumann, P.B.; Bacigalupa, G.A.; Kosiewicz, S.T.; Sinkule, B.J.

    1997-02-01

    A number of key regulatory drivers affect the nature, scope, and timing of Los Alamos National Laboratory`s (LANL`s) plans for mixed transuranic (MTRU) waste shipments to the Waste Isolation Pilot Plant (WIPP), which are planned to commence as soon as possible following WIPP`s currently anticipated November, 1997 opening date. This paper provides an overview of some of the key drivers at LANL, particularly emphasizing those associated with the hazardous waste component of LANL`s MTRU waste (MTRU, like any mixed waste, contains both a radioactive and a hazardous waste component). The key drivers discussed here derive from the federal Resource Conservation and Recovery Act (RCRA) and its amendments, including the Federal Facility Compliance Act (FFCAU), and from the New Mexico Hazardous Waste Act (NMHWA). These statutory provisions are enforced through three major mechanisms: facility RCRA permits; the New Mexico Hazardous Waste Management Regulations, set forth in the New Mexico Administrative Code, Title 20, Chapter 4, Part 1: and compliance orders issued to enforce these requirements. General requirements in all three categories will apply to MTRU waste management and characterization activities at both WIPP and LANL. In addition, LANL is subject to facility-specific requirements in its RCRA hazardous waste facility permit, permit conditions as currently proposed in RCRA Part B permit applications presently being reviewed by the New Mexico Environment Department (NNED), and facility-specific compliance orders related to MTRU waste management. Likewise, permitting and compliance-related requirements specific to WIPP indirectly affect LANL`s characterization, packaging, record-keeping, and transportation requirements for MTRU waste. LANL must comply with this evolving set of regulatory requirements to begin shipments of MTRU waste to WIPP in a timely fashion.

  10. American Recovery and Reinvestment Act of 2009: Summary of Provisions (released in AEO2010)

    Reports and Publications (EIA)

    2010-01-01

    The American Recovery and Reinvestment Act of 2009 (ARRA), signed into law in mid-February 2009, provides significant new federal funding, loan guarantees, and tax credits to stimulate investments in energy efficiency and renewable energy. The provisions of ARRA were incorporated initially as part of a revision to the Annual Energy Outlook 2009 Reference case that was released in April 2009, and they also are included in Annual Energy Outlook 2010.

  11. Key Activities | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey

  12. Key Terms | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | International NuclearKaren AtkinsonAbout the FuelKey

  13. MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS

    E-Print Network [OSTI]

    Gao, Shuhong

    MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS SHUHONG GAO AND RAYMOND HEINDL for multivariate public key cryptosystems, which combines ideas from both triangular and oil-vinegar schemes. We the framework. 1. Introduction 1.1. Multivariate Public Key Cryptography. Public key cryptography plays

  14. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  15. Statistical Profiling-based Techniques for Effective Power Provisioning in Data Centers

    E-Print Network [OSTI]

    Giles, C. Lee

    , Reliability Keywords: Data center, Power Provisioning, Power supply hierarchy, Prediction, Profiling 1Statistical Profiling-based Techniques for Effective Power Provisioning in Data Centers Sriram System, Inc. Abstract: Current capacity planning practices based on heavy over-provisioning of power

  16. Spatial and Temporal Variation in Stone Raw Material Provisioning in the Chivay Obsidian Source Area

    E-Print Network [OSTI]

    Tripcevich, Nicholas; MacKay, Alex

    2012-01-01

    Variations in Stone Raw Material Provisioning in the ChivayVariations in Stone Raw Material Provisioning in the Chivayof widely cir- culated raw materials provides an opportunity

  17. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    includes crude oil, natural gas liquids, refinery feedstock,Liquid Petroleum Gas Refinery Gas Mt Mt Petroleum Other Products Natural GasLiquid Petroleum Gas Total Primary Energy Supply Refinery Gas Petroleum Other Products Natural Gas

  18. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    includes crude oil, natural gas liquids, refinery feedstock,Liquid Petroleum Gas Total Primary Energy Supply Refinery Gas Other Petroleum Products Natural GasLiquid Petroleum Gas Total Primary Energy Supply Refinery Gas Other Petroleum Products Natural Gas

  19. Advance Resource Provisioning in Bulk Data Scheduling

    SciTech Connect (OSTI)

    Balman, Mehmet

    2012-10-01

    Today?s scientific and business applications generate mas- sive data sets that need to be transferred to remote sites for sharing, processing, and long term storage. Because of increasing data volumes and enhancement in current net- work technology that provide on-demand high-speed data access between collaborating institutions, data handling and scheduling problems have reached a new scale. In this paper, we present a new data scheduling model with ad- vance resource provisioning, in which data movement operations are defined with earliest start and latest comple- tion times. We analyze time-dependent resource assign- ment problem, and propose a new methodology to improve the current systems by allowing researchers and higher-level meta-schedulers to use data-placement as-a-service, so they can plan ahead and submit transfer requests in advance. In general, scheduling with time and resource conflicts is NP-hard. We introduce an efficient algorithm to organize multiple requests on the fly, while satisfying users? time and resource constraints. We successfully tested our algorithm in a simple benchmark simulator that we have developed, and demonstrated its performance with initial test results.

  20. Time-cost analysis of a quantum key distribution system clocked at 100 MHz

    E-Print Network [OSTI]

    Xiaofan Mo; Itzel Lucio Martinez; Philip Chan; Chris Healey; Steve Hosier; Wolfgang Tittel

    2011-05-18

    We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

  1. Provisioning high-availability datacenter networks for full bandwidth communication

    E-Print Network [OSTI]

    Huang, Changcheng

    Provisioning high-availability datacenter networks for full bandwidth communication Wenda Ni a 4 December 2013 Available online 12 March 2014 Keywords: Datacenter networks Valiant load balancing critical challenge in datacenter network design is full bandwidth communication. Recent advances have

  2. IAM Provisioning of Access Friday, December 07, 2007

    E-Print Network [OSTI]

    Maroncelli, Mark

    of directory services is critical the success of timely and automated provision. The new model for affiliations the following: Staff Employee ­ currently employed [Assigned automatically through the hiring process] Admin

  3. Title 1 General Provisions Chapter 5 Common Law; General Rights...

    Open Energy Info (EERE)

    Title 1 General Provisions Chapter 5 Common Law; General Rights 3 V.S.A. Section 2809 Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document-...

  4. Hash-based Multivariate Public Key Cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Hash-based Multivariate Public Key Cryptosystems WANG Hou-Zhen and ZHANG Huan-Guo The Key for the traditional multivariate public key cryp- tosystems. For example, the signature scheme SFLASH was broken. at ASIACRYPTO'09. Most multivariate schemes known so far are insecure, except maybe the sigature schemes UOV

  5. Access Control: Key Control Policy Page 1 of 5 Virginia Polytechnic Institute and State University No. 5620 Rev.: 3

    E-Print Network [OSTI]

    Zallen, Richard

    , maintenance of physical security devices, and other arrangements concerning security for leased properties logistics. 2. To establish control of the campus keying system including key duplication and distribution. 3

  6. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  7. Wind Vision: Analysis Highlights and Key Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Highlights and Key Results Eric Lantz (NREL) Ryan Wiser (LBNL) July 15, 2015 2 | Wind and Water Power Technologies Office eere.energy.gov Presentation Overview Wind...

  8. Monroe County Extension Services Key West Office

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    potable water is pumped to the Keys from the mainland through a 130-mile long transmission line irrigation and fertilizer, and are more

  9. DCLL TBM Safety Assessment A key objective for ITER includes integrated testing of blanket concepts suitable for demonstrating fusion

    E-Print Network [OSTI]

    . A DCLL TBS Failure Modes and Effects Analysis was summarized and design basis events based on this FMEA

  10. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  11. On multivariate signatureonly public key cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On multivariate signature­only public key cryptosystems Nicolas T. Courtois 1,2 courtois we argument that the problem has many natural solutions within the framework of the multivariate cryptography. First of all it seems that virtually any non­injective multivariate public key is inherently

  12. Deniable Internet Key Exchange Andrew C. Yao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Deniable Internet Key Exchange Andrew C. Yao Frances F. Yao Yunlei Zhao§ Bin Zhu¶ Abstract In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following of privacy protection (especially for E-commerce over Internet), this work is naturally of practical interest

  13. Prices include compostable serviceware and linen tablecloths

    E-Print Network [OSTI]

    California at Davis, University of

    APPETIZERS Prices include compostable serviceware and linen tablecloths for the food tables.ucdavis.edu. BUTTERNUT SQUASH & BLACK BEAN ENCHILADAS #12;BUFFETS Prices include compostable serviceware and linen

  14. 1 INTRODUCTION Seismic design provisions in building codes aim

    E-Print Network [OSTI]

    Baker, Jack W.

    1 INTRODUCTION Seismic design provisions in building codes aim to provide adequate collapse safety uncertainty for collapse safety assessment. A variety of reliability methods are explored and compared behavior of its components and its assessment requires non- linear analysis models that capture large

  15. Virtual Machine Power Metering and Provisioning Aman Kansal, Feng Zhao,

    E-Print Network [OSTI]

    Zhao, Feng

    data centers have led to most new servers providing power usage measurement in hardware and alter- nateVirtual Machine Power Metering and Provisioning Aman Kansal, Feng Zhao, Jie Liu Microsoft Research of them is lack of power metering for virtual machines (VMs). Power man- agement requirements in modern

  16. Impact of Load Sharing on Provisioning Services with Consistency Requirements

    E-Print Network [OSTI]

    of ser- vices must provision their servers so that response times remain low even wheen demand is high. The total demand at a serving system is comprised of an aggregate of demands from multiple servicing algorithms provides upper bounds of the response times, and shows that greedy algorithms can reduce

  17. Paradigm-Based Adaptive Provisioning in Virtualized Data Centers

    E-Print Network [OSTI]

    Boutaba, Raouf

    Paradigm-Based Adaptive Provisioning in Virtualized Data Centers Rafael Pereira Esteves, Lisandro), Pohang 790-784, Korea Abstract--Virtualized data centers host multiple applications with distinct objectives in a shared infrastructure. Accommo- dating several dynamic applications in virtual data centers

  18. Asymptotics for Provisioning Problems of Peering Wireless LANs

    E-Print Network [OSTI]

    Weber, Richard

    Asymptotics for Provisioning Problems of Peering Wireless LANs with a Large Number of Participants. We consider a model in which wireless LANs are to be provided in a number of locations. The owners and contribution requirements can be easily communicated to the participants. 1 Peer to peer networks of wireless

  19. SEISMIC DESIGN PROVISIONS -THE CANADIAN HIGHWAY BRIDGE DESIGN CODE

    E-Print Network [OSTI]

    Bruneau, Michel

    in the 1994 American Association of State Highway and Transportation Officials Load and Resistance Factor Code in the 1994 American Association of State Highway and Transportation Officials Load and Resistance Factor CodeSEISMIC DESIGN PROVISIONS - THE CANADIAN HIGHWAY BRIDGE DESIGN CODE Denis MITCHELL Mc

  20. Proposed Energy Provisions of the California Green Building Standards Code

    E-Print Network [OSTI]

    Proposed Energy Provisions of the California Green Building Standards Code Part 11 of the California Building Code (also known as CalGreen) Patrick Saxton, P.E. patrick.saxton@energy.ca.gov 916-651-0489 High Performance Buildings and Standards Development Office California Energy Commission September 20

  1. Key Renewable Energy Opportunities for Oklahoma Tribes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKeyKEY

  2. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  3. Civil Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Civil Engineering BEng (Hons) Key details Duration: Full-time: 4 years (BEng Hons) Delivery type engineering disciplines of Structures, Geotechnics, Water Engineering and Transportation Engineering civil or structural engineers. After graduation, students are equipped to work for consultants

  4. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  5. CoolProvision: Underprovisioning Datacenter Cooling Ioannis Manousakis I~nigo Goiri Sriram Sankar

    E-Print Network [OSTI]

    Bianchini, Ricardo

    CoolProvision, an optimiza- tion and simulation framework for selecting the cheapest provisioning. In addition, US datacenters collectively incur billions of dollars in electricity cost per year [40

  6. Asynchronous Coordination of Distributed Energy Resources for the Provisioning of Ancillary Services

    E-Print Network [OSTI]

    Hadjicostis, Christoforos

    Asynchronous Coordination of Distributed Energy Resources for the Provisioning of Ancillary provisioning of ancillary services in power grids. First, we consider and analyze a protocol that can be used it towards energy resource provisioning of ancillary services in a power grid. I. INTRODUCTION The presence

  7. Comparing the Commercial Provisions for the 2015 IECC with the Corresponding Provisions in the 2012 IECC for Commercial Construction in Texas. 

    E-Print Network [OSTI]

    Baltazar, J. C.; Ellis, S.; Haberl, J.S.; Yazdani, B.

    2014-01-01

    -11-02 COMPARING THE COMMERCIAL PROVISIONS OF THE 2015 IECC WITH THE CORRESPONDING PROVISIONS IN THE 2012 IECC FOR COMMERCIAL CONSTRUCTION IN TEXAS A Report Jaya Mukhopadhyay, PhD Juan-Carlos Baltazar, PhD, P.E. Shirley Ellis Jeff S.... Haberl, PhD, P.E. Bahman Yazdani. P.E. November 2014 ii November 2014 Assessing Commercial Provisions in the 2015 IECC Energy Systems Laboratory...

  8. Co-scheduling of network resource provisioning and host-to-host bandwidth reservation on high-performance network and storage systems

    DOE Patents [OSTI]

    Yu, Dantong; Katramatos, Dimitrios; Sim, Alexander; Shoshani, Arie

    2014-04-22

    A cross-domain network resource reservation scheduler configured to schedule a path from at least one end-site includes a management plane device configured to monitor and provide information representing at least one of functionality, performance, faults, and fault recovery associated with a network resource; a control plane device configured to at least one of schedule the network resource, provision local area network quality of service, provision local area network bandwidth, and provision wide area network bandwidth; and a service plane device configured to interface with the control plane device to reserve the network resource based on a reservation request and the information from the management plane device. Corresponding methods and computer-readable medium are also disclosed.

  9. INSTRUMENTATION, INCLUDING NUCLEAR AND PARTICLE DETECTORS; RADIATION

    Office of Scientific and Technical Information (OSTI)

    interval technical basis document Chiaro, P.J. Jr. 44 INSTRUMENTATION, INCLUDING NUCLEAR AND PARTICLE DETECTORS; RADIATION DETECTORS; RADIATION MONITORS; DOSEMETERS;...

  10. Contract Provisions and Ratchets: Utility Security or Customer Equity? 

    E-Print Network [OSTI]

    Penkala, B. A.

    1987-01-01

    basis, the use of ratchet provisions within a rate struc ture attempt to equitably recover these fixed costs on a monthly basis. By billing the customer for at least a certain percentage of their maximum demand in succeeding months, the customer... equitable to the consumer, but are necessary to avoid discrim ination within a customer class. It is possible for the utility to secure the same demand revenue in a yearly period without using a ratchet, but this pricing method would provide...

  11. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  12. Fashion Marketing & Retailing BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Fashion Marketing & Retailing BA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (BA Hons) Delivery type: Day Intake date: September Fees: 54000 AED per year Overview Our Fashion Marketing and Retailing programme confidently prepares students for a career within the marketing and retailing industry

  13. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Duren, Mike

    2012-01-01

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  14. Organisational Change -Key Steps LocalCollege/

    E-Print Network [OSTI]

    Botea, Adi

    Resources Division START Version 1.0 X:\\Employment Strategies\\Workplace Change & Innovation\\Change Management Frameworks\\Change Management - Key Steps 021111.vsd FINISH NOTES: * For information on formal vs informal change refer to the managing change clause in the ANU Enterprise Agreement and the managing change policy

  15. Chemical Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Chemical Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng Hons) Delivery type: Day Intake date: September Fees: 58000 AED per year Overview Chemical engineering successful and thriving types of business in the world. Chemical engineers play a vital role in achieving

  16. Management strategies for endangered Florida Key deer 

    E-Print Network [OSTI]

    Peterson, Markus Nils

    2004-09-30

    species. These data were used to address my study objectives. I found the most commonly cited FSR (2.67:1, male:female) for Florida Key deer to be inaccurate. A male biased FSR of 1.45:1 was more probable. Modified drop and drive nets were appropriate...

  17. Psychology with Management BSc (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Psychology with Management BSc (Hons) Key details Duration: Full-time: 4 years Delivery type: Day% Psychology with 25% Business and Management modules. Psychology modules cover a range of core approaches to psychology as well as research design and analysis and applied specialist topics. The curriculum is based

  18. Business Management BA / MA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Business Management BA / MA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (MSc Management degree programme follows a number of guiding principles that mirror the values of managers of leading organisations and reflect current business management thinking. In the first two years of all

  19. Vermont's Changing Forests Key Findings on the

    E-Print Network [OSTI]

    Keeton, William S.

    1 Vermont's Changing Forests Key Findings on the Health of Forested Ecosystems from the Vermont Members Anne Archie, USDA Forest Service Douglas Lantagne, University of Vermont Ed O'Leary, Vermont, USDA Farm Service Agency Charles Scott, USDA Forest Service Steven Sinclair, Vermont Agency of Natural

  20. Automotive Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Automotive Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng programme, but allows students in the later years to specialise in subjects relating to automotive technology. Automotive engineering continues to be a major employer of professional engineers, owing

  1. NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues

    E-Print Network [OSTI]

    NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues Cem Kaner, J.D., Ph.D., ASQ-CQE November 1999 Contact Information: kaner@kaner.com www.kaner.com (testing November 1999 Cem Kaner Page 2 UCITA? Huh?UCITA? Huh? · Uniform Computer Information Transactions Act

  2. Course may include: Research in Education

    E-Print Network [OSTI]

    Course may include: Research in Education Statistics in Education Theories of Educational Admin Policy Analysis Sociological Aspects of Education Approaches to Literacy Development Information and Communication Technologies Issues in Education Final Project Seminar Master of Education Educational

  3. Gas storage materials, including hydrogen storage materials

    DOE Patents [OSTI]

    Mohtadi, Rana F; Wicks, George G; Heung, Leung K; Nakamura, Kenji

    2014-11-25

    A material for the storage and release of gases comprises a plurality of hollow elements, each hollow element comprising a porous wall enclosing an interior cavity, the interior cavity including structures of a solid-state storage material. In particular examples, the storage material is a hydrogen storage material, such as a solid state hydride. An improved method for forming such materials includes the solution diffusion of a storage material solution through a porous wall of a hollow element into an interior cavity.

  4. Gas storage materials, including hydrogen storage materials

    DOE Patents [OSTI]

    Mohtadi, Rana F; Wicks, George G; Heung, Leung K; Nakamura, Kenji

    2013-02-19

    A material for the storage and release of gases comprises a plurality of hollow elements, each hollow element comprising a porous wall enclosing an interior cavity, the interior cavity including structures of a solid-state storage material. In particular examples, the storage material is a hydrogen storage material such as a solid state hydride. An improved method for forming such materials includes the solution diffusion of a storage material solution through a porous wall of a hollow element into an interior cavity.

  5. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

  6. Scramjet including integrated inlet and combustor

    SciTech Connect (OSTI)

    Kutschenreuter, P.H. Jr.; Blanton, J.C.

    1992-02-04

    This patent describes a scramjet engine. It comprises: a first surface including an aft facing step; a cowl including: a leading edge and a trailing edge; an upper surface and a lower surface extending between the leading edge and the trailing edge; the cowl upper surface being spaced from and generally parallel to the first surface to define an integrated inlet-combustor therebetween having an inlet for receiving and channeling into the inlet-combustor supersonic inlet airflow; means for injecting fuel into the inlet-combustor at the step for mixing with the supersonic inlet airflow for generating supersonic combustion gases; and further including a spaced pari of sidewalls extending between the first surface to the cowl upper surface and wherein the integrated inlet-combustor is generally rectangular and defined by the sidewall pair, the first surface and the cowl upper surface.

  7. Electric Power Monthly, August 1990. [Glossary included

    SciTech Connect (OSTI)

    Not Available

    1990-11-29

    The Electric Power Monthly (EPM) presents monthly summaries of electric utility statistics at the national, Census division, and State level. The purpose of this publication is to provide energy decisionmakers with accurate and timely information that may be used in forming various perspectives on electric issues that lie ahead. Data includes generation by energy source (coal, oil, gas, hydroelectric, and nuclear); generation by region; consumption of fossil fuels for power generation; sales of electric power, cost data; and unusual occurrences. A glossary is included.

  8. Remote Key Establishment by Mode Mixing in Multimode Fibres and Optical Reciprocity

    E-Print Network [OSTI]

    Bromberg, Yaron; Popoff, Sebastien M; Cao, Hui

    2015-01-01

    Disorder and scattering in photonic systems have long been considered a nuisance that should be circumvented. Recently, disorder has been harnessed for a rapidly growing number of applications, including imaging, sensing and spectroscopy. The chaotic dynamics and extreme sensitivity to external perturbations make random media particularly well-suited for optical cryptography. However, using random media for distribution of secret keys between remote users still remains challenging, since it requires the users have access to the same scattering system. Here we utilize random mode mixing in multimode fibres to generate and distribute keys simultaneously. Fast fluctuations in the fibre mode mixing provide the source of randomness for the key generation, and optical reciprocity guarantees that the keys at the two ends of the fibre are identical. We experimentally demonstrate the scheme using classical light and off-the-shelf components, opening the door for cost effective key establishment at the physical-layer o...

  9. H.R. 1126: A Bill to strengthen and improve the pipeline safety provisions of chapter 601 of title 49, United States Code, and for other purposes. Introduced in the House of Representatives, One Hundred Fourth Congress, First Session, March 3, 1995

    SciTech Connect (OSTI)

    NONE

    1995-12-31

    The report H.R. 1126 is a bill to strengthen and improve the pipeline safety provisions of chapter 601 of title 49, United Stated Code. The proposed legislative text is included.

  10. Identification of Key Barriers in Workforce Development

    SciTech Connect (OSTI)

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  11. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  12. Rapid Compression Machine ? A Key Experimental Device to Effectively...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compression Machine A Key Experimental Device to Effectively Collaborate with Basic Energy Sciences Rapid Compression Machine A Key Experimental Device to Effectively...

  13. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  14. Single, Key Gene Discovery Could Streamline Production of Biofuels...

    Energy Savers [EERE]

    Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

  15. Building America Expert Meeting: Key Innovations for Adding Energy...

    Energy Savers [EERE]

    Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance...

  16. Thailand-Key Results and Policy Recommendations for Future Bioenergy...

    Open Energy Info (EERE)

    Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future...

  17. Technology Key to Harnessing Natural Gas Potential | Department...

    Office of Environmental Management (EM)

    Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa...

  18. Key Energy-Saving Projects for Smaller Facilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Energy-Saving Projects for Smaller Facilities Key Energy-Saving Projects for Smaller Facilities This presentation discusses how smaller industrial facilities can save energy...

  19. MOTIVATION INCLUDED OR EXCLUDED FROM Mihaela Cocea

    E-Print Network [OSTI]

    Cocea, Mihaela

    MOTIVATION ­ INCLUDED OR EXCLUDED FROM E-LEARNING Mihaela Cocea National College of Ireland Mayor, Dublin 1, Ireland sweibelzahl@ncirl.ie ABSTRACT The learners' motivation has an impact on the quality-Learning, motivation has been mainly considered in terms of instructional design. Research in this direction suggests

  20. Energy Consumption of Personal Computing Including Portable

    E-Print Network [OSTI]

    Namboodiri, Vinod

    processing unit (CPU) processing power and capacity of mass storage devices doubles every 18 months. Such growth in both processing and storage capabilities fuels the production of ever more powerful portableEnergy Consumption of Personal Computing Including Portable Communication Devices Pavel Somavat1

  1. Course may include: Research in Education

    E-Print Network [OSTI]

    Development Information and Communication Technologies Issues in Education Final Project Seminar Master, the Final Project Seminar. This graduate program will allow you to develop your skills and knowledgeCourse may include: Research in Education Qualitative Methods in Educational Research Fundamentals

  2. Communication in automation, including networking and wireless

    E-Print Network [OSTI]

    Antsaklis, Panos

    Communication in automation, including networking and wireless Nicholas Kottenstette and Panos J and networking in automation is given. Digital communication fundamentals are reviewed and networked control are presented. 1 Introduction 1.1 Why communication is necessary in automated systems Automated systems use

  3. Subterranean barriers including at least one weld

    DOE Patents [OSTI]

    Nickelson, Reva A.; Sloan, Paul A.; Richardson, John G.; Walsh, Stephanie; Kostelnik, Kevin M.

    2007-01-09

    A subterranean barrier and method for forming same are disclosed, the barrier including a plurality of casing strings wherein at least one casing string of the plurality of casing strings may be affixed to at least another adjacent casing string of the plurality of casing strings through at least one weld, at least one adhesive joint, or both. A method and system for nondestructively inspecting a subterranean barrier is disclosed. For instance, a radiographic signal may be emitted from within a casing string toward an adjacent casing string and the radiographic signal may be detected from within the adjacent casing string. A method of repairing a barrier including removing at least a portion of a casing string and welding a repair element within the casing string is disclosed. A method of selectively heating at least one casing string forming at least a portion of a subterranean barrier is disclosed.

  4. Photoactive devices including porphyrinoids with coordinating additives

    DOE Patents [OSTI]

    Forrest, Stephen R; Zimmerman, Jeramy; Yu, Eric K; Thompson, Mark E; Trinh, Cong; Whited, Matthew; Diev, Vlacheslav

    2015-05-12

    Coordinating additives are included in porphyrinoid-based materials to promote intermolecular organization and improve one or more photoelectric characteristics of the materials. The coordinating additives are selected from fullerene compounds and organic compounds having free electron pairs. Combinations of different coordinating additives can be used to tailor the characteristic properties of such porphyrinoid-based materials, including porphyrin oligomers. Bidentate ligands are one type of coordinating additive that can form coordination bonds with a central metal ion of two different porphyrinoid compounds to promote porphyrinoid alignment and/or pi-stacking. The coordinating additives can shift the absorption spectrum of a photoactive material toward higher wavelengths, increase the external quantum efficiency of the material, or both.

  5. Power generation method including membrane separation

    DOE Patents [OSTI]

    Lokhandwala, Kaaeid A. (Union City, CA)

    2000-01-01

    A method for generating electric power, such as at, or close to, natural gas fields. The method includes conditioning natural gas containing C.sub.3+ hydrocarbons and/or acid gas by means of a membrane separation step. This step creates a leaner, sweeter, drier gas, which is then used as combustion fuel to run a turbine, which is in turn used for power generation.

  6. Rotor assembly including superconducting magnetic coil

    DOE Patents [OSTI]

    Snitchler, Gregory L. (Shrewsbury, MA); Gamble, Bruce B. (Wellesley, MA); Voccio, John P. (Somerville, MA)

    2003-01-01

    Superconducting coils and methods of manufacture include a superconductor tape wound concentrically about and disposed along an axis of the coil to define an opening having a dimension which gradually decreases, in the direction along the axis, from a first end to a second end of the coil. Each turn of the superconductor tape has a broad surface maintained substantially parallel to the axis of the coil.

  7. Nuclear reactor shield including magnesium oxide

    DOE Patents [OSTI]

    Rouse, Carl A. (Del Mar, CA); Simnad, Massoud T. (La Jolla, CA)

    1981-01-01

    An improvement in nuclear reactor shielding of a type used in reactor applications involving significant amounts of fast neutron flux, the reactor shielding including means providing structural support, neutron moderator material, neutron absorber material and other components as described below, wherein at least a portion of the neutron moderator material is magnesium in the form of magnesium oxide either alone or in combination with other moderator materials such as graphite and iron.

  8. Electric power monthly, September 1990. [Glossary included

    SciTech Connect (OSTI)

    Not Available

    1990-12-17

    The purpose of this report is to provide energy decision makers with accurate and timely information that may be used in forming various perspectives on electric issues. The power plants considered include coal, petroleum, natural gas, hydroelectric, and nuclear power plants. Data are presented for power generation, fuel consumption, fuel receipts and cost, sales of electricity, and unusual occurrences at power plants. Data are compared at the national, Census division, and state levels. 4 figs., 52 tabs. (CK)

  9. Impact of Renewable Fuels Standard/MTBE Provisions of S. 517 Requested by Sens. Daschle & Murkowski

    Reports and Publications (EIA)

    2002-01-01

    Additional analysis of the impact of the Renewable Fuels Standard (RFS) and methyl tertiary butyl ether (MTBE) ban provisions of S. 517.

  10. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  11. Another key Y-12 General Foreman remembered

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TAPropaneandAn319Another key Y-12 General Foreman

  12. Keyes, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLCKeyes,

  13. NERSC.COE.key.actions-4.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on77 PAGEMissionStressMoveMuncriefB ONERSCNERSC8 CoE Key Actions

  14. Composite keys? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlusComposite keys? Home >

  15. Fermilab | Science | Particle Physics | Key Discoveries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find whatGasEnergyfeature photo featureParticleDark matterKey

  16. Key Agency Targets Summary _FY 2012_.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5 B

  17. Key Actions for Optimizing for KNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin Morris Title:AnaKey

  18. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power, IncBio Centers Announcement at theproduceƈ GOAL:Key

  19. Fair Encryption of RSA Keys Guillaume Poupard and Jacques Stern

    E-Print Network [OSTI]

    Stern, Jacques

    based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs

  20. Session-Key Generation using Human Passwords Only Oded Goldreich

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session-Key Generation using Human Passwords Only Oded Goldreich Department of Computer Science present session-key generation protocols in a model where the legitimate parties share only a human assumptions. Keywords: Session-key generation (authenticated key-exchange), mutual authentication proto- cols

  1. SessionKey Generation using Human Passwords Only # Oded Goldreich +

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session­Key Generation using Human Passwords Only # Oded Goldreich + Department of Computer Science present session­key generation protocols in a model where the legitimate parties share only a human setup assumptions. Keywords: Session­key generation (authenticated key­exchange), mutual authentication

  2. The impacts of urbanization on endangered florida key deer 

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12

    of peninsular Florida. Key deer range is restricted to the Lower Florida Keys with approximately 60% residing on Big Pine Key and 15% residing on No Name Key which have undergone rapid human population growth and development over the past 30 years. Urban...

  3. Community Assessment Tool for Public Health Emergencies Including Pandemic Influenza

    SciTech Connect (OSTI)

    ORAU's Oak Ridge Institute for Science Education (HCTT-CHE)

    2011-04-14

    The Community Assessment Tool (CAT) for Public Health Emergencies Including Pandemic Influenza (hereafter referred to as the CAT) was developed as a result of feedback received from several communities. These communities participated in workshops focused on influenza pandemic planning and response. The 2008 through 2011 workshops were sponsored by the Centers for Disease Control and Prevention (CDC). Feedback during those workshops indicated the need for a tool that a community can use to assess its readiness for a disaster - readiness from a total healthcare perspective, not just hospitals, but the whole healthcare system. The CAT intends to do just that - help strengthen existing preparedness plans by allowing the healthcare system and other agencies to work together during an influenza pandemic. It helps reveal each core agency partners (sectors) capabilities and resources, and highlights cases of the same vendors being used for resource supplies (e.g., personal protective equipment [PPE] and oxygen) by the partners (e.g., public health departments, clinics, or hospitals). The CAT also addresses gaps in the community's capabilities or potential shortages in resources. This tool has been reviewed by a variety of key subject matter experts from federal, state, and local agencies and organizations. It also has been piloted with various communities that consist of different population sizes, to include large urban to small rural communities.

  4. Optical panel system including stackable waveguides

    DOE Patents [OSTI]

    DeSanto, Leonard (Dunkirk, MD); Veligdan, James T. (Manorville, NY)

    2007-11-20

    An optical panel system including stackable waveguides is provided. The optical panel system displays a projected light image and comprises a plurality of planar optical waveguides in a stacked state. The optical panel system further comprises a support system that aligns and supports the waveguides in the stacked state. In one embodiment, the support system comprises at least one rod, wherein each waveguide contains at least one hole, and wherein each rod is positioned through a corresponding hole in each waveguide. In another embodiment, the support system comprises at least two opposing edge structures having the waveguides positioned therebetween, wherein each opposing edge structure contains a mating surface, wherein opposite edges of each waveguide contain mating surfaces which are complementary to the mating surfaces of the opposing edge structures, and wherein each mating surface of the opposing edge structures engages a corresponding complementary mating surface of the opposite edges of each waveguide.

  5. Thermovoltaic semiconductor device including a plasma filter

    DOE Patents [OSTI]

    Baldasaro, Paul F. (Clifton Park, NY)

    1999-01-01

    A thermovoltaic energy conversion device and related method for converting thermal energy into an electrical potential. An interference filter is provided on a semiconductor thermovoltaic cell to pre-filter black body radiation. The semiconductor thermovoltaic cell includes a P/N junction supported on a substrate which converts incident thermal energy below the semiconductor junction band gap into electrical potential. The semiconductor substrate is doped to provide a plasma filter which reflects back energy having a wavelength which is above the band gap and which is ineffectively filtered by the interference filter, through the P/N junction to the source of radiation thereby avoiding parasitic absorption of the unusable portion of the thermal radiation energy.

  6. Simple Model of Membrane Proteins Including Solvent

    E-Print Network [OSTI]

    D. L. Pagan; A. Shiryayev; T. P. Connor; J. D. Gunton

    2006-03-04

    We report a numerical simulation for the phase diagram of a simple two dimensional model, similar to one proposed by Noro and Frenkel [J. Chem. Phys. \\textbf{114}, 2477 (2001)] for membrane proteins, but one that includes the role of the solvent. We first use Gibbs ensemble Monte Caro simulations to determine the phase behavior of particles interacting via a square-well potential in two dimensions for various values of the interaction range. A phenomenological model for the solute-solvent interactions is then studied to understand how the fluid-fluid coexistence curve is modified by solute-solvent interactions. It is shown that such a model can yield systems with liquid-liquid phase separation curves that have both upper and lower critical points, as well as closed loop phase diagrams, as is the case with the corresponding three dimensional model.

  7. Key Differences between Web1.0 and Web2.0 Graham Cormode and Balachander Krishnamurthy

    E-Print Network [OSTI]

    Cormode, Graham

    Key Differences between Web1.0 and Web2.0 Graham Cormode and Balachander Krishnamurthy AT&T Labs­Research 180 Park Avenue, Florham Park, NJ {graham,bala}@research.att.com February 13, 2008 Abstract Web 2.0 Wide Web. Although largely a marketing term, some of the key attributes associated with Web 2.0 include

  8. Directional learning and the provisioning of public goods

    E-Print Network [OSTI]

    Nax, Heinrich H

    2015-01-01

    We consider an environment where players are involved in a public goods game and must decide repeatedly whether to make an individual contribution or not. However, players lack strategically relevant information about the game and about the other players in the population. The resulting behavior of players is completely uncoupled from such information, and the individual strategy adjustment dynamics are driven only by reinforcement feedbacks from each player's own past. We show that the resulting "directional learning" is sufficient to explain cooperative deviations away from the Nash equilibrium. We introduce the concept of k-strong equilibria, which nest both the Nash equilibrium and the Aumann-strong equilibrium as two special cases, and we show that, together with the parameters of the learning model, the maximal k-strength of equilibrium determines the stationary distribution. The provisioning of public goods can be secured even under adverse conditions, as long as players are sufficiently responsive to ...

  9. Impact of ASCE-95 wind provisions on reinforced concrete chimneys

    SciTech Connect (OSTI)

    Joshi, J.R. [Westinghouse Savannah River Co., Aiken, SC (United States); Porthouse, R.A. [Chimney Consultants, Inc., West Lebanon, NH (United States)

    1999-11-01

    This paper presents a summary of the study on the impact of the ASCE 7-95 provisions primarily on the along wind load calculations for reinforced concrete chimneys. The results of this study provided, in part, a basis for the adoption of the revised load and strength factors for wind load design in ACI 307-98. The study was undertaken to: compare unfactored along wind chimney loads resulting from fastest miles per hour (FMPH) and three second gust (TSG) procedures; quantify design changes resulting from FMPH to TSG in terms of the reinforcing steel; review the historical basis for the current load factors (LF) and strength factors (SF); and to recommend a set of LF and SF for the design of chimneys without significantly changing the present design confidence level.

  10. Guidelines for Provision and Interchange of Geothermal Data Assets

    SciTech Connect (OSTI)

    none,

    2014-07-03

    The US Department of Energy Office of Geothermal Technologies (OGT) is funding and overseeing the development of the National Geothermal Data System (NGDS), a distributed information system providing access to integrated data in support of, and generated in, all phases of geothermal development. NGDS is being built in an open paradigm and will employ state-of-the-art informatics approaches and capabilities to advance the state of geothermal knowledge in the US. This document presents guidelines related to provision and interchange of data assets in the context of the National Geothermal Data System. It identifies general specifications for NGDS catalog metadata and data content, and provides specific instructions for preparation and submission of data assets by OGT-funded projects.

  11. Engine lubrication circuit including two pumps

    DOE Patents [OSTI]

    Lane, William H.

    2006-10-03

    A lubrication pump coupled to the engine is sized such that the it can supply the engine with a predetermined flow volume as soon as the engine reaches a peak torque engine speed. In engines that operate predominately at speeds above the peak torque engine speed, the lubrication pump is often producing lubrication fluid in excess of the predetermined flow volume that is bypassed back to a lubrication fluid source. This arguably results in wasted power. In order to more efficiently lubricate an engine, a lubrication circuit includes a lubrication pump and a variable delivery pump. The lubrication pump is operably coupled to the engine, and the variable delivery pump is in communication with a pump output controller that is operable to vary a lubrication fluid output from the variable delivery pump as a function of at least one of engine speed and lubrication flow volume or system pressure. Thus, the lubrication pump can be sized to produce the predetermined flow volume at a speed range at which the engine predominately operates while the variable delivery pump can supplement lubrication fluid delivery from the lubrication pump at engine speeds below the predominant engine speed range.

  12. Fire Safety Code of Vienna University of Technology 1 General provisions

    E-Print Network [OSTI]

    Nawratil, Georg

    Fire Safety Code of Vienna University of Technology § 1 General provisions § 2 Scope of application of members of Vienna University of Technology § 6 Obligations to cooperate in preventive fire safety § 7 Conduct in case of fire § 8 Gathering point § 9 Measures after a fire § 1 General provisions (1) Purpose

  13. Leveraging Stored Energy for Handling Power Emergencies in Aggressively Provisioned Datacenters

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    center, Peak power, Stored en- ergy, Provisioning, Cap-ex, Peak shaving 1. Introduction Datacenters incur capital expenditure (cap-ex) of $10-25 per watt of provisioned power capacity, regardless of whether to several million dollars in cap-ex [5], contributing over a third of the amortized monthly datacenter costs

  14. Leveraging Stored Energy for Handling Power Emergencies in Aggressively Provisioned Datacenters

    E-Print Network [OSTI]

    Giles, C. Lee

    center, Peak power, Stored en- ergy, Provisioning, Cap-ex, Peak shaving 1. Introduction Datacenters incur capital expenditure (cap-ex) of $10-25 per watt of provisioned power capacity, regardless of whether]. to several million dollars in cap-ex [5], contributing over a third of the amortized monthly datacenter costs

  15. Class provisioning using proportional delay differentiation Constantinos Dovrolis a and Parameswaran Ramanathan b

    E-Print Network [OSTI]

    Dovrolis, Constantinos

    Class provisioning using proportional delay differentiation Constantinos Dovrolis in a differentiated services network that offers N classes of service. At the provisioning phase, the network manager class of service for each traffic type, and the appropriate resource allocation between classes. We

  16. Conference Management Special Provision UT-B Contracts Div Page 1 of 1

    E-Print Network [OSTI]

    Conference Management Special Provision UT-B Contracts Div Sep 2012 Page 1 of 1 conference-mgmt-special-prov-ext-sep12.docx CONFERENCE MANAGEMENT SPECIAL PROVISION (Sept 2012) (a) If performance of work involves coordinating, planning, or sponsoring a conference, the Seller must comply with the requirements of this clause

  17. Cost-aware Cooperative Resource Provisioning for Heterogeneous Workloads in Data Centers

    E-Print Network [OSTI]

    Shi, Weisong

    1 Cost-aware Cooperative Resource Provisioning for Heterogeneous Workloads in Data Centers Jianfeng-scale data centers or cloud systems. In this paper, we argue for a new twist on the classical resource provisioning problem: heterogeneous workloads are a fact of life in large-scale data centers, and current

  18. Information Technology Special Provision UT-B Contracts Div Page 1 of 1

    E-Print Network [OSTI]

    Information Technology Special Provision UT-B Contracts Div March 2011 Page 1 of 1 info-tech-special-prov-ext-mar11.docx INFORMATION TECHNOLOGY SPECIAL PROVISION (March 2011) (a) The Company has determined that this Agreement requires Seller to use, access, manage, or exchange information that the Company has determined

  19. Business & Finance BA / MA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Operations Manager, Production Manager, Quality Control, Logistics Manager, Business Interpreter, Marketing, Operations Management, Commercial Law and Human Resource Management. Finance subjects include Finance Theory or public administration. Operating in international markets requires an understanding of international

  20. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  1. Ionic liquids, electrolyte solutions including the ionic liquids, and energy storage devices including the ionic liquids

    DOE Patents [OSTI]

    Gering, Kevin L.; Harrup, Mason K.; Rollins, Harry W.

    2015-12-08

    An ionic liquid including a phosphazene compound that has a plurality of phosphorus-nitrogen units and at least one pendant group bonded to each phosphorus atom of the plurality of phosphorus-nitrogen units. One pendant group of the at least one pendant group comprises a positively charged pendant group. Additional embodiments of ionic liquids are disclosed, as are electrolyte solutions and energy storage devices including the embodiments of the ionic liquid.

  2. Electricity and Development: Global Trends and Key Challenges

    E-Print Network [OSTI]

    ;3. Prospects for Electricity Development Electricity Access Projected Electrification Rates by Region globalElectricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12

  3. Energy Storage: The Key to a Reliable, Clean Electricity Supply...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy...

  4. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  5. SOW and Key Performance Parameters (KPP) Handbook Final Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 This handbook provides suggested...

  6. Could Solar Energy Storage be Key for Residential Solar? | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? October 26, 2010 - 4:52pm Addthis This is the silent power storage...

  7. Public Engagement and Forestry: Key Lessons for Working in

    E-Print Network [OSTI]

    , concerning woodlands which are small in size. This contrasts with forestry in rural areas where woodlands and complex communities in urban woodland catchments. 3 | Urban Lessons | Tabbush, P and Ambrose-Oji, B | 21 of a growing focus on the provision of urban and peri-urban green space, and the growth of communities

  8. Proposal for the award of a contract for the provision of civil engineering design services on the CERN site

    E-Print Network [OSTI]

    2013-01-01

    Proposal for the award of a contract for the provision of civil engineering design services on the CERN site

  9. Proposal for the award of a contract for the provision of civil engineering services on the CERN site

    E-Print Network [OSTI]

    2011-01-01

    Proposal for the award of a contract for the provision of civil engineering services on the CERN site

  10. Proposal for the award of three contracts for the provision of civil engineering and architectural consultancy services

    E-Print Network [OSTI]

    2013-01-01

    Proposal for the award of three contracts for the provision of civil engineering and architectural consultancy services

  11. Master Thesis Group Key Agreement for Ad Hoc Networks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Master Thesis Group Key Agreement for Ad Hoc Networks Lijun Liao Date: 06 July 2005 Supervisor: M their financial support. #12;Abstract Over the last 30 years the study of group key agreement has stimulated much present a Tree-based group key agreement Framework for Ad-hoc Networks (TFAN). TFAN is especially suitable

  12. Distributed Key Generation in the Wild Aniket Kate1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distributed Key Generation in the Wild Aniket Kate1 Yizhou Huang2 Ian Goldberg2 1 Max Planck of Waterloo, Canada aniket@mpi-sws.org, {y226huan, iang}@uwaterloo.ca Abstract Distributed key generation (DKG communication model. computational setting. distributed key generation. uniform randomness. implementation 1

  13. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  14. Leakage-Resilient Cryptography with Key Derived from Sensitive Data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Leakage-Resilient Cryptography with Key Derived from Sensitive Data Konrad Durnoga , Tomasz Kazana subject to adversarial leakage. We propose a method to derive keys for such protocols on-the-fly from the actual keys are derived from. That is, an adversary can hardly gain any knowledge about the private data

  15. NIST Interagency Report 7609 Cryptographic Key

    E-Print Network [OSTI]

    and public welfare by providing technical leadership for the nation's measurement and standards include the development of technical, physical, administrative, and management standards and guidelines of Standards and Technology Gaithersburg, MD 20899-8930 January 2010 U.S. Department of Commerce Gary Locke

  16. 3D heterogeneous systems are a key to the next generation of electronics

    E-Print Network [OSTI]

    Rogers, John A.

    3D heterogeneous systems are a key to the next generation of electronics Researchers of substrate, including lightweight, flexible plastic sheets. Circuits built in this way offer electrical-based approaches to electronics. The invention of the transistor was considered by many to be one of the greatest

  17. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    's power plan to include a forecast of electricity demand for the next 20 years. Demand, to a large extent, is....................................................................................................................................... 16 Forecast of Retail Electricity Prices................................................................................................................... 17 SUMMARY OF KEY FINDINGS Pacific Northwest population and energy costs are expected to increase

  18. 2007 Wholesale Power Rate Schedules : 2007 General Rate Schedule Provisions.

    SciTech Connect (OSTI)

    United States. Bonneville Power Administration.

    2006-11-01

    This schedule is available for the contract purchase of Firm Power to be used within the Pacific Northwest (PNW). Priority Firm (PF) Power may be purchased by public bodies, cooperatives, and Federal agencies for resale to ultimate consumers, for direct consumption, and for Construction, Test and Start-Up, and Station Service. Rates in this schedule are in effect beginning October 1, 2006, and apply to purchases under requirements Firm Power sales contracts for a three-year period. The Slice Product is only available for public bodies and cooperatives who have signed Slice contracts for the FY 2002-2011 period. Utilities participating in the Residential Exchange Program (REP) under Section 5(c) of the Northwest Power Act may purchase Priority Firm Power pursuant to the Residential Exchange Program. Rates under contracts that contain charges that escalate based on BPA's Priority Firm Power rates shall be based on the three-year rates listed in this rate schedule in addition to applicable transmission charges. This rate schedule supersedes the PF-02 rate schedule, which went into effect October 1, 2001. Sales under the PF-07 rate schedule are subject to BPA's 2007 General Rate Schedule Provisions (2007 GRSPs). Products available under this rate schedule are defined in the 2007 GRSPs. For sales under this rate schedule, bills shall be rendered and payments due pursuant to BPA's 2007 GRSPs and billing process.

  19. Population modeling in conservation planning of the Lower Keys marsh rabbit 

    E-Print Network [OSTI]

    LaFever, David Howard

    2006-10-30

    . Other potential threats to LKMRs include mortality caused by feral cats (Felis catus) and raccoons (Procyon lotor), and roads (Howe, 1988; Forys and Humphrey, 1996; USFWS, 1999). Due to alteration of habitat, salt marshes of the Lower Keys exist... loss and fragmentation caused by development as the primary reasons for the subspecies? decline. Other potential threats to LKMRs include mortality caused by feral cats (Felis catus), and raccoons (Procyon lotor) (Howe, 1988; Forys and Humphrey, 1996...

  20. Passive decoy state quantum key distribution with practical light sources

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Bing Qi; Tobias Moroder

    2009-11-14

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. While active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty {\\it et al.}, Opt. Lett. {\\bf 34}, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy state setup with an infinite number of decoy settings. In this paper we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photo-detectors. In particular, we consider sources emitting thermal states, phase randomized WCP, and strong coherent light in combination with several types of photo-detectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photo-detectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret ket rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  1. Towards Scalable Cost-Effective Service and Survivability Provisioning in Ultra High Speed Networks

    SciTech Connect (OSTI)

    Bin Wang

    2006-12-01

    Optical transport networks based on wavelength division multiplexing (WDM) are considered to be the most appropriate choice for future Internet backbone. On the other hand, future DOE networks are expected to have the ability to dynamically provision on-demand survivable services to suit the needs of various high performance scientific applications and remote collaboration. Since a failure in aWDMnetwork such as a cable cut may result in a tremendous amount of data loss, efficient protection of data transport in WDM networks is therefore essential. As the backbone network is moving towards GMPLS/WDM optical networks, the unique requirement to support DOE’s science mission results in challenging issues that are not directly addressed by existing networking techniques and methodologies. The objectives of this project were to develop cost effective protection and restoration mechanisms based on dedicated path, shared path, preconfigured cycle (p-cycle), and so on, to deal with single failure, dual failure, and shared risk link group (SRLG) failure, under different traffic and resource requirement models; to devise efficient service provisioning algorithms that deal with application specific network resource requirements for both unicast and multicast; to study various aspects of traffic grooming in WDM ring and mesh networks to derive cost effective solutions while meeting application resource and QoS requirements; to design various diverse routing and multi-constrained routing algorithms, considering different traffic models and failure models, for protection and restoration, as well as for service provisioning; to propose and study new optical burst switched architectures and mechanisms for effectively supporting dynamic services; and to integrate research with graduate and undergraduate education. All objectives have been successfully met. This report summarizes the major accomplishments of this project. The impact of the project manifests in many aspects: First, the project addressed many essential problems that arisen in current and future WDM optical networks, and provided a host of innovative solutions though there was no invention or patent filing. This project resulted in more than 2 dozens publications in major journals and conferences (including papers in IEEE Transactions and journals, as well as a book chapter). Our publications have been cited by many peer researchers. In particular, one of our conference papers was nominated for the best paper award of IEEE/Create-Net Broadnets (International Conference on Broadband Communications, Networks, and Systems) 2006. Second, the results and solutions of this project were well received by DOE Labs where presentations were given by the PI. We hope to continue the collaboration with DOE Labs in the future. Third, the project was the first to propose and extensively study multicast traffic grooming, new traffic models such as sliding scheduled traffic model and scheduled traffic model. Our research has sparkled a flurry of recent studies and publications by the research community in these areas. Fourth, the project has benefited a diverse population of students by motivating, engaging, enhancing their learning and skills. The project has been conducted in a manner conducive to the training of students both at graduate and undergraduate levels. As a result, one Ph.D., Dr. Abdur Billah, was graduated. Another Ph.D. student, Tianjian Li, will graduate in January 2007. In addition, four MS students were graduated. One undergraduate student, Jeffrey Alan Shininger, completed his university honors project. Fifth, thanks to the support of this ECPI project, the PI has obtained additional funding from the National Science Foundation, the Air Force Research Lab, and other sources. A few other proposals are pending. Finally, this project has also significantly impacted the curricula and resulted in the enhancement of courses at the graduate and undergraduate levels, therefore strengthening the bond between research and education.

  2. Passive decoy state quantum key distribution: Closing the gap to perfect sources

    E-Print Network [OSTI]

    Wolfgang Mauerer; Christine Silberhorn

    2006-10-17

    We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present-day, non-ideal photon-number detection. Arbitrary experimental imperfections which lead to bit errors are included. We select decoy states by classical post-processing. This allows to improve the effective signal statistics and achievable distance.

  3. Implications of the full flexibility provision of the 1996 Farm Bill on regional planting 

    E-Print Network [OSTI]

    Mabray, Katherine

    2000-01-01

    Bill introduced the concept of flexibility. Framers were allowed to change their planting choice by utilizing the new Farm Bill provisions. However, previous to the 1996 Farm Bill, farmers had limited options for switching cropping patterns except...

  4. Volunteering for market-based environmental regulation : the substitution provision of the SO? emissions trading program

    E-Print Network [OSTI]

    Montero, Juan Pablo

    In this paper we explore the practical and welfare implications of a system of voluntary compliance within a market-based environmental regulation. The Substitution Provision of the SO2 emissions trading program allows the ...

  5. National Cost-Effectiveness Analysis of the Residential Provisions of the 2015 IECC

    SciTech Connect (OSTI)

    Mendon, Vrushali V.; Selvacanabady, Abinesh; Zhao, Mingjie; Taylor, Zachary T.

    2015-06-10

    This PNNL technical report summarizes the results of the national cost-effectiveness analysis of the residential provisions of the 2015 IECC compared to those of the 2012 and 2009 IECC.

  6. Adaptive Resource Allocation for Statistical QoS Provisioning in Mobile Wireless Communications and Networks 

    E-Print Network [OSTI]

    Du, Qinghe

    2012-02-14

    . In this dissertation, we study the adaptive wireless resource allocation problems for statistical QoS provisioning, such as guaranteeing the specified delay-bound violation probability, upper-bounding the average loss-rate, optimizing the average goodput...

  7. A Model of Accessibility Services Provision for Students with Disabilities in Higher Education

    E-Print Network [OSTI]

    Kouroupetroglou, Georgios

    23 A Model of Accessibility Services Provision for Students with Disabilities in Higher Education, Accessibility Service, Universal Learning Design, Tertiary Education, Assistive Technologies, Accessibility, Educational Facilities Abstract The number of universities offering services for students with disabilities

  8. Service Provision in Disconnected Mobile Ad hoc Networks Nicolas Le Sommer

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Service Provision in Disconnected Mobile Ad hoc Networks Nicolas Le Sommer Valoria Laboratory, University of South Brittany Nicolas.Le-Sommer@univ-ubs.fr Abstract With the proliferation of mobiles devices

  9. Analysis of Five Selected Tax Provisions of the Conference Energy Bill of 2003

    Reports and Publications (EIA)

    2004-01-01

    This special report was undertaken at the January 29, 2004, request of Senator John Sununu to perform an assessment of five specific tax provisions of the Conference Energy Bill of 2003.

  10. Montana MCA 75-20-104, Policy and General Provisions Definitions...

    Open Energy Info (EERE)

    Montana MCA 75-20-104, Policy and General Provisions Definitions for Major Facility Siting Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document-...

  11. Description of supplementary subjects in Cognitive Semiotics Framework provisions of the academic regulations

    E-Print Network [OSTI]

    Bataillon, Thomas

    Description of supplementary subjects in Cognitive Semiotics Framework provisions of the academic regulations The academic regulations for the supplementary subject in Cognitive Semoitics (2007) were prepared September 2007 The academic regulations take effect on 1 September 2007. The supplementary subject

  12. Summary Impacts of Modeled Provisions of the 2003 Conference Energy Bill

    Reports and Publications (EIA)

    2004-01-01

    This service report was undertaken at the February 2, 2004, request of Senator John Sununu to perform an assessment of the Conference Energy Bill of 2003. This report summarizes the CEB provisions that can be analyzed using the National Energy Modeling System (NEMS) and have the potential to affect energy consumption, supply, and prices. The impacts are estimated by comparing the projections with the CEB provisions to the AEO2004 Reference Case.

  13. Updated distribution and reintroduction of the Lower Keys marsh rabbit 

    E-Print Network [OSTI]

    Faulhaber, Craig Alan

    2005-02-17

    , for their advice and interest in the project. Kim Rohrs of the Monroe County Department of Planning and Environmental Resources provided valuable spatial and tabular data on land ownership and land-use planning in the Keys. My interns, Josh Harris, Kyle........................ 29 3.1 The number of individual Lower Keys marsh rabbits captured in 13 occupied populations on 4 keys from October 2001?August 2002. Data are arranged according to sex and age class...

  14. Measuring Cost Variability in Provision of Transit Service

    E-Print Network [OSTI]

    Taylor, Brian D.; Garrett, Mark; Iseki, Hiroyuki

    2010-01-01

    include both operating costs and capital costs, though mostof semi?xed operating and capital-cost allocation generallyresearch, both operating and capital costs are combined, and

  15. Methods and apparatuses for self-generating fault-tolerant keys in spread-spectrum systems

    DOE Patents [OSTI]

    Moradi, Hussein; Farhang, Behrouz; Subramanian, Vijayarangam

    2015-12-15

    Self-generating fault-tolerant keys for use in spread-spectrum systems are disclosed. At a communication device, beacon signals are received from another communication device and impulse responses are determined from the beacon signals. The impulse responses are circularly shifted to place a largest sample at a predefined position. The impulse responses are converted to a set of frequency responses in a frequency domain. The frequency responses are shuffled with a predetermined shuffle scheme to develop a set of shuffled frequency responses. A set of phase differences is determined as a difference between an angle of the frequency response and an angle of the shuffled frequency response at each element of the corresponding sets. Each phase difference is quantized to develop a set of secret-key quantized phases and a set of spreading codes is developed wherein each spreading code includes a corresponding phase of the set of secret-key quantized phases.

  16. Methods and apparatuses for self-generating fault-tolerant keys in spread-spectrum systems

    DOE Patents [OSTI]

    Moradi, Hussein; Farhang, Behrouz; Subramanian, Vijayarangam

    2015-12-22

    Self-generating fault-tolerant keys for use in spread-spectrum systems are disclosed. At a communication device, beacon signals are received from another communication device and impulse responses are determined from the beacon signals. The impulse responses are circularly shifted to place a largest sample at a predefined position. The impulse responses are converted to a set of frequency responses in a frequency domain. The frequency responses are shuffled with a predetermined shuffle scheme to develop a set of shuffled frequency responses. A set of phase differences is determined as a difference between an angle of the frequency response and an angle of the shuffled frequency response at each element of the corresponding sets. Each phase difference is quantized to develop a set of secret-key quantized phases and a set of spreading codes is developed wherein each spreading code includes a corresponding phase of the set of secret-key quantized phases.

  17. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  18. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  19. Deputy Secretary Sherwood-Randall Meets Key Government Officials...

    Broader source: Energy.gov (indexed) [DOE]

    Pritzker and Deputy Secretary Sherwood-Randall had the opportunity to engage with key Chinese government officials while in Beijing. Both met with Premier Li Keqiang and Vice...

  20. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Climate Action Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment...

  1. California Energy Incentive Programs An Annual Update on Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Issues and Financial Opportunities for Federal Sites in California California Energy Incentive Programs An Annual Update on Key Energy Issues and Financial Opportunities...

  2. Intercropped silviculture systems, a key to achieving soil fungal...

    Office of Scientific and Technical Information (OSTI)

    Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations Citation Details In-Document Search Title: Intercropped...

  3. Strategic Energy Management.  Keys to Behavioral and Operational Change.

    E-Print Network [OSTI]

    Kroll, Ryan M; Willems, Phil; Rubado, Dan; Belkhayat, Kathleen

    2015-01-01

    Strategic Energy Management Keys to Behavioral andof Oregon’s Strategic Energy Management (SEM) initiative.Introduction Strategic energy management (SEM) is defined

  4. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  5. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  6. Safety provisions for UF{sub 6} handling in the design of a new UF{sub 6} conversion plant

    SciTech Connect (OSTI)

    Bannister, S.P. [British Nuclear Fuels plc, Preston (United Kingdom)

    1991-12-31

    British Nuclear Fuels plc (BNFL) Fuel Division is currently undertaking the final design and construction of a new UF{sub 6} conversion plant at its production site at Springfields near Preston in the north of England. The Company has gained much experience in the handling of UF{sub 6} during operation of plants on site since 1961. The major hazard occurs during the liquefication cycle and the basis of the maximum credible incident scenario adopted for safety assessment and design purposes is discussed. This paper considers the design features which have been incorporated in the new plant to counter the hazards presented by the presence of UF{sub 6} in gaseous and liquid form and explains current thinking on operational procedures in areas of potential risk such as cylinder filling. The plant emergency response philosophy and systems are described and specific design provisions which have been included to satisfy the UK regulatory bodies are outlined in some detail.

  7. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-06-09

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  8. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-08-31

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  9. AES Flow Interception : Key Snooping Method on Virtual Machine.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES for snooping AES en- cryption key on Virtual Machine Monitor (VMM), and we present coun- termeasures against. In general, the virtualization technology composes two software parts: one is vir- tual machine (VM

  10. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  11. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  12. A Distributed Public Key Caching Scheme in Large Wireless Networks

    E-Print Network [OSTI]

    Deng, Jing

    -constrained, in terms of computational power, battery energy, and on-board memory space. For example, the prototypeA Distributed Public Key Caching Scheme in Large Wireless Networks Yuan Kong Jing Deng Stephen R in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate

  13. Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme P. Scholl and N.P. Smart scheme was the slow key generation process. Gentry and Halevi provided a fast technique for 2-power cyclo. In particular they focused on the field generated by the polynomial F(X) = X2n + 1, but they noted

  14. Zero-one laws for connectivity in random key graphs

    E-Print Network [OSTI]

    Yagan, Osman

    with the random key predistribution scheme of Eschenauer and Gligor for wireless sensor networks. For this class which are more realistic for applications to wireless sensor networks. Keywords: Wireless sensor- dom key predistribution for wireless sensor networks (WSNs) [6], [7], [9]. For the sake

  15. Baton: Key Agility for Android without a Centralized Certificate Infrastructure

    E-Print Network [OSTI]

    Van Oorschot, Paul

    Baton: Key Agility for Android without a Centralized Certificate Infrastructure David Barrera,dmccarney}@ccsl.carleton.ca {clark,paulv}@scs.carleton.ca ABSTRACT Android's trust-on-first-use application signing model asso transfer signing au- thority to a new signing key. Our proposal, Baton, modifies Android's app installation

  16. Comparative Analysis of Software Libraries for Public Key Cryptography

    E-Print Network [OSTI]

    Gaj, Krzysztof

    Comparative Analysis of Software Libraries for Public Key Cryptography Ashraf Abusharekh1 and Kris libraries implementing such operations exist both commercially and in the public domain, in this paper, we, using performance and support of public key primitive operations. The performance of all libraries

  17. k-Connectivity in Random Key Graphs with Unreliable Links

    E-Print Network [OSTI]

    Yagan, Osman

    of Eschenauer and Gligor for securing wireless sensor network (WSN) communications. Random key graphs have real-world networks; e.g., with secure WSN application in mind, link unreliability can be attributed for securing WSN communications is the random predistribution of cryptographic keys to sensor nodes

  18. Wireless sensor networks under the random pairwise key predistribution scheme

    E-Print Network [OSTI]

    Yagan, Osman

    Wireless sensor networks under the random pairwise key predistribution scheme: Can resiliency, College Park, MD 20742. Email: armand@isr.umd.edu Abstract--We investigate the resiliency of wireless the classical key predistribution scheme of Eschenauer and Gligor. Keywords: Wireless sensor networks, Security

  19. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  20. Nuclear Arms Control R&D Consortium includes Los Alamos

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Arms Control R&D Consortium includes Los Alamos Nuclear Arms Control R&D Consortium includes Los Alamos A consortium led by the University of Michigan that includes LANL as...

  1. A New Approach in Advance Network Reservation and Provisioning for High-Performance Scientific Data Transfers

    SciTech Connect (OSTI)

    Balman, Mehmet; Chaniotakis, Evangelos; Shoshani, Arie; Sim, Alex

    2010-01-28

    Scientific applications already generate many terabytes and even petabytes of data from supercomputer runs and large-scale experiments. The need for transferring data chunks of ever-increasing sizes through the network shows no sign of abating. Hence, we need high-bandwidth high speed networks such as ESnet (Energy Sciences Network). Network reservation systems, i.e. ESnet's OSCARS (On-demand Secure Circuits and Advance Reservation System) establish guaranteed bandwidth of secure virtual circuits at a certain time, for a certain bandwidth and length of time. OSCARS checks network availability and capacity for the specified period of time, and allocates requested bandwidth for that user if it is available. If the requested reservation cannot be granted, no further suggestion is returned back to the user. Further, there is no possibility from the users view-point to make an optimal choice. We report a new algorithm, where the user specifies the total volume that needs to be transferred, a maximum bandwidth that he/she can use, and a desired time period within which the transfer should be done. The algorithm can find alternate allocation possibilities, including earliest time for completion, or shortest transfer duration - leaving the choice to the user. We present a novel approach for path finding in time-dependent networks, and a new polynomial algorithm to find possible reservation options according to given constraints. We have implemented our algorithm for testing and incorporation into a future version of ESnet?s OSCARS. Our approach provides a basis for provisioning end-to-end high performance data transfers over storage and network resources.

  2. A Differential Phase Shift Scheme for Quantum Key Distribution in Passive Optical Networks

    E-Print Network [OSTI]

    Michael Hentschel; Andreas Poppe; Bernhard Schrenk; Momtchil Peev; Edwin Querasser; Roland Lieger

    2014-12-19

    We propose a scheme for quantum key distribution (QKD) in a passive optical network (PON) based on differential phase shift (DPS) coding. A centralized station including all expensive components serves many users, making it suitable for a true multi-user network in a local environment with moderate distances on the order of a few kilometers. The emphasis lies on an asymmetric design for cost effective implementation of network end points.

  3. Newport News in Review, ch. 47, segment includes TEDF groundbreaking...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    https:www.jlab.orgnewsarticlesnewport-news-review-ch-47-segment-includes-tedf-groundbreaking-event Newport News in Review, ch. 47, segment includes TEDF groundbreaking event...

  4. Solar Energy Education. Reader, Part II. Sun story. [Includes...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Part II. Sun story. Includes glossary Citation Details In-Document Search Title: Solar Energy Education. Reader, Part II. Sun story. Includes glossary You are...

  5. Microfluidic devices and methods including porous polymer monoliths...

    Office of Scientific and Technical Information (OSTI)

    devices and methods including porous polymer monoliths Citation Details In-Document Search Title: Microfluidic devices and methods including porous polymer monoliths Microfluidic...

  6. Key Facts about Argonne National Laboratory | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKeyKey

  7. KEY CONTROL Keys to University facilities are duplicated and issued by the

    E-Print Network [OSTI]

    Gering, Jon C.

    with incidents that may occur on or off campus. University Vehicles Vehicles may be scheduled by contacting. A number of vehicles, including vans and cars, are available for OFFICIAL USE ONLY. Requests should be made is open 7:30 a.m. to 1:00 a.m. daily to assist University vehicle operators with emergency road situations

  8. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  9. OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts!

    E-Print Network [OSTI]

    OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts! Eyestalk mouth antenna cheliped CURRICULUM Name: _____________________ Fun Crab Facts! Eyestalk Mouth Antenna Cheliped Carapace Walking metamorphosis motorcycle exoskeleton omnivores butterfly pea #12;OIMB GK12 CURRICULUM Masked crab Fiddler crab

  10. EnergySmart Schools National Financing Roundtable - Key Outcomes

    SciTech Connect (OSTI)

    2009-04-01

    This document presents key outcomes from the EnergySmart Schools National Financing Roundtable as a follow-up to the release of its Guide to FInancing EnergySmart Schools

  11. LANL breaks ground on key sediment control project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and made of rocks...

  12. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all about turbulence....

  13. Refine the Concept of Public Key Encryption with Delegated Search

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    with the public key of Bob, but unfortunately, her computer is infected by some virus which embeds a malware contents. However, in this way, Bob's computer will be under the risk of infection by the malware

  14. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

  15. A Key Review On Exergetic Analysis And Assessment Of Renewable...

    Open Energy Info (EERE)

    A Key Review On Exergetic Analysis And Assessment Of Renewable Energy Resources For A Sustainable Future Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal...

  16. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren students may want to (quietly) opt out of their friends' illicit file trading activities, but academics

  17. Practical Non-Interactive Key Distribution Based on Pairings

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , the Private Key Generator (PKG), who possesses additional privileged information in the form of a master in a non- interactive system is that the synchronous communication between Alice and Bob is replaced

  18. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  19. Reflective cracking of shear keys in multi-beam bridges 

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02

    strength to resist cracking from vehicular loads, but uneven temperature changes and shrinkage strains cause high tensile stresses in the shear key regions and lead to reflective cracking. The analyses showed the highest stresses were often times near...

  20. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  1. Darcy Q. Hou State Key Laboratory of Hydraulic

    E-Print Network [OSTI]

    Tijsseling, A.S.

    Darcy Q. Hou State Key Laboratory of Hydraulic Engineering Simulation and Safety, and School to severe dam- ages. Over 50 incidents have been attributed to this mechanism and an accident was reported

  2. Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the observed set of round subkeys in memory (computed via the cipher's key schedule operation), which were, for transparent en- cryption and decryption of data. One could apply the method from [9] to obtain the computer

  3. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  4. Recovery Act Special Provisions DOE Inter-Contractor UT-B Contracts Div Page 1 of 1

    E-Print Network [OSTI]

    Recovery Act ­ Special Provisions ­ DOE Inter-Contractor UT-B Contracts Div Aug 2010 Page 1 of 1 recovery-special-prov-doe-inter-contractor-ext-aug10.doc RECOVERY ACT SPECIAL PROVISIONS RELATED TO WORK FUNDED UNDER AMERICAN RECOVERY AND REINVESTMENT ACT OF 2009 DOE INTER-CONTRACTOR PURCHASE (Aug 2010) (a

  5. Title IX & Discrimination Complaint Form (including sexual harassment)

    E-Print Network [OSTI]

    Walker, Lawrence R.

    Title IX & Discrimination Complaint Form (including sexual harassment) Office of Diversity. Although the university cannot commit to keeping a complaint of discrimination confidential the process for filing or investigating complaints of discrimination (including sexual harassment). Note

  6. Explosion at Louisa (including Morrison Old) Colliery, Durham 

    E-Print Network [OSTI]

    Yates, R.

    MINISTRY OF FUEL AND POWER - EXPLOSION AT LOUISA (including MORRISON OLD) COLLIERY, DURHAM REPORT On the Causes of, and Circumstances attending, the Explosion which occurred at Louisa (including Morrison Old) Colliery, ...

  7. Advice Provision for Energy Saving in Automobile Climate Control Systems Amos Azaria1

    E-Print Network [OSTI]

    Kraus, Sarit

    . In addition to long term reasons, saving energy while driving electrical cars has an additional shortAdvice Provision for Energy Saving in Automobile Climate Control Systems Amos Azaria1 and Sarit energy becomes even greater when consid- ering an electric car, since heavy use of the climate control

  8. Advice Provision for Energy Saving in Automobile Climate Control Systems Amos Azaria1,

    E-Print Network [OSTI]

    Kraus, Sarit

    Advice Provision for Energy Saving in Automobile Climate Control Systems Amos Azaria1, , Ariel energy becomes even greater when consid- ering an electric car, since heavy use of the climate control,sarit}@cs.biu.ac.il, {claudia.goldman,omer.tsimhoni}@gm.com Abstract Reducing energy consumption

  9. SLA-Based Resource Provisioning for Heterogeneous Workloads in a Virtualized Cloud

    E-Print Network [OSTI]

    Buyya, Rajkumar

    SLA-Based Resource Provisioning for Heterogeneous Workloads in a Virtualized Cloud Datacenter applications with different performance re- quirements. Currently, cloud datacenter providers either do. In this paper, we tackle the resource allocation problem within a datacenter that runs different type

  10. General Provisions, Page 1 The purpose of this Human Resources Manual is to

    E-Print Network [OSTI]

    General Provisions, Page 1 Purpose The purpose of this Human Resources Manual is to: 1. Provide for submission of Human Resources System data. 4. Outline the conditions, methods and schedules of employee pay State University is a land-grant institution committed to offering access in it's educational, scholarly

  11. Coordination and Control of Distributed Energy Resources for Provision of Ancillary Services

    E-Print Network [OSTI]

    Liberzon, Daniel

    Coordination and Control of Distributed Energy Resources for Provision of Ancillary Services--This paper discusses the utilization of distributed energy resources on the distribution side of the power side of a power system, it has been ac- knowledged that there exist many distributed energy resources

  12. SLA-Oriented Resource Provisioning for Cloud Computing: Challenges, Architecture, and Solutions

    E-Print Network [OSTI]

    Buyya, Rajkumar

    SLA-Oriented Resource Provisioning for Cloud Computing: Challenges, Architecture, and Solutions Rajkumar Buyya1,2 , Saurabh Kumar Garg1 , and Rodrigo N. Calheiros1 1 Cloud Computing and Distributed Systems (CLOUDS) Laboratory Department of Computing and Information Systems The University of Melbourne

  13. Academic regulations for the Master's degree in Journalism The framework provisions of the academic regulations

    E-Print Network [OSTI]

    Bataillon, Thomas

    Academic regulations for the Master's degree in Journalism The framework provisions of the academic regulations The academic regulations for the Bachelor's degree in Journalism (2007) were prepared by the Board's degree in Journalism entitles the holder to use the title of MA in Journalism (Master of Journalism

  14. PLANNING-LEVEL METHODOLOGY FOR EVALUATING TRAVELER INFORMATION PROVISION STRATEGIES UNDER STOCHASTIC CAPACITY CONDITIONS

    E-Print Network [OSTI]

    Zhou, Xuesong

    Research and Education (ITRE) Department of Civil, Construction and Environmental Engineering North and varying degrees of traveler knowledge in an advanced traveler information provision environment to a simple corridor and medium-scale networks to illustrate the effectiveness of traveler information under

  15. Description of Supplemental Subject in International Communication in English Framework provisions of the academic regulations

    E-Print Network [OSTI]

    Bataillon, Thomas

    Description of Supplemental Subject in International Communication in English Framework provisions of the academic regulations The academic regulations for the Supplemental Subject in International Communication programme, the supplemental education gives access to studies at the Master's level. Structure of the degree

  16. The effects of healthcare provisions on the 4X poverty population In the United States

    E-Print Network [OSTI]

    1 The effects of healthcare provisions on the 4X poverty population In the United States Kathleen M contained in this document are those of the authors. #12;2 Keywords: 4x poverty, health care, taxpayers #12 to households at or below 400 percent of the federal poverty threshold. To be eligible to receive

  17. Recent Advances in Autonomic Provisioning of Big Data Applications on Clouds

    E-Print Network [OSTI]

    Sun, Xian-He

    Recent Advances in Autonomic Provisioning of Big Data Applications on Clouds Rajiv Ranjan, Lizhe for the user, which just pays for the used services. Big Data [2], [3], [4], [5] applications has become a com, medical imaging, and the like. The "BigData" problem, which is defined as the practice of collecting

  18. On Interference-aware Provisioning for Cloud-based Big Data Processing

    E-Print Network [OSTI]

    Liu, Jiangchuan (JC)

    On Interference-aware Provisioning for Cloud-based Big Data Processing Yi YUAN, Haiyang WANG, Dan--Recent advances in cloud-based big data analysis offers a convenient mean for providing an elastic and cost and IBM deploy various of big data systems on their cloud platforms, aiming to occupy the huge market

  19. SLA-aware Provisioning and Scheduling of Cloud Resources for Big Data Analytics

    E-Print Network [OSTI]

    Buyya, Rajkumar

    SLA-aware Provisioning and Scheduling of Cloud Resources for Big Data Analytics Mohammed Alrokayan and traditional data management system could not keep up to scale of Big Data. They have to either invest heavily on their infrastructure or move their Big Data analytics to Cloud where they can benefit from both on-demand scalability

  20. Temperature-Aware Dynamic Resource Provisioning in a Power-Optimized Datacenter

    E-Print Network [OSTI]

    Pedram, Massoud

    , resource provisioning, energy efficient, power optimization, temperature aware I. INTRODUCTION Cloud-wide power and thermal management (PTM) solutions that improve the energy efficiency of the datacenters and sustainable energy-efficiency curve, this paper seeks to advance the technology of energy-efficient

  1. Using Utility to Provision Storage Systems John D. Strunk, Eno Thereska, Christos Faloutsos, Gregory R. Ganger

    E-Print Network [OSTI]

    Using Utility to Provision Storage Systems John D. Strunk, Eno Thereska, Christos Faloutsos a storage system requires balancing the costs of the solution with the benefits that the solution of the purchasing decision. Purchasing a storage system involves an extensive set of trade-offs between metrics

  2. PERFORMANCE RELATED SPECIAL PROVISION FOR HIGH-EARLY STRENGTH CAST-IN-PLACE CONCRETE (Tollway)

    E-Print Network [OSTI]

    PERFORMANCE RELATED SPECIAL PROVISION FOR HIGH-EARLY STRENGTH CAST-IN-PLACE CONCRETE (Tollway under Restrained Shrinkage REQUIREMENTS Contractor shall provide a concrete mix design according ¾-inch graded material. Length Change Measured shrinkage shall not be greater than 0.05 percent after 28

  3. A Distributed Scheduling Algorithm with QoS Provisions in Multi-Hop Wireless Mesh Networks

    E-Print Network [OSTI]

    Leung, Kin K.

    in urban, suburban, and rural environments. A WMN is usually composed of static wireless nodes/mesh routers/Internet gateway to the internet but also as a wireless router able to relay packets from other nodes withoutA Distributed Scheduling Algorithm with QoS Provisions in Multi-Hop Wireless Mesh Networks Chi

  4. Description of Supplementary Subjects in Event Culture Framework provisions of the academic regulations

    E-Print Network [OSTI]

    Bataillon, Thomas

    Description of Supplementary Subjects in Event Culture Framework provisions of the academic regulations The academic regulations for the supplementary subjects in Event Culture (2007) were prepared subject in Event Culture entitles the student to use the title () The academic direction and primary

  5. Optimal Provisioning of Elastic Service Availability Dahai Xu Ying Li Mung Chiang A. Robert Calderbank

    E-Print Network [OSTI]

    Papadopouli, Maria

    Optimal Provisioning of Elastic Service Availability Dahai Xu Ying Li Mung Chiang A. Robert University, NJ 08544, USA Abstract-- Service availability is one of the most closely scruti- nized metrics higher service availability at the cost of higher operational expense. It is important to cost

  6. Seismic Screening, Evaluation, Rehabilitation, and Design Provisions for Wood-Framed Structures

    E-Print Network [OSTI]

    Gupta, Rakesh

    Seismic Screening, Evaluation, Rehabilitation, and Design Provisions for Wood-Framed Structures Preston Baxter, M.ASCE1 ; Thomas H. Miller, M.ASCE2 ; and Rakesh Gupta, M.ASCE3 Abstract: Seismic Database subject headings: Seismic analysis; Seismic design; Wood structures; Shear walls; Diaphragms

  7. Concurrent Placement, Capacity Provisioning, and Request Flow Control for a Distributed Cloud

    E-Print Network [OSTI]

    Pedram, Massoud

    Concurrent Placement, Capacity Provisioning, and Request Flow Control for a Distributed Cloud of Southern California Los Angeles, USA {shuangc, yanzhiwa, pedram}@usc.edu Abstract--Cloud computing-effective access to vast resources and services available on the Internet. Cloud services are typically hosted

  8. Title III hazardous air pollutants

    SciTech Connect (OSTI)

    Todd, R.

    1995-12-31

    The author presents an overview of the key provisions of Title III of the Clean Air Act Amendments of 1990. The key provisions include the following: 112(b) -- 189 Hazardous Air Pollutants (HAP); 112(a) -- Major Source: 10 TPY/25 TPY; 112(d) -- Application of MACT; 112(g) -- Modifications; 112(I) -- State Program; 112(j) -- The Hammer; and 112(r) -- Accidental Release Provisions.

  9. Untappable key distribution system: a one-time-pad booster

    E-Print Network [OSTI]

    Geraldo A. Barbosa; Jeroen van de Graaf

    2015-07-08

    One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. This paper presents a solution for this problem providing a fast and unlimited renewal of secure keys: An untappable key distribution system is presented and detailed. This fast key distribution system utilizes two layers of confidentially protection: 1) Physical noise intrinsic to the optical channel that turn the coded signals into stealth signals and 2) Privacy amplification using a bit pool of refreshed entropy run after run, to eliminate any residual information. The resulting level of security is rigorously calculated and demonstrates that the level of information an eavesdropper could obtain is completely negligible. The random bit sequences, fast and securely distributed, can be used to encrypt text, data or voice.

  10. Grid Parity for Residential Photovoltaics in the United States: Key Drivers and Sensitivities; Preprint

    SciTech Connect (OSTI)

    Ong, S.; Denholm, P.; Clark, N.

    2012-08-01

    In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that electricity price rather than technical parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  11. Continuous Variable Quantum Key Distribution with a Noisy Laser

    E-Print Network [OSTI]

    Christian S. Jacobsen; Tobias Gehring; Ulrik L. Andersen

    2015-07-06

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances large amounts of preparation noise can be tolerated in contrast to reverse reconciliation where the key rate quickly drops to zero. Our experiment thereby demonstrates that quantum key distribution with non-shot-noise limited laser diodes might be feasible.

  12. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  13. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  14. Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices@cityu.edu.hk Abstract. In the context of Ciphertext-Policy Attribute-Based Encryption (CP-ABE), if a decryption device with policies satisfied by SD, no one including the CP-ABE authorities can identify the malicious user(s) who

  15. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  16. Robust Shot Noise Measurement for Continuous Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Sébastien Kunz-Jacques; Paul Jouguet

    2015-01-17

    We study a practical method to measure the shot noise in real time in Continuous Variable Quantum Key Distribution (CVQKD) systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e. noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  17. Feasibility of underwater free space quantum key distribution

    E-Print Network [OSTI]

    Peng Shi; Shi-Cheng Zhao; Wen-Dong Li; Yong-Jian Gu

    2014-04-04

    We investigate the optical absorption and scattering properties of underwater media pertinent to our underwater free space quantum key distribution (QKD) channel model. With the vector radiative transfer theory and Monte Carlo method, we obtain the attenuation of photons, the fidelity of the scattered photons, the quantum bit error rate and the sifted key generation rate of underwater quantum communication. It can be observed from our simulations that the most secure single photon underwater free space QKD is feasible in the clearest ocean water.

  18. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKey

  19. What To Include In The Whistleblower Complaint? | National Nuclear...

    National Nuclear Security Administration (NNSA)

    Apply for Our Jobs Our Jobs Working at NNSA Blog Home About Us Our Operations Management and Budget Whistleblower Program What To Include In The Whistleblower Complaint?...

  20. Introduction to Small-Scale Photovoltaic Systems (Including RETScreen...

    Open Energy Info (EERE)

    Introduction to Small-Scale Photovoltaic Systems (Including RETScreen Case Study) (Webinar) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Introduction to Small-Scale...

  1. Including Retro-Commissioning in Federal Energy Savings Performance...

    Broader source: Energy.gov (indexed) [DOE]

    More Documents & Publications Including Retro-Commissioning in Federal Energy Savings Performance Contracts Enabling Mass-Scale Financing for Federal Energy, Water, and...

  2. Numerical simulations for low energy nuclear reactions including...

    Office of Scientific and Technical Information (OSTI)

    Numerical simulations for low energy nuclear reactions including direct channels to validate statistical models Citation Details In-Document Search Title: Numerical simulations for...

  3. U-182: Microsoft Windows Includes Some Invalid Certificates

    Broader source: Energy.gov [DOE]

    The operating system includes some invalid intermediate certificates. The vulnerability is due to the certificate authorities and not the operating system itself.

  4. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  5. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  6. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  7. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  8. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  9. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  10. Preparing Turkey Safely Turkey provides protein along with other key

    E-Print Network [OSTI]

    Preparing Turkey Safely Nutrition Turkey provides protein along with other key nutrients. A serving is 3 ounces cooked poultry (about the size of a deck of cards). One serving of roasted, skinless turkey protein; iron--8% daily value Right Size Turkey Use this chart as a helpful guide: Whole bird ­ 1 pound

  11. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  12. November 2012 Key Performance Indicator (KPI): Carbon Management

    E-Print Network [OSTI]

    Evans, Paul

    November 2012 Key Performance Indicator (KPI): Carbon Management NTU report our carbon footprint provided. The carbon emissions are calculated using Carbon Trust conversion factors, as used in NTU's EMS.64 2011/2012 18,130 4.20 The recorded changes in emissions are a result of carbon management projects

  13. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  14. Experimental quantum key distribution without monitoring signal disturbance

    E-Print Network [OSTI]

    Hiroki Takesue; Toshihiko Sasaki; Kiyoshi Tamaki; Masato Koashi

    2015-05-29

    Since the invention of Bennett-Brassard 1984 (BB84) protocol, many quantum key distribution (QKD) protocols have been proposed and some protocols are operated even in field environments. One of the striking features of QKD is that QKD protocols are provably secure unlike cryptography based on computational complexity assumptions. It has been believed that, to guarantee the security of QKD, Alice and Bob have to monitor the statistics of the measurement outcomes which are used to determine the amount of the privacy amplification to generate a key. Recently a new type of QKD protocol, called round robin differential phase shift (RRDPS) protocol, was proposed, and remarkably this protocol can generate a key without monitoring any statistics of the measurement outcomes. Here we report an experimental realization of the RRDPS protocol. We used a setup in which Bob randomly chooses one from four interferometers with different pulse delays so that he could implement phase difference measurements for all possible combinations with five-pulse time-bin states. Using the setup, we successfully distributed keys over 30 km of fiber, making this the first QKD experiment that does not rely on signal disturbance monitoring.

  15. The Seven Keys to Success in Energy Management and Conservation 

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  16. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE­HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN­order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  17. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  18. Appendix 30 Fire Effects on Key Ecological Processes in Forested

    E-Print Network [OSTI]

    Appendix 30 Fire Effects on Key Ecological Processes in Forested Ecosystems The following paragraphs on fire effects on forest succession are from Stickney (1982) Forest Succession ...the severity of the pre-disturbance forest herb species also demonstrated the ability to survive fire, particularly those

  19. Outline Overview Design Principles Key Points Design Principles

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 12 #12-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least Common Mechanism Psychological Acceptability 3 Key Points Ahmad Almulhem - Network Security Engineering - 2008 2 / 12 #12;Outline

  20. Annual Report 2004 1 Key events during 2004

    E-Print Network [OSTI]

    Svenningsson, Josef

    Johansson studying the separation of carbon dioxide in a reactor system for two-stage combustion. #12;1 Key for innovation systems and entrepreneurship A year of anniversaries ­ the University, the Foundation, Chalmers are among those hardest struck,but many holidaying Swedes,especially in Thailand,fall victim to the tsunami

  1. MOLECULAR ENTOMOLOGY Molecular Identification Key for Pest Species of Scirtothrips

    E-Print Network [OSTI]

    Hoddle, Mark S.

    primers and determining the size of the products by using standard agarose gel electrophoresis, followed, Neohydatothrips, molecular identiÞcation key, exotic pests, nondestruc- tive DNA extraction The genus Scirtothrips, several species of Scirtothrips have (or have the potential to) spread from their natural habitats

  2. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  3. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  4. news and views A key issue for hydrogen storage materi-

    E-Print Network [OSTI]

    Palumbi, Stephen

    news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

  5. Key Directions and a Roadmap for Electrical Design for Manufacturability

    E-Print Network [OSTI]

    Kahng, Andrew B.

    Key Directions and a Roadmap for Electrical Design for Manufacturability (Invited Talk) Andrew B by design and design-for- manufacturability (DFM) techniques. This talk addresses trends and a roadmap assumptions come true? The second part will give a roadmap for electrical DFM technologies, motivated

  6. Key Title Marine Ecology www.wiley.com

    E-Print Network [OSTI]

    Wall, Diana

    Key Title Marine Ecology www.wiley.com Antarctic Ecosystems: An Extreme Environment in a Changing their genomes. Chapters address both Antarctic terrestrial and marine ecosystems, and the scientific and evolution Part II: Marine habitats and regions Chapter 4. The impact of regional climate change

  7. Key Facts About Hurricane Readiness Preparing for a Hurricane

    E-Print Network [OSTI]

    HURRICANES Key Facts About Hurricane Readiness Preparing for a Hurricane If you are under a hurricane watch or warning, here are some basic steps to take to prepare for the storm: · Learn about your. · Identify potential home hazards and know how to secure or protect them before the hurricane strikes

  8. PSERC 97-12 "Thermal Unit Commitment Including

    E-Print Network [OSTI]

    PSERC 97-12 "Thermal Unit Commitment Including Optimal AC Power Flow Constraints" Carlos Murillo-562-3966. #12;Thermal Unit Commitment Including Optimal AC Power Flow Constraints Carlos Murillo S anchez Robert a new algorithm for unit commitment that employs a Lagrange relaxation technique with a new augmentation

  9. Summer Conference Participant Registration Fee: $200 Includes the following

    E-Print Network [OSTI]

    Tullos, Desiree

    Summer Conference Participant Registration Fee: $200 Includes the following: Lodging for Wednesday on Wednesday, Thursday, and Friday Brunch on Saturday Summer Conference T-shirt Class materials Congress Only only (although they are encouraged to attend the entire conference). This fee includes the following

  10. Solar Energy Education. Reader, Part II. Sun story. [Includes glossary

    SciTech Connect (OSTI)

    Not Available

    1981-05-01

    Magazine articles which focus on the subject of solar energy are presented. The booklet prepared is the second of a four part series of the Solar Energy Reader. Excerpts from the magazines include the history of solar energy, mythology and tales, and selected poetry on the sun. A glossary of energy related terms is included. (BCS)

  11. Energy Transitions: A Systems Approach Including Marcellus Shale Gas Development

    E-Print Network [OSTI]

    Chen, Tsuhan

    Energy Transitions: A Systems Approach Including Marcellus Shale Gas Development A Report Transitions: A Systems Approach Including Marcellus Shale Gas Development Executive Summary In the 21st the Marcellus shale In addition to the specific questions identified for the case of Marcellus shale gas in New

  12. Notes on the CRTDH Group Key Agreement Protocol Spyros Magliveras and Wandi Wei

    E-Print Network [OSTI]

    Magliveras, Spyros

    , the distributed schemes help in the uniform distribution of the work-load for key management and eliminate: xkzou@cs.iupui.edu Abstract Group key management (GKM) is one of the primary is- sues for secure group Key Management (GKM), Contributory Group Key Agreement, Chinese Remainder Theorem, Diffie-Hellman Key

  13. Articles which include chevron film cooling holes, and related processes

    DOE Patents [OSTI]

    Bunker, Ronald Scott; Lacy, Benjamin Paul

    2014-12-09

    An article is described, including an inner surface which can be exposed to a first fluid; an inlet; and an outer surface spaced from the inner surface, which can be exposed to a hotter second fluid. The article further includes at least one row or other pattern of passage holes. Each passage hole includes an inlet bore extending through the substrate from the inlet at the inner surface to a passage hole-exit proximate to the outer surface, with the inlet bore terminating in a chevron outlet adjacent the hole-exit. The chevron outlet includes a pair of wing troughs having a common surface region between them. The common surface region includes a valley which is adjacent the hole-exit; and a plateau adjacent the valley. The article can be an airfoil. Related methods for preparing the passage holes are also described.

  14. Distribution and abundance of endangered Florida Key deer on outer islands 

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25

    -based survey data. All outer islands exhibited estimated abundances considerably below carrying capacities, with larger populations occurring closer to Big Pine Key. Results indicated that other islands and complexes such as Ramrod Key, Water Key...

  15. Including Retro-Commissioning in Federal Energy Savings Performance...

    Energy Savers [EERE]

    the cost of the survey. Developing a detailed scope of work and a fixed price for this work is important to eliminate risk to the Agency and the ESCo. Including a detailed scope...

  16. T-603: Mac OS X Includes Some Invalid Comodo Certificates

    Broader source: Energy.gov [DOE]

    The operating system includes some invalid certificates. The vulnerability is due to the invalid certificates and not the operating system itself. Other browsers, applications, and operating systems are affected.

  17. FINITE ELEMENT ANALYSIS OF STEEL WELDED COVERPLATE INCLUDING COMPOSITE DOUBLERS

    E-Print Network [OSTI]

    Petri, Brad

    2008-05-15

    With the increasing focus on welded bridge members resulting in crack initiation and propagation, there is a large demand for creative solutions. One of these solutions includes the application of composite doublers over ...

  18. Title 16 USC 818 Public Lands Included in Project - Reservation...

    Open Energy Info (EERE)

    of Lands From Entry Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: Title 16 USC 818 Public Lands Included in Project...

  19. Including costs of supply chain risk in strategic sourcing decisions

    E-Print Network [OSTI]

    Jain, Avani

    2009-01-01

    Cost evaluations do not always include the costs associated with risks when organizations make strategic sourcing decisions. This research was conducted to establish and quantify the impact of risks and risk-related costs ...

  20. Proposal for the award of two contracts for the provision of high-speed data circuits to the USA

    E-Print Network [OSTI]

    2005-01-01

    This document concerns the award of two contracts for high-speed (10 Gbit/s) data circuits for Wide Area Network (WAN) connectivity between CERN and the STARLIGHT Internet exchange in Chicago through the MANLAN Internet exchange in New York, USA, on behalf of a consortium comprising CERN, the US Department of Energy, the World Health Organisation and the Centre de Resources Informatiques de la Haute-Savoie (France). The Finance Committee is invited to agree to the negotiation of two contracts, together covering the provision of up to four high-speed (10 Gbit/s) data circuits to the USA, with: GLOBAL CROSSING (CH) for one 10 Gbit/s circuit between CERN and New York, two 10 Gbit/s circuits between New York and Chicago and Internet access points in Geneva and New York, for a period of three years for a total amount of 2 764 517 Swiss francs, not subject to revision. The contract will include options for one additional 10 Gbit/s circuit between CERN and New York and two additional 10 Gbit/s circuits between New Y...

  1. Hybrid powertrain system including smooth shifting automated transmission

    DOE Patents [OSTI]

    Beaty, Kevin D.; Nellums, Richard A.

    2006-10-24

    A powertrain system is provided that includes a prime mover and a change-gear transmission having an input, at least two gear ratios, and an output. The powertrain system also includes a power shunt configured to route power applied to the transmission by one of the input and the output to the other one of the input and the output. A transmission system and a method for facilitating shifting of a transmission system are also provided.

  2. Limited Personal Use of Government Office Equipment including Information Technology

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-01-07

    The Order establishes requirements and assigns responsibilities for employees' limited personal use of Government resources (office equipment and other resources including information technology) within DOE, including NNSA. The Order is required to provide guidance on appropriate and inappropriate uses of Government resources. This Order was certified 04/23/2009 as accurate and continues to be relevant and appropriate for use by the Department. Certified 4-23-09. No cancellation.

  3. Simple rate-adaptive LDPC coding for quantum key distribution

    E-Print Network [OSTI]

    Mo Li; Chun-Mei Zhang; Zhen-Qiang Yin; Wei Chen; Chuan Wang; Zheng-Fu Han

    2015-05-24

    Although quantum key distribution (QKD) comes from the development of quantum theory, the implementation of a practical QKD system does involve a lot of classical process, such as key reconciliation and privacy amplification, which is called post-processing. Post-processing has been a crucial element to high speed QKD systems, even the bottleneck of it because of its relatively high time consumption. Low density parity check (LDPC) is now becoming a promising approach of overcoming the bottleneck due to its good performance in processing throughput. In this article we propose and simulate an easily implemented but efficiently rate-adaptive LDPC coding approach of reconciliation, different from the previously proposed puncturing- and shortening-based approach. We also give a measure for choosing the optimal LDPC parameter for our rate-adaptive approach according to error rates.

  4. Quantum Hacking on Quantum Key Distribution using Homodyne Detection

    E-Print Network [OSTI]

    Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2014-02-27

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  5. No-signaling Quantum Key Distribution: Solution by Linear Programming

    E-Print Network [OSTI]

    Won-Young Hwang; Joonwoo Bae; Nathan Killoran

    2013-01-15

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csisz\\'ar-K\\"orner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  6. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  7. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  8. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIALU.S. DepartmentJeanKey Meeting Takeaways from 2014 Meeting

  9. Key Activities in Energy Efficiency | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore: ENERGYKevinKey

  10. Key Concepts in Project Development and Financing in Alaska

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: Project

  11. Vehicle Technologies Office: Key Activities in Vehicles | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-ScaleTechnology|Energy Key

  12. UCSD Technical Report CS2012-0985, July, 2012 Battery Provisioning and Associated Costs for Data Center Power Capping

    E-Print Network [OSTI]

    Tullsen, Dean M.

    expenses, or capex) and monthly recur- ring operating expenses (opex) [19]. Capex costs are pro- portional both capex and opex costs. Power infrastructure is commonly over-provisioned in data centers

  13. General Provisions for Study and Examination Regulations regarding Bachelor and Master Programmes at Ulm University (General Framework)

    E-Print Network [OSTI]

    Ulm, Universität

    of Baden-Württemberg ("Landeshochschulgesetz" ­ LHG) in the version of 1 January 2005 (Law Gazette p. 1 ff pursuant to § 34 (1) sentence 3 LHG. Preliminary remarks on language use I. General provisions § 1 Scope

  14. Impact of seismic code provisions in the central U.S.: a performance evaluation of a reinforced concrete building 

    E-Print Network [OSTI]

    Kueht, Erin

    2009-05-15

    The close proximity to the New Madrid Seismic Zone and the significant population and infrastructure presents a potentially substantial risk for central U.S. cities such as Memphis, Tennessee. However, seismic provisions ...

  15. Coal-Fired Power Plants, Greenhouse Gases, and State Statutory Substantial Endangerment Provisions: Climate Change Comes to Kansas

    E-Print Network [OSTI]

    Glicksman, Robert L.

    2008-04-01

    control statutes, in restricting greenhouse gas emissions from stationary sources such as electric power plants. The article concludes that substantial endangerment provisions provide a useful mechanism for blocking the construction and operation...

  16. Description of subsidiary subjects in Scandinavian Language and Literature (part 2) Framework provisions of the academic regulations

    E-Print Network [OSTI]

    Bataillon, Thomas

    Description of subsidiary subjects in Scandinavian Language and Literature (part 2) Framework provisions of the academic regulations The academic regulations for the subsidiary subject in Scandinavian on 1 September 2007. The Subsidiary Subject in Scandinavian Language and Literature entitles students

  17. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  18. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  19. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Phillip Mills

    2012-02-01

    This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

  20. Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01

    "Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

  1. Key Parameters Governing the Energy Density of Rechargeable Li...

    Office of Scientific and Technical Information (OSTI)

    (heterogeneous), energy storage (including batteries and capacitors), hydrogen and fuel cells, defects, charge transport, membrane, materials and chemistry by design,...

  2. Methods of producing adsorption media including a metal oxide

    DOE Patents [OSTI]

    Mann, Nicholas R; Tranter, Troy J

    2014-03-04

    Methods of producing a metal oxide are disclosed. The method comprises dissolving a metal salt in a reaction solvent to form a metal salt/reaction solvent solution. The metal salt is converted to a metal oxide and a caustic solution is added to the metal oxide/reaction solvent solution to adjust the pH of the metal oxide/reaction solvent solution to less than approximately 7.0. The metal oxide is precipitated and recovered. A method of producing adsorption media including the metal oxide is also disclosed, as is a precursor of an active component including particles of a metal oxide.

  3. Thin film solar cell including a spatially modulated intrinsic layer

    DOE Patents [OSTI]

    Guha, Subhendu (Troy, MI); Yang, Chi-Chung (Troy, MI); Ovshinsky, Stanford R. (Bloomfield Hills, MI)

    1989-03-28

    One or more thin film solar cells in which the intrinsic layer of substantially amorphous semiconductor alloy material thereof includes at least a first band gap portion and a narrower band gap portion. The band gap of the intrinsic layer is spatially graded through a portion of the bulk thickness, said graded portion including a region removed from the intrinsic layer-dopant layer interfaces. The band gap of the intrinsic layer is always less than the band gap of the doped layers. The gradation of the intrinsic layer is effected such that the open circuit voltage and/or the fill factor of the one or plural solar cell structure is enhanced.

  4. Solar Energy Education. Renewable energy: a background text. [Includes glossary

    SciTech Connect (OSTI)

    Not Available

    1985-01-01

    Some of the most common forms of renewable energy are presented in this textbook for students. The topics include solar energy, wind power hydroelectric power, biomass ocean thermal energy, and tidal and geothermal energy. The main emphasis of the text is on the sun and the solar energy that it yields. Discussions on the sun's composition and the relationship between the earth, sun and atmosphere are provided. Insolation, active and passive solar systems, and solar collectors are the subtopics included under solar energy. (BCS)

  5. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  6. Grandfathering provisions

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1Markets See full Genealogy of MajorNational

  7. Biomass Potentials from California Forest and Shrublands Including Fuel

    E-Print Network [OSTI]

    Biomass Potentials from California Forest and Shrublands Including Fuel Reduction Potentials-04-004 February 2005 Revised: October 2005 Arnold Schwarzenegger, Governor, State of California #12;Biomass Tiangco, CEC Bryan M. Jenkins, University of California #12;Biomass Potentials from California Forest

  8. Applied Linguistics Department Curriculum for the IEP Including Curriculum Summary

    E-Print Network [OSTI]

    Weaver, Adam Lee

    Applied Linguistics Department Curriculum for the IEP Including Curriculum Summary 1 C-1-2 Curriculum for the IEP (as described in CEA Curriculum Standards) I. General Curriculum Philosophy a topics, and global issues. b. Skills Development: The IEP curriculum offers courses that provide skills

  9. Optimal Energy Management Strategy including Battery Health through Thermal

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Optimal Energy Management Strategy including Battery Health through Thermal Management for Hybrid: Energy management strategy, Plug-in hybrid electric vehicles, Li-ion battery aging, thermal management, Pontryagin's Minimum Principle. 1. INTRODUCTION The interest for energy management strategy (EMS) of Hybrid

  10. Directing all emergency activities including evacuation of personnel.

    E-Print Network [OSTI]

    Johnson, Eric E.

    for employees who perform or shut down critical plant operations. · Systems to account for all employees after· Directing all emergency activities including evacuation of personnel. · Ensuring that outside emergency services are notified when necessary. · Directing the shutdown of plant operations when necessary

  11. Thermal Unit Commitment Including Optimal AC Power Flow Constraints

    E-Print Network [OSTI]

    Thermal Unit Commitment Including Optimal AC Power Flow Constraints Carlos Murillo{Sanchez Robert J algorithm for unit commitment that employs a Lagrange relaxation technique with a new augmentation. This framework allows the possibility of committing units that are required for the VArs that they can produce

  12. cDNA encoding a polypeptide including a hevein sequence

    DOE Patents [OSTI]

    Raikhel, N.V.; Broekaert, W.F.; Namhai Chua; Kush, A.

    1993-02-16

    A cDNA clone (HEV1) encoding hevein was isolated via polymerase chain reaction (PCR) using mixed oligonucleotides corresponding to two regions of hevein as primers and a Hevea brasiliensis latex cDNA library as a template. HEV1 is 1,018 nucleotides long and includes an open reading frame of 204 amino acids.

  13. Major initiatives in materials research at Western include

    E-Print Network [OSTI]

    Christensen, Dan

    , and the growth and formation of new materials. Western is a leader in the study of the interactions of radiationMajor initiatives in materials research at Western include Surface Science Western, Interface of the wide range of materials and biomaterials research within the Faculty of Science and across Western

  14. Assessment of Mission Design Including Utilization of Libration

    E-Print Network [OSTI]

    Barcelona, Universitat de

    Assessment of Mission Design Including Utilization of Libration Points and Weak Stability: The International Sun-Earth Explorer 3 . . . . . . . . . . . . . . . 11 2.1.2 WIND/JWST: Next Generation Space Telescope . . . . . . . . . . . . . . . 33 2.1.9 FIRST/HERSCHEL: Far Infra

  15. Free Energy Efficiency Kit includes CFL light bulbs,

    E-Print Network [OSTI]

    Rose, Annkatrin

    Free Energy Efficiency Kit Kit includes CFL light bulbs, spray foam, low-flow shower head, and more for discounted energy assessments. FREE HOME ENERGY EFFICIENCY SEMINAR N e w R i ver L i g ht & Pow e r a n d W! Building Science 101 Presentation BPI Certified Building Professionals will present home energy efficiency

  16. 2014 CATEE: Collaboration is the Key- Public/Private Partnerships 

    E-Print Network [OSTI]

    Lin, L.

    2014-01-01

    stream_source_info ESL-KT-14-11-24.pdf.txt stream_content_type text/plain stream_size 9508 Content-Encoding UTF-8 stream_name ESL-KT-14-11-24.pdf.txt Content-Type text/plain; charset=UTF-8 2014 CATEE Collaboration... is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston Energy Efficiency Programs 2000...

  17. Upconversion based receivers for quantum hacking resistant quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Gregory S. Kanter

    2015-09-21

    We propose a novel upconversion (sum frequency generation) based quantum-optical setup that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  18. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLC Jump

  19. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to the

  20. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theA

  1. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theAA

  2. Florida Keys El Coop Assn, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpAFlex Fuels Energy Jump to:Flora HomeKeys El Coop

  3. SimTable key tool for preparing, responding to wildfire

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effect Photovoltaics -7541 UnlimitedShift EndShutdownSolar PhotovoltaicSimTable key

  4. Sandia Energy - The Brain: Key To a Better Computer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities General overview of theBrain: Key To a

  5. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecoveryplanning Career Planning for theFebruary 26, 2014andKEY

  6. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclear Physics (NP)aboutRio de Janeiro,theIs Key

  7. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5

  8. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey Dates

  9. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey

  10. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenryInhibitingInteractivePGAS andUniversity IonIron is the Key to

  11. Key Publications - Natural Gas Regulation | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKey

  12. Robotics Key to Subsea Exploration | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The Energy Materials CenterRobotics Key to Subsea

  13. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  14. A look at the PGP ecosystem through the key server data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    to be challenging. GnuPG does not provide library access to low level functions that would allow parsing the data-based encryption systems use a network of key servers to share public keys. These key server operate on an add only basis, thus the data gives us access to PGP public keys from over 20 years of PGP usage. Analyzing

  15. Conversion of geothermal waste to commercial products including silica

    DOE Patents [OSTI]

    Premuzic, Eugene T. (East Moriches, NY); Lin, Mow S. (Rocky Point, NY)

    2003-01-01

    A process for the treatment of geothermal residue includes contacting the pigmented amorphous silica-containing component with a depigmenting reagent one or more times to depigment the silica and produce a mixture containing depigmented amorphous silica and depigmenting reagent containing pigment material; separating the depigmented amorphous silica and from the depigmenting reagent to yield depigmented amorphous silica. Before or after the depigmenting contacting, the geothermal residue or depigmented silica can be treated with a metal solubilizing agent to produce another mixture containing pigmented or unpigmented amorphous silica-containing component and a solubilized metal-containing component; separating these components from each other to produce an amorphous silica product substantially devoid of metals and at least partially devoid of pigment. The amorphous silica product can be neutralized and thereafter dried at a temperature from about 25.degree. C. to 300.degree. C. The morphology of the silica product can be varied through the process conditions including sequence contacting steps, pH of depigmenting reagent, neutralization and drying conditions to tailor the amorphous silica for commercial use in products including filler for paint, paper, rubber and polymers, and chromatographic material.

  16. Implementing Performance-Based Sustainability Requirements for the Low Carbon Fuel Standard – Key Design Elements and Policy Considerations

    E-Print Network [OSTI]

    Yeh, Sonia; Sumner, Daniel A.; Kaffka, Stephen R.; Ogden, J; Jenkins, Bryan M.

    2009-01-01

    Standard – Key Design Elements and Policy ConsiderationsStandard ? Key Design Elements and Policy Considerations:Standard ? Key Design Elements and Policy Considerations:

  17. Energy-Intensive Processes Portfolio: Addressing Key Energy Challenges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    increased system availability. Braddock, PA Printed with a renewable-source ink on paper containing at least 50% wastepaper, including 10% post-consumer waste. The Industrial...

  18. A passive transmitter for quantum key distribution with coherent light

    E-Print Network [OSTI]

    Marcos Curty; Marc Jofre; Valerio Pruneri; Morgan W. Mitchell

    2011-08-03

    Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, since no externally driven element is required. Typical passive transmitters involve parametric down-conversion. More recently, it has been shown that phase-randomized coherent pulses also allow passive generation of decoy states and Bennett-Brassard 1984 (BB84) polarization signals, though the combination of both setups in a single passive source is cumbersome. In this paper, we present a complete passive transmitter that prepares decoy-state BB84 signals using coherent light. Our method employs sum-frequency generation together with linear optical components and classical photodetectors. In the asymptotic limit of an infinite long experiment, the resulting secret key rate (per pulse) is comparable to the one delivered by an active decoy-state BB84 setup with an infinite number of decoy settings.

  19. The role of naturally occurring waterholes in determining the distribution of Florida Key Deer 

    E-Print Network [OSTI]

    Kim, Ji Yeon

    2009-05-15

    (Big Pine Key Inn Station, 1953) Data on Big Pine Key and the Volume of Daily Fresh Water Shortage on Big Pine Key (From the Result of 1-Year Base Line Simulation)................................................................................ 26...). I used two precipitation data sets to parameterize dv1, one consisting of daily precipitation (inches) from January 1 to December 31, 1953 from the Big Pine Key Inn weather station and one from January 1 to December 31, 2001 from the Key West...

  20. Design of a rural water provision system to decrease arsenic exposure in Bangladesh

    SciTech Connect (OSTI)

    Mathieu, Johanna

    2009-01-07

    Researchers at the Lawrence Berkeley National Laboratory have invented ARUBA (Arsenic Removal Using Bottom Ash) a material that effectively and affordably removes high concentrations of arsenic from contaminated groundwater. The technology is cost-effective because the substrate?bottom ash from coal fired power plants?is a waste material readily available in South Asia. During fieldwork in four sub-districts ofBangladesh, ARUBA reduced groundwater arsenic concentrations as high as 680 ppb to below the Bangladesh standard of 50 ppb. Key results from three trips in Bangladesh and one trip to Cambodia include (1) ARUBA removes more than half of the arsenic from contaminated water within the first five minutes of contact, andcontinues removing arsenic for 2-3 days; (2) ARUBA?s arsenic removal efficiency can be improved through fractionated dosing (adding a given amount of ARUBA in fractions versus all at once); (3) allowing water to first stand for two to three days followed by treatment with ARUBA produced final arsenic concentrations ten times lower than treating water directly out of the well; and (4) the amount of arsenic removed per gram of ARUBA is linearly related to the initial arsenic concentrationof the water. Through analysis of existing studies, observations, and informal interviews in Bangladesh, eight design strategies have been developed and used in the design of a low-cost, community-scale water treatment system that uses ARUBA to remove arsenic from drinking water. We have constructed, tested, and analyzed a scale version of the system. Experiments have shown that the system is capable of reducing high levels of arsenic (nearly 600 ppb) to below 50 ppb, while remaining affordable to people living on less than $2 per day. The system could be sustainably implemented as a public-private partnership in rural Bangladesh.

  1. A coke oven model including thermal decomposition kinetics of tar

    SciTech Connect (OSTI)

    Munekane, Fuminori; Yamaguchi, Yukio [Mitsubishi Chemical Corp., Yokohama (Japan); Tanioka, Seiichi [Mitsubishi Chemical Corp., Sakaide (Japan)

    1997-12-31

    A new one-dimensional coke oven model has been developed for simulating the amount and the characteristics of by-products such as tar and gas as well as coke. This model consists of both heat transfer and chemical kinetics including thermal decomposition of coal and tar. The chemical kinetics constants are obtained by estimation based on the results of experiments conducted to investigate the thermal decomposition of both coal and tar. The calculation results using the new model are in good agreement with experimental ones.

  2. Composite armor, armor system and vehicle including armor system

    DOE Patents [OSTI]

    Chu, Henry S.; Jones, Warren F.; Lacy, Jeffrey M.; Thinnes, Gary L.

    2013-01-01

    Composite armor panels are disclosed. Each panel comprises a plurality of functional layers comprising at least an outermost layer, an intermediate layer and a base layer. An armor system incorporating armor panels is also disclosed. Armor panels are mounted on carriages movably secured to adjacent rails of a rail system. Each panel may be moved on its associated rail and into partially overlapping relationship with another panel on an adjacent rail for protection against incoming ordnance from various directions. The rail system may be configured as at least a part of a ring, and be disposed about a hatch on a vehicle. Vehicles including an armor system are also disclosed.

  3. cDNA encoding a polypeptide including a hevein sequence

    DOE Patents [OSTI]

    Raikhel, Natasha V. (Okemos, MI); Broekaert, Willem F. (Dilbeek, BE); Chua, Nam-Hai (Scarsdale, NY); Kush, Anil (New York, NY)

    1993-02-16

    A cDNA clone (HEV1) encoding hevein was isolated via polymerase chain reaction (PCR) using mixed oligonucleotides corresponding to two regions of hevein as primers and a Hevea brasiliensis latex cDNA library as a template. HEV1 is 1018 nucleotides long and includes an open reading frame of 204 amino acids. The deduced amino acid sequence contains a pu GOVERNMENT RIGHTS This application was funded under Department of Energy Contract DE-AC02-76ER01338. The U.S. Government has certain rights under this application and any patent issuing thereon.

  4. Composite material including nanocrystals and methods of making

    DOE Patents [OSTI]

    Bawendi, Moungi G.; Sundar, Vikram C.

    2010-04-06

    Temperature-sensing compositions can include an inorganic material, such as a semiconductor nanocrystal. The nanocrystal can be a dependable and accurate indicator of temperature. The intensity of emission of the nanocrystal varies with temperature and can be highly sensitive to surface temperature. The nanocrystals can be processed with a binder to form a matrix, which can be varied by altering the chemical nature of the surface of the nanocrystal. A nanocrystal with a compatibilizing outer layer can be incorporated into a coating formulation and retain its temperature sensitive emissive properties.

  5. Composite material including nanocrystals and methods of making

    DOE Patents [OSTI]

    Bawendi, Moungi G. (Boston, MA); Sundar, Vikram C. (New York, NY)

    2008-02-05

    Temperature-sensing compositions can include an inorganic material, such as a semiconductor nanocrystal. The nanocrystal can be a dependable and accurate indicator of temperature. The intensity of emission of the nanocrystal varies with temperature and can be highly sensitive to surface temperature. The nanocrystals can be processed with a binder to form a matrix, which can be varied by altering the chemical nature of the surface of the nanocrystal. A nanocrystal with a compatibilizing outer layer can be incorporated into a coating formulation and retain its temperature sensitive emissive properties

  6. Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01

    Grid parity--or break-even cost--for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that local incentives rather than ?technical? parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  7. Comparing the Residential Provisions on the 2015 IECC with the Corresponding Previsions of the 2015 IECC for Single-Family Residential Construction in Texas. 

    E-Print Network [OSTI]

    Mukhopadhyay, J.; Baltazar, J. C.; Ellis, S.; Haberl, J.S.; Yazdani, B.

    2014-01-01

    -08-01 COMPARING THE RESIDENTIAL PROVISIONS OF THE 2015 IECC WITH THE CORRESPONDING PROVISIONS OF THE 2012 IECC FOR SINGLE-FAMILY RESIDENTIAL CONSTRUCTION IN TEXAS A Report Jaya Mukhopadhyay, PhD Juan-Carlos Baltazar, PhD., P.E. Shirley... Ellis Jeff S. Haberl, PhD, P.E. Bahman Yazdani. P.E. August 2014 August 2014 Assessing Residential Provisions in the 2015 IECC Energy Systems Laboratory...

  8. Canada's new national energy program on oil and gas: what are the main provisions. What are the reactions so far

    SciTech Connect (OSTI)

    Burr, K.K.

    1981-04-01

    The Canadian goal is to achieve energy self-sufficiency by 1990. On October 28, 1980 the Canadian federal government announced a new National Energy Program (NEP) for oil and natural gas to achieve this goal. In formulating the program, the Liberal government dealt with two major political and economic influences in Canadian energy: provincial ownership of natural resources and the 70% level of foreign ownership in the Canadian petroleum industry. The broad objectives of the program are to achieve national energy security, create opportunities for Canadian participation, and share resource benefits among the provinces. The major provisions include: a 8% federal tax on oil and gas production; a natural gas federal excise tax; a pricing scheme which holds conventional oil prices down but gives incentives for oil sands, heavy oil, and tertiary recovery production; a gas pricing scheme which encourages substitution of gas for oil; a 25% carried interest for the government on federal leases; and a Canadianization incentives grant system which replaces the depletion allowances system. The producing provinces object to the gas excise tax as a federal instrusion on provincial rights. The provinces also object to the low oil prices. A majority of the petroleum industry opposes the NEP. Many companies predict increased Canadian dependence on foreign oil. Negative industry reactions are taking the form of budget cutbacks, project delays and suspensions, and removal of drilling rigs to the USA. However, some companies are giving indications of accepting the NEP. The US has accused the NEP of violating several international agreements. The USSR warmly endorses the NEP, but says it doesn't go far enough. The Canadian federal government defends the NEP against all charges and seems committed to making it work. The general feeling among observers is that there will be concessions made on all sides - federal, provincial, and industry.

  9. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  10. Modern hydrocracking is the key to upgrading processes

    SciTech Connect (OSTI)

    Corbett, R.A.

    1989-06-26

    Hydrocracking technology is the key to Canada's heavy oil and bitumen upgrading facilities that have recently started or are due to start up during the next few years. The upgrader at Consumers' Cooperative Refineries Ltd. in Regina Sask.; the capacity addition program (CAP) at Syncrude Canada Ltd.'s Fort McMurray, Alta., plant; Husky Oil Operations Ltd.'s Bi-Provincial upgrader to be built near Lloydminster, Sask.; and the OSLO project to be built near Fort McMurray, all rely on this modern technology for primary upgrading. All of the projects are designed to upgrade heavy oil and bitumen extracted from oil sands to a high-quality synthetic crude oil (SCO) that is a blend of high-quality naphtha and gas oil.

  11. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  12. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  13. Electra-optical device including a nitrogen containing electrolyte

    DOE Patents [OSTI]

    Bates, J.B.; Dudney, N.J.; Gruzalski, G.R.; Luck, C.F.

    1995-10-03

    Described is a thin-film battery, especially a thin-film microbattery, and a method for making same having application as a backup or primary integrated power source for electronic devices. The battery includes a novel electrolyte which is electrochemically stable and does not react with the lithium anode and a novel vanadium oxide cathode. Configured as a microbattery, the battery can be fabricated directly onto a semiconductor chip, onto the semiconductor die or onto any portion of the chip carrier. The battery can be fabricated to any specified size or shape to meet the requirements of a particular application. The battery is fabricated of solid state materials and is capable of operation between {minus}15 C and 150 C.

  14. Protoplanetary disks including radiative feedback from accreting planets

    E-Print Network [OSTI]

    Montesinos, Matias; Perez, Sebastian; Baruteau, Clement; Casassus, Simon

    2015-01-01

    While recent observational progress is converging on the detection of compact regions of thermal emission due to embedded protoplanets, further theoretical predictions are needed to understand the response of a protoplanetary disk to the planet formation radiative feedback. This is particularly important to make predictions for the observability of circumplanetary regions. In this work we use 2D hydrodynamical simulations to examine the evolution of a viscous protoplanetary disk in which a luminous Jupiter-mass planet is embedded. We use an energy equation which includes the radiative heating of the planet as an additional mechanism for planet formation feedback. Several models are computed for planet luminosities ranging from $10^{-5}$ to $10^{-3}$ Solar luminosities. We find that the planet radiative feedback enhances the disk's accretion rate at the planet's orbital radius, producing a hotter and more luminous environement around the planet, independently of the prescription used to model the disk's turbul...

  15. Including stereoscopic information in the reconstruction of coronal magnetic fields

    E-Print Network [OSTI]

    T. Wiegelmann; T. Neukirch

    2008-01-23

    We present a method to include stereoscopic information about the three dimensional structure of flux tubes into the reconstruction of the coronal magnetic field. Due to the low plasma beta in the corona we can assume a force free magnetic field, with the current density parallel to the magnetic field lines. Here we use linear force free fields for simplicity. The method uses the line of sight magnetic field on the photosphere as observational input. The value of $\\alpha$ is determined iteratively by comparing the reconstructed magnetic field with the observed structures. The final configuration is the optimal linear force solution constrained by both the photospheric magnetogram and the observed plasma structures. As an example we apply our method to SOHO MDI/EIT data of an active region. In the future it is planned to apply the method to analyse data from the SECCHI instrument aboard the STEREO mission.

  16. Electra-optical device including a nitrogen containing electrolyte

    DOE Patents [OSTI]

    Bates, John B. (Oak Ridge, TN); Dudney, Nancy J. (Knoxville, TN); Gruzalski, Greg R. (Oak Ridge, TN); Luck, Christopher F. (Knoxville, TN)

    1995-01-01

    Described is a thin-film battery, especially a thin-film microbattery, and a method for making same having application as a backup or primary integrated power source for electronic devices. The battery includes a novel electrolyte which is electrochemically stable and does not react with the lithium anode and a novel vanadium oxide cathode Configured as a microbattery, the battery can be fabricated directly onto a semiconductor chip, onto the semiconductor die or onto any portion of the chip carrier. The battery can be fabricated to any specified size or shape to meet the requirements of a particular application. The battery is fabricated of solid state materials and is capable of operation between -15.degree. C. and 150.degree. C.

  17. Copper laser modulator driving assembly including a magnetic compression laser

    DOE Patents [OSTI]

    Cook, Edward G. (Livermore, CA); Birx, Daniel L. (Oakley, CA); Ball, Don G. (Livermore, CA)

    1994-01-01

    A laser modulator (10) having a low voltage assembly (12) with a plurality of low voltage modules (14) with first stage magnetic compression circuits (20) and magnetic assist inductors (28) with a common core (91), such that timing of the first stage magnetic switches (30b) is thereby synchronized. A bipolar second stage of magnetic compression (42) is coupled to the low voltage modules (14) through a bipolar pulse transformer (36) and a third stage of magnetic compression (44) is directly coupled to the second stage of magnetic compression (42). The low voltage assembly (12) includes pressurized boxes (117) for improving voltage standoff between the primary winding assemblies (34) and secondary winding (40) contained therein.

  18. Pulse transmission transmitter including a higher order time derivate filter

    DOE Patents [OSTI]

    Dress, Jr., William B.; Smith, Stephen F.

    2003-09-23

    Systems and methods for pulse-transmission low-power communication modes are disclosed. A pulse transmission transmitter includes: a clock; a pseudorandom polynomial generator coupled to the clock, the pseudorandom polynomial generator having a polynomial load input; an exclusive-OR gate coupled to the pseudorandom polynomial generator, the exclusive-OR gate having a serial data input; a programmable delay circuit coupled to both the clock and the exclusive-OR gate; a pulse generator coupled to the programmable delay circuit; and a higher order time derivative filter coupled to the pulse generator. The systems and methods significantly reduce lower-frequency emissions from pulse transmission spread-spectrum communication modes, which reduces potentially harmful interference to existing radio frequency services and users and also simultaneously permit transmission of multiple data bits by utilizing specific pulse shapes.

  19. Actuator assembly including a single axis of rotation locking member

    DOE Patents [OSTI]

    Quitmeyer, James N.; Benson, Dwayne M.; Geck, Kellan P.

    2009-12-08

    An actuator assembly including an actuator housing assembly and a single axis of rotation locking member fixedly attached to a portion of the actuator housing assembly and an external mounting structure. The single axis of rotation locking member restricting rotational movement of the actuator housing assembly about at least one axis. The single axis of rotation locking member is coupled at a first end to the actuator housing assembly about a Y axis and at a 90.degree. angle to an X and Z axis providing rotation of the actuator housing assembly about the Y axis. The single axis of rotation locking member is coupled at a second end to a mounting structure, and more particularly a mounting pin, about an X axis and at a 90.degree. angle to a Y and Z axis providing rotation of the actuator housing assembly about the X axis. The actuator assembly is thereby restricted from rotation about the Z axis.

  20. Hydraulic engine valve actuation system including independent feedback control

    DOE Patents [OSTI]

    Marriott, Craig D

    2013-06-04

    A hydraulic valve actuation assembly may include a housing, a piston, a supply control valve, a closing control valve, and an opening control valve. The housing may define a first fluid chamber, a second fluid chamber, and a third fluid chamber. The piston may be axially secured to an engine valve and located within the first, second and third fluid chambers. The supply control valve may control a hydraulic fluid supply to the piston. The closing control valve may be located between the supply control valve and the second fluid chamber and may control fluid flow from the second fluid chamber to the supply control valve. The opening control valve may be located between the supply control valve and the second fluid chamber and may control fluid flow from the supply control valve to the second fluid chamber.

  1. Fuel cell repeater unit including frame and separator plate

    SciTech Connect (OSTI)

    Yamanis, Jean; Hawkes, Justin R; Chiapetta, Jr., Louis; Bird, Connie E; Sun, Ellen Y; Croteau, Paul F

    2013-11-05

    An example fuel cell repeater includes a separator plate and a frame establishing at least a portion of a flow path that is operative to communicate fuel to or from at least one fuel cell held by the frame relative to the separator plate. The flow path has a perimeter and any fuel within the perimeter flow across the at least one fuel cell in a first direction. The separator plate, the frame, or both establish at least one conduit positioned outside the flow path perimeter. The conduit is outside of the flow path perimeter and is configured to direct flow in a second, different direction. The conduit is fluidly coupled with the flow path.

  2. Proposal for the award of a contract for stores operation and provision of logistics-related activities on the CERN site

    E-Print Network [OSTI]

    2013-01-01

    Proposal for the award of a contract for stores operation and provision of logistics-related activities on the CERN site

  3. By Bruce Goldman The brain's key "breeder" cells, it turns

    E-Print Network [OSTI]

    Bogyo, Matthew

    including neurons. It's known that treating humans with radiation or drugs that prevent NPC rep- lication and graduate stu- dents were busy conducting experiments on proteins. A poster of the image of the "molecular

  4. Passive-scheme analysis for solving untrusted source problem in quantum key distribution

    E-Print Network [OSTI]

    Xiang Peng; Bingjie Xu; Hong Guo

    2010-04-28

    As a practical method, the passive scheme is useful to monitor the photon statistics of an untrusted source in a "Plug & Play" quantum key distribution (QKD) system. In a passive scheme, three kinds of monitor mode can be adopted: average photon number (APN) monitor, photon number analyzer (PNA) and photon number distribution (PND) monitor. In this paper, the security analysis is rigorously given for APN monitor, while for PNA, the analysis including statistical fluctuation and random noise, is addressed with a confidence level. The results show that the PNA can achieve better performance than the APN monitor and can asymptotically approach the theoretical limit of the PND monitor. Also, the passive scheme with the PNA works efficiently when the signal-to-noise ratio ($R^{SN}$) is not too low and so is highly applicable to solve the untrusted source problem in the QKD system.

  5. Transportation Energy Futures: Key Opportunities and Tools for Decision Makers (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2012-12-01

    The Transportation Energy Futures (TEF) project examines underexplored greenhouse gas-abatement and oil-savings opportunities by consolidating transportation energy knowledge, conducting advanced analysis, and exploring additional opportunities for sound strategic action. Led by NREL, in collaboration with Argonne National Laboratory, the project's primary goal is to provide analysis to accompany DOE-EERE's long-term transportation energy planning by addressing high-priority questions, informing domestic decisions about transportation energy strategies, priorities, and investments. Research and analysis were conducted with an eye toward short-term actions that support long-term energy goals The project looks beyond technology to examine each key question in the context of the marketplace, consumer behavior, industry capabilities, and infrastructure. This updated fact sheet includes a new section on initial project findings.

  6. Hydrogen storage for vehicular applications: Technology status and key development areas

    SciTech Connect (OSTI)

    Robinson, S.L.; Handrock, J.L.

    1994-04-01

    The state-of-the-art of hydrogen storage technology is reviewed, including gaseous, liquid, hydride, surface adsorbed media, glass microsphere, chemical reaction, and liquid chemical technologies. The review of each technology includes a discussion of advantages, disadvantages, likelihood of success, and key research and development activities. A preferred technological path for the development of effective near-term hydrogen storage includes both cur-rent DOT qualified and advanced compressed storage for down-sized highly efficient but moderate range vehicles, and liquid storage for fleet vehicle applications. Adsorbate media are also suitable for fleet applications but not for intermittent uses. Volume-optimized transition metal hydride beds are also viable for short range applications. Long-term development of coated nanoparticulate or metal matrix high conductivity magnesium alloy, is recommended. In addition, a room temperature adsorbate medium should be developed to avoid cryogenic storage requirements. Chemical storage and oxidative schemes present serious obstacles which must be addressed for these technologies to have a future role.

  7. C -parameter distribution at N 3 LL ' including power corrections

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hoang, André H.; Kolodrubetz, Daniel W.; Mateu, Vicent; Stewart, Iain W.

    2015-05-01

    We compute the e?e? C-parameter distribution using the soft-collinear effective theory with a resummation to next-to-next-to-next-to-leading-log prime accuracy of the most singular partonic terms. This includes the known fixed-order QCD results up to O(?3s), a numerical determination of the two-loop nonlogarithmic term of the soft function, and all logarithmic terms in the jet and soft functions up to three loops. Our result holds for C in the peak, tail, and far tail regions. Additionally, we treat hadronization effects using a field theoretic nonperturbative soft function, with moments ?n. To eliminate an O(?QCD) renormalon ambiguity in the soft function, we switchmore »from the MS¯ to a short distance “Rgap” scheme to define the leading power correction parameter ?1. We show how to simultaneously account for running effects in ?1 due to renormalon subtractions and hadron-mass effects, enabling power correction universality between C-parameter and thrust to be tested in our setup. We discuss in detail the impact of resummation and renormalon subtractions on the convergence. In the relevant fit region for ?s(mZ) and ?1, the perturbative uncertainty in our cross section is ? 2.5% at Q=mZ.« less

  8. cDNA encoding a polypeptide including a hevein sequence

    DOE Patents [OSTI]

    Raikhel, Natasha V. (Okemos, MI); Broekaert, Willem F. (Dilbeek, BE); Chua, Nam-Hai (Scarsdale, NY); Kush, Anil (New York, NY)

    1999-05-04

    A cDNA clone (HEV1) encoding hevein was isolated via polymerase chain reaction (PCR) using mixed oligonucleotides corresponding to two regions of hevein as primers and a Hevea brasiliensis latex cDNA library as a template. HEV1 is 1018 nucleotides long and includes an open reading frame of 204 amino acids. The deduced amino acid sequence contains a putative signal sequence of 17 amino acid residues followed by a 187 amino acid polypeptide. The amino-terminal region (43 amino acids) is identical to hevein and shows homology to several chitin-binding proteins and to the amino-termini of wound-induced genes in potato and poplar. The carboxyl-terminal portion of the polypeptide (144 amino acids) is 74-79% homologous to the carboxyl-terminal region of wound-inducible genes of potato. Wounding, as well as application of the plant hormones abscisic acid and ethylene, resulted in accumulation of hevein transcripts in leaves, stems and latex, but not in roots, as shown by using the cDNA as a probe. A fusion protein was produced in E. coli from the protein of the present invention and maltose binding protein produced by the E. coli.

  9. cDNA encoding a polypeptide including a hevein sequence

    DOE Patents [OSTI]

    Raikhel, N.V.; Broekaert, W.F.; Chua, N.H.; Kush, A.

    1999-05-04

    A cDNA clone (HEV1) encoding hevein was isolated via polymerase chain reaction (PCR) using mixed oligonucleotides corresponding to two regions of hevein as primers and a Hevea brasiliensis latex cDNA library as a template. HEV1 is 1018 nucleotides long and includes an open reading frame of 204 amino acids. The deduced amino acid sequence contains a putative signal sequence of 17 amino acid residues followed by a 187 amino acid polypeptide. The amino-terminal region (43 amino acids) is identical to hevein and shows homology to several chitin-binding proteins and to the amino-termini of wound-induced genes in potato and poplar. The carboxyl-terminal portion of the polypeptide (144 amino acids) is 74--79% homologous to the carboxyl-terminal region of wound-inducible genes of potato. Wounding, as well as application of the plant hormones abscisic acid and ethylene, resulted in accumulation of hevein transcripts in leaves, stems and latex, but not in roots, as shown by using the cDNA as a probe. A fusion protein was produced in E. coli from the protein of the present invention and maltose binding protein produced by the E. coli. 12 figs.

  10. C -parameter distribution at N 3 LL ' including power corrections

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hoang, André H.; Kolodrubetz, Daniel W.; Mateu, Vicent; Stewart, Iain W.

    2015-05-01

    We compute the e?e? C-parameter distribution using the soft-collinear effective theory with a resummation to next-to-next-to-next-to-leading-log prime accuracy of the most singular partonic terms. This includes the known fixed-order QCD results up to O(?3s), a numerical determination of the two-loop nonlogarithmic term of the soft function, and all logarithmic terms in the jet and soft functions up to three loops. Our result holds for C in the peak, tail, and far tail regions. Additionally, we treat hadronization effects using a field theoretic nonperturbative soft function, with moments ?n. To eliminate an O(?QCD) renormalon ambiguity in the soft function, we switch from the MS¯ to a short distance “Rgap” scheme to define the leading power correction parameter ?1. We show how to simultaneously account for running effects in ?1 due to renormalon subtractions and hadron-mass effects, enabling power correction universality between C-parameter and thrust to be tested in our setup. We discuss in detail the impact of resummation and renormalon subtractions on the convergence. In the relevant fit region for ?s(mZ) and ?1, the perturbative uncertainty in our cross section is ? 2.5% at Q=mZ.

  11. Extractant composition including crown ether and calixarene extractants

    DOE Patents [OSTI]

    Meikrantz, David H. (Idaho Falls, ID); Todd, Terry A. (Aberdeen, ID); Riddle, Catherine L. (Idaho Falls, ID); Law, Jack D. (Pocalello, ID); Peterman, Dean R. (Idaho Falls, ID); Mincher, Bruce J. (Idaho Falls, ID); McGrath, Christopher A. (Blackfoot, ID); Baker, John D. (Blackfoot, ID)

    2009-04-28

    An extractant composition comprising a mixed extractant solvent consisting of calix[4] arene-bis-(tert-octylbenzo)-crown-6 ("BOBCalixC6"), 4',4',(5')-di-(t-butyldicyclo-hexano)-18-crown-6 ("DtBu18C6"), and at least one modifier dissolved in a diluent. The DtBu18C6 may be present at from approximately 0.01M to approximately 0.4M, such as at from approximately 0.086 M to approximately 0.108 M. The modifier may be 1-(2,2,3,3-tetrafluoropropoxy)-3-(4-sec-butylphenoxy)-2-propanol ("Cs-7SB") and may be present at from approximately 0.01M to approximately 0.8M. In one embodiment, the mixed extractant solvent includes approximately 0.15M DtBu18C6, approximately 0.007M BOBCalixC6, and approximately 0.75M Cs-7SB modifier dissolved in an isoparaffinic hydrocarbon diluent. The extractant composition further comprises an aqueous phase. The mixed extractant solvent may be used to remove cesium and strontium from the aqueous phase.

  12. Interim performance criteria for photovoltaic energy systems. [Glossary included

    SciTech Connect (OSTI)

    DeBlasio, R.; Forman, S.; Hogan, S.; Nuss, G.; Post, H.; Ross, R.; Schafft, H.

    1980-12-01

    This document is a response to the Photovoltaic Research, Development, and Demonstration Act of 1978 (P.L. 95-590) which required the generation of performance criteria for photovoltaic energy systems. Since the document is evolutionary and will be updated, the term interim is used. More than 50 experts in the photovoltaic field have contributed in the writing and review of the 179 performance criteria listed in this document. The performance criteria address characteristics of present-day photovoltaic systems that are of interest to manufacturers, government agencies, purchasers, and all others interested in various aspects of photovoltaic system performance and safety. The performance criteria apply to the system as a whole and to its possible subsystems: array, power conditioning, monitor and control, storage, cabling, and power distribution. They are further categorized according to the following performance attributes: electrical, thermal, mechanical/structural, safety, durability/reliability, installation/operation/maintenance, and building/site. Each criterion contains a statement of expected performance (nonprescriptive), a method of evaluation, and a commentary with further information or justification. Over 50 references for background information are also given. A glossary with definitions relevant to photovoltaic systems and a section on test methods are presented in the appendices. Twenty test methods are included to measure performance characteristics of the subsystem elements. These test methods and other parts of the document will be expanded or revised as future experience and needs dictate.

  13. cDNA encoding a polypeptide including a hevein sequence

    DOE Patents [OSTI]

    Raikhel, N.V.; Broekaert, W.F.; Chua, N.H.; Kush, A.

    1995-03-21

    A cDNA clone (HEV1) encoding hevein was isolated via polymerase chain reaction (PCR) using mixed oligonucleotides corresponding to two regions of hevein as primers and a Hevea brasiliensis latex cDNA library as a template. HEV1 is 1,018 nucleotides long and includes an open reading frame of 204 amino acids. The deduced amino acid sequence contains a putative signal sequence of 17 amino acid residues followed by a 187 amino acid polypeptide. The amino-terminal region (43 amino acids) is identical to hevein and shows homology to several chitin-binding proteins and to the amino-termini of wound-induced genes in potato and poplar. The carboxyl-terminal portion of the polypeptide (144 amino acids) is 74--79% homologous to the carboxyl-terminal region of wound-inducible genes of potato. Wounding, as well as application of the plant hormones abscisic acid and ethylene, resulted in accumulation of hevein transcripts in leaves, stems and latex, but not in roots, as shown by using the cDNA as a probe. A fusion protein was produced in E. coli from the protein of the present invention and maltose binding protein produced by the E. coli. 11 figures.

  14. CDNA encoding a polypeptide including a hevein sequence

    DOE Patents [OSTI]

    Raikhel, Natasha V. (Okemos, MI); Broekaert, Willem F. (Dilbeek, BE); Chua, Nam-Hai (Scarsdale, NY); Kush, Anil (New York, NY)

    1995-03-21

    A cDNA clone (HEV1) encoding hevein was isolated via polymerase chain reaction (PCR) using mixed oligonucleotides corresponding to two regions of hevein as primers and a Hevea brasiliensis latex cDNA library as a template. HEV1 is 1018 nucleotides long and includes an open reading frame of 204 amino acids. The deduced amino acid sequence contains a putative signal sequence of 17 amino acid residues followed by a 187 amino acid polypeptide. The amino-terminal region (43 amino acids) is identical to hevein and shows homology to several chitin-binding proteins and to the amino-termini of wound-induced genes in potato and poplar. The carboxyl-terminal portion of the polypeptide (144 amino acids) is 74-79% homologous to the carboxyl-terminal region of wound-inducible genes of potato. Wounding, as well as application of the plant hormones abscisic acid and ethylene, resulted in accumulation of hevein transcripts in leaves, stems and latex, but not in roots, as shown by using the cDNA as a probe. A fusion protein was produced in E. coli from the protein of the present invention and maltose binding protein produced by the E. coli.

  15. HOW MIGHT INDUSTRY GOVERNANCE BE BROADENED TO INCLUDE NONPROLIFERATION

    SciTech Connect (OSTI)

    Hund, Gretchen; Seward, Amy M.

    2009-10-06

    Broadening industry governance to support nonproliferation could provide significant new leverage in preventing the spread/diversion of nuclear, radiological, or dual-use material or technology that could be used in making a nuclear or radiological weapon. Industry is defined broadly to include 1) the nuclear industry, 2) dual-use industries, and 3) radioactive source manufacturers and selected radioactive source-user industries worldwide. This paper describes how industry can be an important first line of defense in detecting and thwarting proliferation, such as an illicit trade network or an insider theft case, by complementing and strengthening existing governmental efforts. For example, the dual-use industry can play a critical role by providing export, import, or security control information that would allow a government or the International Atomic Energy Agency (IAEA) to integrate this information with safeguards, export, import, and physical protection information it has to create a more complete picture of the potential for proliferation. Because industry is closest to users of the goods and technology that could be illicitly diverted throughout the supply chain, industry information can potentially be more timely and accurate than other sources of information. Industry is in an ideal position to help ensure that such illicit activities are detected. This role could be performed more effectively if companies worked together within a particular industry to promote nonproliferation by implementing an industry-wide self-regulation program. Performance measures could be used to ensure their materials and technologies are secure throughout the supply chain and that customers are legitimately using and/or maintaining oversight of these items. Nonproliferation is the overarching driver that industry needs to consider in adopting and implementing a self-regulation approach. A few foreign companies have begun such an approach to date; it is believed that, ultimately, broad engagement of global industry leaders in self regulation is needed to result in the greatest nonproliferation benefit.

  16. Community Assessment Tool for Public Health Emergencies Including Pandemic Influenza

    SciTech Connect (OSTI)

    HCTT-CHE

    2011-04-14

    The Community Assessment Tool (CAT) for Public Health Emergencies Including Pandemic Influenza (hereafter referred to as the CAT) was developed as a result of feedback received from several communities. These communities participated in workshops focused on influenza pandemic planning and response. The 2008 through 2011 workshops were sponsored by the Centers for Disease Control and Prevention (CDC). Feedback during those workshops indicated the need for a tool that a community can use to assess its readiness for a disaster—readiness from a total healthcare perspective, not just hospitals, but the whole healthcare system. The CAT intends to do just that—help strengthen existing preparedness plans by allowing the healthcare system and other agencies to work together during an influenza pandemic. It helps reveal each core agency partners' (sectors) capabilities and resources, and highlights cases of the same vendors being used for resource supplies (e.g., personal protective equipment [PPE] and oxygen) by the partners (e.g., public health departments, clinics, or hospitals). The CAT also addresses gaps in the community's capabilities or potential shortages in resources. While the purpose of the CAT is to further prepare the community for an influenza pandemic, its framework is an extension of the traditional all-hazards approach to planning and preparedness. As such, the information gathered by the tool is useful in preparation for most widespread public health emergencies. This tool is primarily intended for use by those involved in healthcare emergency preparedness (e.g., community planners, community disaster preparedness coordinators, 9-1-1 directors, hospital emergency preparedness coordinators). It is divided into sections based on the core agency partners, which may be involved in the community's influenza pandemic influenza response.

  17. High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors

    E-Print Network [OSTI]

    Spellmeyer, Neal W.

    We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

  18. Blast furnace key to earth's birth P11 Balancing the body clock P14

    E-Print Network [OSTI]

    Liley, David

    Newage Blast furnace key to earth's birth P11 Balancing the body clock P14 Research readies to the stars Julian criBB 11 blast furnace holds key to earth's birth Julian criBB 12 agency audit raises

  19. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  20. The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks #

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks # Johann Großsch, Security. Keywords Wireless networking, security protocols, cryptography, key establishment, energy Inffeldgasse 16a, A--8010 Graz, Austria ABSTRACT Wireless sensor nodes generally face serious limitations

  1. A World Wide Web key to the grass genera of Texas 

    E-Print Network [OSTI]

    Dawson, John Edward

    2001-01-01

    An illustrated dichotomous key to the grass genera of Texas is presented in hypertext markup language (HTML) format. The key combines scanned images of inflorescences, digitized images of dissected spikelets, text descriptions ...

  2. ASTROPHYSICS Thesaurus of key words used in the annual subject indexes

    E-Print Network [OSTI]

    Xu, Ren-Xin

    ASTRONOMY AND ASTROPHYSICS Thesaurus of key words used in the annual subject indexes (valid from processing 03.20.2 Techniques: interferometric 03.20.3 Techniques: miscellaneous #12;2 Thesaurus of key words

  3. Large trees-key climate influencers-die first in drought

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Large trees-key climate influencers-die first in drought Large trees-key climate influencers-die first in drought A team of researchers studied forests worldwide, ranging from...

  4. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  5. Key issues of ultraviolet radiation of OH at high altitudes

    SciTech Connect (OSTI)

    Zhang, Yuhuai; Wan, Tian; Jiang, Jianzheng; Fan, Jing

    2014-12-09

    Ultraviolet (UV) emissions radiated by hydroxyl (OH) is one of the fundamental elements in the prediction of radiation signature of high-altitude and high-speed vehicle. In this work, the OH A{sup 2}?{sup +}?X{sup 2}? ultraviolet emission band behind the bow shock is computed under the experimental condition of the second bow-shock ultraviolet flight (BSUV-2). Four related key issues are discussed, namely, the source of hydrogen element in the high-altitude atmosphere, the formation mechanism of OH species, efficient computational algorithm of trace species in rarefied flows, and accurate calculation of OH emission spectra. Firstly, by analyzing the typical atmospheric model, the vertical distributions of the number densities of different species containing hydrogen element are given. According to the different dominating species containing hydrogen element, the atmosphere is divided into three zones, and the formation mechanism of OH species is analyzed in the different zones. The direct simulation Monte Carlo (DSMC) method and the Navier-Stokes equations are employed to compute the number densities of the different OH electronically and vibrationally excited states. Different to the previous work, the trace species separation (TSS) algorithm is applied twice in order to accurately calculate the densities of OH species and its excited states. Using a non-equilibrium radiation model, the OH ultraviolet emission spectra and intensity at different altitudes are computed, and good agreement is obtained with the flight measured data.

  6. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  7. Do myoepithelial cells hold the key for breast tumorprogression?

    SciTech Connect (OSTI)

    Polyak, Kornelia; Hu, Min

    2005-11-18

    Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

  8. What every designated representative should know about Title IV and Title V enforcement provisions

    SciTech Connect (OSTI)

    Bischoff, C.A. [Gallagher and Kennedy, Phoenix, AZ (United States); Dayal, P. [Tucson Electric Power Co., Tucson, AZ (United States)

    1995-12-31

    Title IV of the Clean Air Act not only created a regulatory program unlike any other under the Clean Air Act, but also established a unique position--the designated representative--as an integral part of the program. The designated representative is required to meet certain basic obligations under Title IV, and a panoply of enforcement mechanisms are available to EPA in the event of noncompliance with these obligations. Also, because a designated representative may take on responsibilities under the permit provisions of Title V of the Clean Air Act, the designated representative can also be subject to an enforcement action for failure to comply with certain Title V permit requirements. This paper considers the basic definition of the designated representative under EPA`s Title IV and Title V regulations, identifies the responsibilities assigned to the designated representative, and then analyzes the enforcement mechanisms that may be applied to the designated representative if a regulatory responsibility has not been satisfied.

  9. A Thesis for the Degree of Master An Efficient Tree-based Group Key

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master An Efficient Tree-based Group Key Agreement using Bilinear Map-based Group Key Agreement using Bilinear Map #12;An Efficient Tree-based Group Key Agreement using Bilinear in partial fulfillment of the require- ments for the degree of Master of Science in the School of Engineering

  10. A Thesis for the Degree of Master A New Group Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master A New Group Key Agreement Scheme based on Ternary Tree Sang-won Lee School of Engineering Information and Communications University 2003 #12;A New Group Key Agreement Scheme based on Ternary Tree #12;A New Group Key Agreement Scheme based on Ternary Tree Advisor

  11. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  12. Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2 , Jun Ao3 , and Jianhua Li1 1 School@263.net Abstract. Kallahalla et al. presented a RSA-based Forward Key Rotation mechanism in secure storage present a Forward Key Rotation storage scheme based on discrete logarithm and discuss its security

  13. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

    E-Print Network [OSTI]

    State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University Experimental for energy dissipation mechanism. State Key Laboratory of Disaster Reduction in Civil Engineering #12;· Scope on Horizontal connection. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

  14. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek1, , S presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers

  15. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek 1,# , S presents the first scalable, e#cient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2­KE/3­KE) protocols. We propose three di#erent compilers where

  16. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  17. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12;A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt1,buchmann}@cdc.informatik.tu-darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  18. TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen-way trapdoor function, and then propose a new multivariate public key cryptosystem called TOT, which can though C was broken, its high speed has been affirmed). Keywords: TOT; multivariate public key

  19. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12; A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt 1,buchmann}@cdc.informatik.tu­darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  20. A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the

    E-Print Network [OSTI]

    Zdun, Uwe

    A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise in (all) the new key technology areas, it was hard for the management to estimate which new technologies, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale

  1. A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner Hamburg in the ubiquitous and pervasive comput- ing setting is secure key exchange. The restrictions moti- vate-core in ¢¡¤£¦¥¨§ -CMOS technology are evaluated. 1. Introduction In ubiquitous and pervasive computing scenarios, key

  2. NSTX Upgrade Project STRUCTURAL CALCULATION OF THE TF FLAG KEY

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    source of design information including computer program titles and revision levels.) 1] NSTX-CALC-13] NSTX Structural Design Criteria Document, I. Zatz [3] NSTX Design Point June 2010 http://www.pppl.gov/~neumeyer/NSTX_CSU/Design blade due to the OOP torque. 3.)The shear strength of the epoxy used to bond the CRES insert into the G

  3. I t=106sec3a 10 Energy key) 10'

    E-Print Network [OSTI]

    of opportunity including supernovae and gamma-ray bursts. NuSTAR builds on the High Energy Focusing Telescop. Optics for EUV, X-Ray, and Gamma-Ray Astronomy II, edited by Oberto Citterio, Stephen L. O'Dell, Proc over CGRO in gamma-rays. In pursuit of these science objectives, NuSTAR will: NuSTAR will also study

  4. Key ACA Terms A quick reference of frequently used terms

    E-Print Network [OSTI]

    Acton, Scott

    to achieving health care quality goals and outcomes that result in cost savings. Affordable Health Care Health; and pediatric services, including oral and vision care. Federal Poverty Level (FPL) A measure of income level issued annually by the Department of Health and Human Services. The federal poverty level is used

  5. Secure Password-Based Authenticated Key Exchange for Web Services

    E-Print Network [OSTI]

    sign-on, delegation, and identity. The Grid Security Infrastructure (GSI) is the name given so. 1.3 Security in Grid Computing Security is one of the major requirements of Grid computing. Any Grid site deployment must at least provide the basic security mechanisms including authentication

  6. RDI's Wisdom Way Solar Village Final Report: Includes Utility Bill Analysis of Occupied Homes

    SciTech Connect (OSTI)

    Robb Aldrich, Steven Winter Associates

    2011-07-01

    In 2010, Rural Development, Inc. (RDI) completed construction of Wisdom Way Solar Village (WWSV), a community of ten duplexes (20 homes) in Greenfield, MA. RDI was committed to very low energy use from the beginning of the design process throughout construction. Key features include: 1. Careful site plan so that all homes have solar access (for active and passive); 2. Cellulose insulation providing R-40 walls, R-50 ceiling, and R-40 floors; 3. Triple-pane windows; 4. Airtight construction (~0.1 CFM50/ft2 enclosure area); 5. Solar water heating systems with tankless, gas, auxiliary heaters; 6. PV systems (2.8 or 3.4kWSTC); 7. 2-4 bedrooms, 1,100-1,700 ft2. The design heating loads in the homes were so small that each home is heated with a single, sealed-combustion, natural gas room heater. The cost savings from the simple HVAC systems made possible the tremendous investments in the homes' envelopes. The Consortium for Advanced Residential Buildings (CARB) monitored temperatures and comfort in several homes during the winter of 2009-2010. In the Spring of 2011, CARB obtained utility bill information from 13 occupied homes. Because of efficient lights, appliances, and conscientious home occupants, the energy generated by the solar electric systems exceeded the electric energy used in most homes. Most homes, in fact, had a net credit from the electric utility over the course of a year. On the natural gas side, total gas costs averaged $377 per year (for heating, water heating, cooking, and clothes drying). Total energy costs were even less - $337 per year, including all utility fees. The highest annual energy bill for any home evaluated was $458; the lowest was $171.

  7. 'Energy Matters' greening the campus Reducing energy use across the UW System is among the key goals of Governor's Executive Order

    E-Print Network [OSTI]

    Saldin, Dilano

    undergone energy-efficiency upgrades and renovations. Upgrades include occupancy and variable'Energy Matters' greening the campus Reducing energy use across the UW System is among the key with the near completion of its $10 million Energy Matters: Phase One initiative. Since that initiative kicked

  8. Key establishment à la Merkle in a quantum world

    E-Print Network [OSTI]

    Gilles Brassard; Peter Hoyer; Kassem Kalach; Marc Kaplan; Sophie Laplante; Louis Salvail

    2015-02-13

    In 1974, Ralph Merkle proposed the first unclassified scheme for secure communications over insecure channels. When legitimate communicating parties are willing to spend an amount of computational effort proportional to some parameter N, an eavesdropper cannot break into their communication without spending a time proportional to N^2, which is quadratically more than the legitimate effort. Two of us showed in 2008 that Merkle's schemes are completely insecure against a quantum adversary, but that their security can be partially restored if the legitimate parties are also allowed to use quantum computation: the eavesdropper needed to spend a time proportional to N^{3/2} to break our earlier quantum scheme. Furthermore, all previous classical schemes could be broken completely by the onslaught of a quantum eavesdropper and we conjectured that this is unavoidable. We give now two novel key establishment schemes in the spirit of Merkle's. The first one can be broken by a quantum adversary who makes an effort proportional to N^{5/3}, which is the optimal attack against this scheme. Our second scheme is purely classical, yet it cannot be broken by a quantum eavesdropper who is only willing to expend an effort proportional to that of the legitimate parties. We then introduce two families of more elaborate protocols. The first family consists in quantum protocols whose security is arbitrarily close to quadratic in the query complexity model. The second is a family of classical protocols whose security against a quantum adversary is arbitrarily close to N^{3/2} in the same model.

  9. 2013 IEEE 14th International Conference on High Performance Switching and Routing On Capacity Provisioning in Datacenter Networks

    E-Print Network [OSTI]

    Huang, Changcheng

    Provisioning in Datacenter Networks for Full Bandwidth Communication Wenda Ni*, Changcheng Huang*, and Jing Wu.huang}@sce.carleton.ca.jingwu@ieee.org Abstract-Recent advances in datacenter network design have enabled full bandwidth communication based, and under k arbitrary link failures. We derive the minimum link capacity required on two typical datacenter

  10. Recovery Act Special Provisions DOE Inter-Contractor Purchase -Leased Subcontract UT-B Contracts Div Page 1 of 1

    E-Print Network [OSTI]

    Recovery Act ­ Special Provisions ­ DOE Inter-Contractor Purchase - Leased Subcontract UT-B Contracts Div Oct 2009 Page 1 of 1 recovery-special-prov-doe-inter-contractor-leased-sub-ext-oct09.doc OF 2009 ­ DOE INTER-CONTRACTOR PURCHASE ­ LEASED SUBCONTRACT (Oct 2009) PREAMBLE Work performed under

  11. On the Selection of Optimal Diverse AS-Paths for Inter-Domain IP/(G)MPLS Tunnel Provisioning

    E-Print Network [OSTI]

    Rougier, Jean-Louis

    On the Selection of Optimal Diverse AS-Paths for Inter-Domain IP/(G)MPLS Tunnel Provisioning of diverse AS paths can be computed, in order to proactively increase the success rate of tunnel set these services beyond domain boundaries, particularly for critical inter-AS VPNs, TV transport or voice gateways

  12. USER-MANAGED END-TO-END LIGHTPATH PROVISIONING OVER Jing Wu, Scott Campbell, J. Michel Savoie, Hanxi Zhang

    E-Print Network [OSTI]

    von Bochmann, Gregor

    USER-MANAGED END-TO-END LIGHTPATH PROVISIONING OVER CA*NET 4 Jing Wu, Scott Campbell, J. Michel dark fibre networks and long-haul wavelength networks. Schools, hospitals and government departments are acquiring their own metro dark fibres. They participate in so-called "condominium" dark fibre networks

  13. Coal fly ash basins as an attractive nuisance to birds: Parental provisioning exposes nestlings to harmful trace elements

    E-Print Network [OSTI]

    Hopkins, William A.

    Coal fly ash basins as an attractive nuisance to birds: Parental provisioning exposes nestlings Keywords: Coal fly ash basin Common Grackle Contaminants Quiscalus quiscala Selenium a b s t r a c t Birds by-products, primarily fly ash, are sources of multiple contaminants to both aquatic and terrestrial

  14. 03.202 Employment of Non-Citizens. 1. Purpose. To comply with the provisions of the United States

    E-Print Network [OSTI]

    , governing the employment of immigrant and non-immigrant aliens (non-citizens). 2. Policy. It is the policy of the University of North Texas System to employ immigrant and non-immigrant aliens within the provisions into three categories: a. Non-immigrants with F-1 Visas. Non-immigrants with F-1 visas are aliens temporarily

  15. Los Alamos Explosives Performance Key to Stockpile Stewardship

    SciTech Connect (OSTI)

    Dattelbaum, Dana

    2014-11-03

    As the U.S. Nuclear Deterrent ages, one essential factor in making sure that the weapons will continue to perform as designed is understanding the fundamental properties of the high explosives that are part of a nuclear weapons system. As nuclear weapons go through life extension programs, some changes may be advantageous, particularly through the addition of what are known as "insensitive" high explosives that are much less likely to accidentally detonate than the already very safe "conventional" high explosives that are used in most weapons. At Los Alamos National Laboratory explosives research includes a wide variety of both large- and small-scale experiments that include small contained detonations, gas and powder gun firings, larger outdoor detonations, large-scale hydrodynamic tests, and at the Nevada Nuclear Security Site, underground sub-critical experiments.

  16. Los Alamos Explosives Performance Key to Stockpile Stewardship

    ScienceCinema (OSTI)

    Dattelbaum, Dana

    2015-01-05

    As the U.S. Nuclear Deterrent ages, one essential factor in making sure that the weapons will continue to perform as designed is understanding the fundamental properties of the high explosives that are part of a nuclear weapons system. As nuclear weapons go through life extension programs, some changes may be advantageous, particularly through the addition of what are known as "insensitive" high explosives that are much less likely to accidentally detonate than the already very safe "conventional" high explosives that are used in most weapons. At Los Alamos National Laboratory explosives research includes a wide variety of both large- and small-scale experiments that include small contained detonations, gas and powder gun firings, larger outdoor detonations, large-scale hydrodynamic tests, and at the Nevada Nuclear Security Site, underground sub-critical experiments.

  17. Dynamic Bandwidth Pricing: Provision Cost, Market Size, Effective Bandwidths and Price Games

    E-Print Network [OSTI]

    Weber, Richard

    contracts. We investigate the resulting reaction curves, search for the existence of an equilibrium point the provider of dynamic contracts to enter the market. Key Words: network economics, contracts, pricing and customers have tra- ditionally been of static nature. Both parties agree on the terms of a long- term

  18. Topsides equipment, operating flexibility key floating LNG design

    SciTech Connect (OSTI)

    Yost, K.; Lopez, R.; Mok, J.

    1998-03-09

    Use of a large-scale floating liquefied natural gas (LNG) plant is an economical alternative to an onshore plant for producing from an offshore field. Mobil Technology Co., Dallas, has advanced a design for such a plant that is technically feasible, economical, safe, and reliable. Presented were descriptions of the general design basis, hull modeling and testing, topsides and storage layouts, and LNG offloading. But such a design also presents challenges for designing topsides equipment in an offshore environment and for including flexibility and safety. These are covered in this second article. Mobil`s floating LNG plant design calls for a square concrete barge with a moon-pool in the center. It is designed to produce 6 million tons/year of LNG with up to 55,000 b/d of condensate from 1 bcfd of raw feed gas.

  19. Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices

    SciTech Connect (OSTI)

    Sharon Kramer; Mirko Previsic; Peter Nelson; Sheri Woo

    2010-06-17

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: ? 4 wave energy generation technologies ? 3 tidal energy generation technologies ? 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal) ? 3 project sizes: pilot, small commercial, and large commercial The possible combinations total 24 wave technology scenarios and 9 tidal technology scenarios. We evaluated 3 of the 33 scenarios in detail: 1. A small commercial OPT Power Buoy project off the Humboldt County, California coast 2. A small commercial Pelamis Wave Power P-2 project off Makapu’u Point, Oahu, Hawaii 3. A pilot MCT SeaGen tidal project, sited in the Tacoma Narrows, Washington This framework document used information available from permitting documents that were written to support actual wave or tidal energy projects, but the results obtained here should not be confused with those of the permitting documents1. The main difference between this framework document and permitting documents of currently proposed pilot projects is that this framework identifies key environmental concerns and describes the next steps in addressing those concerns; permitting documents must identify effects, find or declare thresholds of significance, evaluate the effects against the thresholds, and find mitigation measures that will minimize or avoid the effects so they can be considered less-than-significant. Two methodologies, 1) an environmental effects analysis and 2) Raptools, were developed and tested to identify potential environmental effects associated with wave or tidal energy conversion projects. For the environmental effects analysis, we developed a framework based on standard risk assessment techniques. The framework was applied to the three scenarios listed above. The environmental effects analysis addressed questions such as: ? What is the temporal and spatial exposure of a species at a site? ? What are the specific potential project effects on that species? ? What measures could minimize, mitigate, or eliminate negative effects? ? Are there potential effects of the project, or species’ response to the effect, that are highly uncertain and warrant additional study? The second methodology, Raptools, is a collaborative approach useful for evaluating multiple characteristi

  20. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  1. Air toxics provisions of the Clean Air Act: Potential impacts on energy

    SciTech Connect (OSTI)

    Hootman, H.A.; Vernet, J.E.

    1991-11-01

    This report provides an overview of the provisions of the Clean Air Act and its Amendments of 1990 that identify hazardous air pollutant (HAP) emissions and addresses their regulation by the US Environmental Protection Agency (EPA). It defines the major energy sector sources of these HAPs that would be affected by the regulations. Attention is focused on regulations that would cover coke oven emissions; chromium emission from industrial cooling towers and the electroplating process; HAP emissions from tank vessels, asbestos-related activities, organic solvent use, and ethylene oxide sterilization; and emissions of air toxics from municipal waste combustors. The possible implications of Title III regulations for the coal, natural gas, petroleum, uranium, and electric utility industries are examined. The report discusses five major databases of HAP emissions: (1) TRI (EPA's Toxic Release Inventory); (2) PISCES (Power Plant Integrated Systems: Chemical Emissions Studies developed by the Electric Power Research Institute); (3) 1985 Emissions Inventory on volatile organic compounds (used for the National Acid Precipitation Assessment Program); (4) Particulate Matter Species Manual (EPA); and (5) Toxics Emission Inventory (National Aeronautics and Space Administration). It also offers information on emission control technologies for municipal waste combustors.

  2. Air toxics provisions of the Clean Air Act: Potential impacts on energy

    SciTech Connect (OSTI)

    Hootman, H.A.; Vernet, J.E.

    1991-11-01

    This report provides an overview of the provisions of the Clean Air Act and its Amendments of 1990 that identify hazardous air pollutant (HAP) emissions and addresses their regulation by the US Environmental Protection Agency (EPA). It defines the major energy sector sources of these HAPs that would be affected by the regulations. Attention is focused on regulations that would cover coke oven emissions; chromium emission from industrial cooling towers and the electroplating process; HAP emissions from tank vessels, asbestos-related activities, organic solvent use, and ethylene oxide sterilization; and emissions of air toxics from municipal waste combustors. The possible implications of Title III regulations for the coal, natural gas, petroleum, uranium, and electric utility industries are examined. The report discusses five major databases of HAP emissions: (1) TRI (EPA`s Toxic Release Inventory); (2) PISCES (Power Plant Integrated Systems: Chemical Emissions Studies developed by the Electric Power Research Institute); (3) 1985 Emissions Inventory on volatile organic compounds (used for the National Acid Precipitation Assessment Program); (4) Particulate Matter Species Manual (EPA); and (5) Toxics Emission Inventory (National Aeronautics and Space Administration). It also offers information on emission control technologies for municipal waste combustors.

  3. Bandwidth provisioning in infrastructure-based wireless networks employing directional antennas

    SciTech Connect (OSTI)

    Hasiviswanthan, Shiva; Zhao, Bo; Vasudevan, Sudarshan; Yrgaonkar, Bhuvan

    2009-01-01

    Motivated by the widespread proliferation of wireless networks employing directional antennas, we study the problem of provisioning bandwidth in such networks. Given a set of subscribers and one or more access points possessing directional antennas, we formalize the problem of orienting these antennas in two fundamental settings: (1) subscriber-centric, where the objective is to fairly allocate bandwidth among the subscribers and (2) provider-centric, where the objective is to maximize the revenue generated by satisfying the bandwidth requirements of subscribers. For both the problems, we first design algorithms for a network with only one access point working under the assumption that the number of antennas does not exceed the number of noninterfering channels. Using the well-regarded lexicographic max-min fair allocation as the objective for a subscriber-centric network, we present an optimum dynamic programming algorithm. For a provider-centric network, the allocation problem turns out to be NP-hard. We present a greedy heuristic based algorithm that guarantees almost half of the optimum revenue. We later enhance both these algorithms to operate in more general networks with multiple access points and no restrictions on the relative numbers of antennas and channels. A simulation-based evaluation using OPNET demonstrates the efficacy of our approaches and provides us further in insights into these problems.

  4. Provisioning a Multi-Tiered Data Staging Area for Extreme-Scale Machines

    SciTech Connect (OSTI)

    Prabhakar, Ramya A [ORNL; Vazhkudai, Sudharshan S [ORNL; Kim, Youngjae [ORNL; Butt, Ali R [Virginia Polytechnic Institute and State University (Virginia Tech); Li, Min [Virginia Polytechnic Institute and State University (Virginia Tech); Kandemir, Mahmut [Pennsylvania State University

    2011-01-01

    Massively parallel scientific applications, running on extreme-scale supercomputers, produce hundreds of terabytes of data per run, driving the need for storage solutions to improve their I/O performance. Traditional parallel file systems (PFS) in high performance computing (HPC) systems are unable to keep up with such high data rates, creating a storage wall. In this work, we present a novel multi-tiered storage architecture comprising hybrid node-local resources to construct a dynamic data staging area for extreme-scale machines. Such a staging ground serves as an impedance matching device between applications and the PFS. Our solution combines diverse resources (e.g., DRAM, SSD) in such a way as to approach the performance of the fastest component technology and the cost of the least expensive one. We have developed an automated provisioning algorithm that aids in meeting the checkpointing performance requirement of HPC applications, by using a least-cost storage configuration. We evaluate our approach using both an implementation on a large scale cluster and a simulation driven by six-years worth of Jaguar supercomputer job-logs, and show that our approach, by choosing an appropriate storage configuration, achieves 41.5% cost savings with only negligible impact on performance.

  5. Bearing options, including design and testing, for direct drive linear generators in wave energy converters 

    E-Print Network [OSTI]

    Caraher, Sarah

    2011-11-22

    The key focus of this research was to investigate the bearing options most suited to operation in a novel direct drive linear generator. This was done through bearing comparisons, modelling and testing. It is fundamental ...

  6. Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using "Omics" Citation Details In-Document Search Title: Unveiling Microbial Carbon Cycling...

  7. Introduction Soil compaction is the key physical feature that can prevent sustainable woodland

    E-Print Network [OSTI]

    Introduction Soil compaction is the key physical feature that can prevent sustainable woodland risk of physical instability and windthrow due to underdeveloped root systems. This Best Practice

  8. Key Benefits in Using Ethanol-Diesel Blends | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Benefits in Using Ethanol-Diesel Blends Key Benefits in Using Ethanol-Diesel Blends Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER...

  9. DATA NORMALIZATION : A KEY FOR STRUCTURAL HEALTH MONITORING

    SciTech Connect (OSTI)

    Farrar, C. R. (Charles R.); Sohn, H. (Hoon); Worden, K.

    2001-01-01

    Structural health monitoring (SHM) is the implementation of a damage detection strategy for aerospace, civil and mechanical engineering infrastructure. Typical damage experienced by this infrastructure might be the development of fatigue cracks, degradation of structural connections, or bearing wear in rotating machinery. For SHM strategies that rely on vibration response measurements, the ability to normalize the measured data with respect to varying operational and environmental conditions is essential if one is to avoid false-positive indications of damage. Examples of common normalization procedure include normalizing the response measurements by the measured inputs as is commonly done when extracting modal parameters. When environmental cycles influence the measured data, a temporal normalization scheme may be employed. This paper will summarize various strategies for performing this data normalization task. These strategies fall into two general classes: (1) Those employed when measures of the varying environmental and operational parameters are available; (2) Those employed when such measures are not available. Whenever data normalization is performed, one runs the risk that the damage sensitive features to be extracted from the data will be obscured by the data normalization procedure. This paper will summarize several normalization procedures that have been employed by the authors and issues that have arose when trying to implement them on experimental and numerical data.

  10. Author contributions: J.J.: Conception and design, Provision of study material, Collection and/or assembly of data; S.N.: Conception and design, Provision of study material, Collection and/or assembly of data, Data analysis and interpretation; D.N.: Colle

    E-Print Network [OSTI]

    Church, George M.

    /or assembly of data; N.B.: Conception and design, Data analysis and interpretation, Financial supportAuthor contributions: J.J.: Conception and design, Provision of study material, Collection and/or assembly of data; S.N.: Conception and design, Provision of study material, Collection and/or assembly

  11. STUDY OF HIGGS BOSON PRODUCTION IN BOSONIC DECAY CHANNELS AT THE LHC (INCLUDING OFF-SHELL PRODUCTION)

    E-Print Network [OSTI]

    Oda, Susumu; The ATLAS collaboration

    2015-01-01

    Experimental studies of the Higgs boson production in bosonic decay channels by the ATLAS and CMS experiments at the LHC are described in this paper. The Higgs boson was the last undiscovered particle in the Standard Model (SM) of particle physics. The bosonic decay channels include $\\gamma\\gamma$, $Z\\gamma$, $ZZ^*$, $WW^*$. In the $\\gamma\\gamma$, $Z\\gamma$ and $ZZ^*$ decay channels, the whole event topology can be reconstructed. The $Z\\gamma$ decay channel can be sensitive to exotic Higgs decay beyond the SM. Because of its large branching fraction, the $WW^*$ decay channel is adequate to study bosonic production. Off-shell production is considered to be sensitive to the total Higgs decay width. The bosonic decay channels are a key to probe the SM and beyond.

  12. ARM: Surface Radiation Measurement Quality Control testing, including climatologically configurable limits

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Yan Shi; Laura Riihimaki

    1994-01-07

    Surface Radiation Measurement Quality Control testing, including climatologically configurable limits

  13. ARM: Surface Radiation Measurement Quality Control testing, including climatologically configurable limits

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Yan Shi; Laura Riihimaki

    Surface Radiation Measurement Quality Control testing, including climatologically configurable limits

  14. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  15. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Na¨im Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  16. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  17. Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    (and tamper-resistance), limited computing power and memory space, inability to perform public challenges for communication security: no public-key cryptography can be used, only symmetric algorithms is that there is no communication overhead due to evolution of keys ­ this is important, since energy consumption for communication

  18. Band structures Optical absorption Summary Key concepts in Density Functional Theory (II)

    E-Print Network [OSTI]

    Botti, Silvana

    Band structures Optical absorption Summary Key concepts in Density Functional Theory (II) Kohn-Sham scheme, band structure and optical spectra Silvana Botti European Theoretical Spectroscopy Facility (ETSF, Belfast Key concepts in Density Functional Theory (II) Silvana Botti #12;Band structures Optical

  19. MOLECULAR PHYSICS, 2002, VOL. 100, NO. 11, 16591675 Key properties of monohalogen substituted phenols: interpretation

    E-Print Network [OSTI]

    Nguyen, Minh Tho

    MOLECULAR PHYSICS, 2002, VOL. 100, NO. 11, 1659±1675 Key properties of monohalogen substituted August 2001; accepted 31 December 2001) This paper is an attempt to bridge the key properties by Runge from coal tar [1] in 1834 and named pheÂnol by Gerhardt in 1843 [2] (see also Laurent [3

  20. FFT-Based Key Recovery for the Integral Attack Yosuke Todo

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FFT-Based Key Recovery for the Integral Attack Yosuke Todo NTT Secure Platform Laboratories Abstract. The integral attack is one of the most powerful attack against block ciphers. In this paper, we propose two new techniques for the integral attack, the FFT technique and the key concealment technique