Sample records for key provisions including

  1. The seamless provisioning of services and applications across heterogeneous wireless systems will play a key role in

    E-Print Network [OSTI]

    Havinga, Paul J.M.

    is scalable, is able to use the available resources efficiently (like network, energy, and money), and makes for seamless provision of mobile services over heterogeneous wireless networks. The SMART architecture the heterogeneous network transparent to, but nevertheless under control of the user. User-friendliness, security

  2. #include #include

    E-Print Network [OSTI]

    Campbell, Andrew T.

    process #12;#include #include pid_t pid = fork(); if (pid () failed */ } else if (pid == 0) { /* parent process */ } else { /* child process */ } #12;thread #12

  3. #include #include

    E-Print Network [OSTI]

    Poinsot, Laurent

    #include #include //Rappels : "getpid()" permet d'obtenir son propre pid // "getppid()" renvoie le pid du père d'un processus int main (void) { pid_t pid_fils; pid_fils = fork(); if(pid_fils==-1) { printf("Erreur de création du processus fils\

  4. Key to Juniperus of Central Asia (from Turkmenistan/Iran through the former Soviet rev. 2/2011 Union, Pakistan and the Western Himalayas, including Nepal)

    E-Print Network [OSTI]

    Adams, Robert P.

    /2011 Union, Pakistan and the Western Himalayas, including Nepal) 1a. All leaves acicular (subulate, jointed

  5. Growing Up in Scotland: Multiple Childcare Provision and its Effects on Child Outcomes - Summary Report

    E-Print Network [OSTI]

    Government, Scottish

    2009-03-18T23:59:59.000Z

    It presents key findings from the Growing Up in Scotland study (GUS) report Multiple Childcare Provision and its Effects on Child Outcomes....

  6. DOE Challenge Home Recommended Quality Management Provisions...

    Broader source: Energy.gov (indexed) [DOE]

    Recommended Quality Management Provisions DOE Challenge Home Recommended Quality Management Provisions DOE Challenge Home Recommended Quality Management Provisions. qm6-14-13.pdf...

  7. PROPOSED ENERGY PROVISIONS OF THE

    E-Print Network [OSTI]

    PROPOSED ENERGY PROVISIONS OF THE CALIFORNIA GREEN BUILDING STANDARDS CODE (UNMARKED) PART;Proposed Energy Provisions of the California Green Building Standards Code (Unmarked) Page 2 CHAPTER 4 N LY #12;Proposed Energy Provisions of the California Green Building Standards Code (Unmarked) Page

  8. SUMMARY OF CHANGES FOR THE CENTRAL AND SOUTHERN POTATO CROP PROVISIONS (09-0284)

    E-Print Network [OSTI]

    Goodman, Robert M.

    SUMMARY OF CHANGES FOR THE CENTRAL AND SOUTHERN POTATO CROP PROVISIONS (09-0284) The following, New Mexico, it has been included in the Northern Potato Crop Provisions. Language has been added to allow the inclusion of other states or counties to the Central and Southern Potato Crop Provisions

  9. Intellectual Property Provisions

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEtheInspection15 Intellectual Property Provisions (GSB-115) Grant

  10. Intellectual Property Provisions - Assistance

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEtheInspection15 Intellectual Property Provisions (GSB-115)

  11. Intellectual Property Provisions - Assistance

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEtheInspection15 Intellectual Property Provisions

  12. Intellectual Property Provisions - Assistance

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEtheInspection15 Intellectual Property ProvisionsNRD-115)

  13. PROPOSED ENERGY PROVISIONS OF THE

    E-Print Network [OSTI]

    PROPOSED ENERGY PROVISIONS OF THE CALIFORNIA GREEN BUILDING STANDARDS CODE PART 11 OF THE CALIFORNIA BUILDING CODE (also known as CalGreen) OCTOBER 2012 CEC400201201215DAY CALIFORNIA ENERGY;Proposed Energy Provisions of the California Green Building Standards Code Page 3 CHAPTER 4, RESIDENTIAL

  14. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: A key could be created by A and delivered physically

  15. UKERC ENERGY RESEARCH ATLAS: CARBON CAPTURE AND STORAGE (version 10 February 2008) Section 1: An overview which includes a broad characterisation of research activity in the sector and the key research challenges

    E-Print Network [OSTI]

    Haszeldine, Stuart

    UKERC ENERGY RESEARCH ATLAS: CARBON CAPTURE AND STORAGE (version 10 February 2008) Section 1 Research and Technology Development (RTD) Programmes. Section 8: UK participation in energy-related EU international initiatives, including those supported by the International Energy Agency. Version 1.2 published

  16. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  17. Intellectual Property Provisions (CDSB-115) Cooperative Agreement...

    Office of Environmental Management (EM)

    CDSB-115) Cooperative Agreement - Special Data Statute Research, Development, or Demonstration Domestic Small Business Intellectual Property Provisions (CDSB-115) Cooperative...

  18. Intellectual Property Provisions (CSB-1003) Cooperative Agreement...

    Energy Savers [EERE]

    003) Cooperative Agreement Research, Development, or Demonstration Domestic Small Businesses Intellectual Property Provisions (CSB-1003) Cooperative Agreement Research,...

  19. Reliable and efficient PUF-based key generation using pattern matching

    E-Print Network [OSTI]

    Paral, Zdenek (Sid)

    We describe a novel and efficient method to reliably provision and re-generate a finite and exact sequence of bits, for use with cryptographic applications, e.g., as a key, by employing one or more challengeable Physical ...

  20. Oil and Gas General Provisions (Montana)

    Broader source: Energy.gov [DOE]

    This chapter describes general provisions for the exploration and development of oil and gas resources in Montana. The chapter addresses royalty interests, regulations for the lease of local...

  1. Top Six Areawide Contract Provisions Forgotten

    Office of Environmental Management (EM)

    TOP SIX AREAWIDE CONTRACT PROVISIONS FORGOTTEN LINDA L. COLLINS Hosted by: FEDERAL UTILITY PARTNERSHIP WORKING GROUP SEMINAR November 5-6, 2014 Cape Canaveral. Florida ONE * Term...

  2. EPACT2005: Status of Provisions (Update) (released in AEO2007)

    Reports and Publications (EIA)

    2007-01-01T23:59:59.000Z

    The Energy Policy Act 2005 (EPACT) was signed into law by President Bush on August 8, 2005, and became Public Law 109-058. A number of provisions from EPACT2005 were included in the Annual Energy Outlook 2006 (AEO) projections. Many others were not considered in AEO2006particularly, those that require funding appropriations or further specification by federal agencies or Congress before implementation.

  3. Data Provision Instructions for All DOE Geothermal Technologies...

    Office of Environmental Management (EM)

    Data Provision Instructions for All DOE Geothermal Technologies Office Funds Recipients Data Provision Instructions for All DOE Geothermal Technologies Office Funds Recipients DATA...

  4. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  5. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  6. Democratic Institutions and Provision of Public Good

    E-Print Network [OSTI]

    Saha, Sarani

    2007-01-01T23:59:59.000Z

    2003. [3] R. T. Deacon and S. Saha. Public Good Provision byof a Public Good Sarani Saha PhD Candidate Donald Brenof a Public Good Sarani Saha PhD Candidate Donald Bren

  7. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  8. Autonomic Provisioning of Backend Databases in Dynamic Content Web Servers

    E-Print Network [OSTI]

    Amza, Cristiana

    to efficiently utilize available resources through dynamic resource allocation, i.e., on-demand provisioning

  9. Key Benefits for the M.Sc. Students A monthly stipend of 10,000/-

    E-Print Network [OSTI]

    Rahman, A.K.M. Ashikur

    for app development 24-hours graduate lab facilities with air condition Key Benefits for the M with air condition Key Benefits for the Ph.D. Students (Full Time) A monthly stipend of 30,000/- Tuition for app development 24-hours graduate lab facilities with air condition Provision for research visit

  10. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  11. Energy Independence and Security Act of 2007: Summary of Provisions (released in AEO2008)

    Reports and Publications (EIA)

    2008-01-01T23:59:59.000Z

    The Energy Independence and Security Act of 2007 was signed into law on December 19, 2007, and became Public Law 110-140. Provisions in EISA2007 that require funding appropriations to be implemented, whose impact is highly uncertain, or that require further specification by federal agencies or Congress are not included in Annual Energy Outlook 2008 (AEO). For example, the Energy Information Administration (EIA) does not try to anticipate policy responses to the many studies required by EISA2007, nor to predict the impact of research and development (R&D) funding authorizations included in the bill. Moreover, AEO2008 does not include any provision that addresses a level of detail beyond that modeled in the National Energy Modeling System (NEMS), which was used to develop the AEO2008 projections. AEO2008 addresses only those provisions in EISA2007 that establish specific tax credits, incentives, or standards.

  12. Page 1 of 6 MULTI-USE LIST FOR THE PROVISION OF SAP AND ENTERPRISE SYSTEMS

    E-Print Network [OSTI]

    Greenslade, Diana

    Page 1 of 6 MULTI-USE LIST FOR THE PROVISION OF SAP AND ENTERPRISE SYSTEMS RESOURCES Ref: 098 and implementation of business systems, including requirements specification, process analysis and design, business and metrics reporting, benchmarking, and surveying. Project and Program Management Including but not limited

  13. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  14. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  15. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance Trusted security policy routines Secure and authentic key storage

  16. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  17. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  18. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  19. HUMAN RESOURCES MANUAL SECTION 1: GENERAL PROVISIONS

    E-Print Network [OSTI]

    HUMAN RESOURCES MANUAL SECTION 1: GENERAL PROVISIONS 1 | P a g e S e c t i o n 1 Purpose The purpose of this Human Resources Manual is to: 1. Provide the personnel and payroll policies and procedures, regulations and benefits. 3. Establish requirements and instructions for submission of Human Resources System

  20. ACADEMIC INTEGRITY CODE 1 GENERAL PROVISIONS

    E-Print Network [OSTI]

    Droegemeier, Kelvin K.

    approve the Council's procedures as well as bylaws and membership requirements. The Integrity CouncilACADEMIC INTEGRITY CODE 1 GENERAL PROVISIONS 1.1 Basic Principle of Academic Integrity Academic integrity means honesty and responsibility in scholarship. Academic assignments exist to help students learn

  1. Dynamic Resource Provisioning Condor Week 2012

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    to the Grid Highly available facility Testbed for network and storage fabrics Condor is important part (JDEM analysis development, Grid Developers and Integration test stands, Storage/dCache Developers, LQCDFermiCloud Dynamic Resource Provisioning Condor Week 2012 Steven Timm timm@fnal.gov Fermilab Grid

  2. Internship Contract (Includes Practicum)

    E-Print Network [OSTI]

    Thaxton, Christopher S.

    Internship Contract (Includes Practicum) Student's name-mail: _________________________________________ Internship Agency Contact Agency Name: ____________________________________ Address-mail: __________________________________________ Location of Internship, if different from Agency: ________________________________________________ Copies

  3. How to discover the API key needed for table creation in the Provisioning

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtel Jump to:Pennsylvania:County, Wyoming: EnergyCareview|delete a

  4. Pump apparatus including deconsolidator

    DOE Patents [OSTI]

    Sonwane, Chandrashekhar; Saunders, Timothy; Fitzsimmons, Mark Andrew

    2014-10-07T23:59:59.000Z

    A pump apparatus includes a particulate pump that defines a passage that extends from an inlet to an outlet. A duct is in flow communication with the outlet. The duct includes a deconsolidator configured to fragment particle agglomerates received from the passage.

  5. Living Expenses (includes approximately

    E-Print Network [OSTI]

    Maroncelli, Mark

    & engineering programs All other programs Graduate: MBA/INFSY at Erie & Harrisburg (12 credits) Business Guarantee 3 (Does not include Dependents Costs4 ) Altoona, Berks, Erie, and Harrisburg 12-Month Estimated

  6. Energy Improvement and Extension Act of 2008: Summary of Provisions (released in AEO2009)

    Reports and Publications (EIA)

    2009-01-01T23:59:59.000Z

    The Emergency Economic Stabilization Act of 2008 (Public Law 110-343), which was signed into law on October 3, 2008, incorporates EIEA2008 in Division B. Provisions in EIEA2008 that require funding appropriations to be implemented, whose impact is highly uncertain or that require further specification by federal agencies or Congress, are not included in Annual Energy Outlook 2009.

  7. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  8. Intensive agriculture to semi-natural grassland: evaluating changes in ecosystem service provision to help determine costs and benefits of agri-environment schemes

    E-Print Network [OSTI]

    Horrocks, Claire Alice

    2013-11-28T23:59:59.000Z

    Intensive agriculture has led to an increase in production; however this has often coincided with a decline in the provision of other Ecosystem Services (ES). ES affected include those regulated by soil chemical, physical ...

  9. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  10. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  11. Intellectual Property Provisions (GDLB-115) Grant - Special Data...

    Office of Environmental Management (EM)

    GDLB-115) Grant - Special Data Statute Research, Development, or Demonstration Large Business and Foreign Entity Intellectual Property Provisions (GDLB-115) Grant - Special Data...

  12. Guidelines for Provision and Interchange of Geothermal Data Assets

    Broader source: Energy.gov [DOE]

    This document presents guidelines related to provision and interchange of data assets in the context of the National Geothermal Data System.

  13. Intellectual Property Provisions (GNP-115) Grant and Cooperative...

    Office of Environmental Management (EM)

    Intellectual Property Provisions (GNP-115) Grant and Cooperative Agreement Research, Development, or Demonstration Non-Federal Entity (State, Local government, Indian tribe,...

  14. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bru

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  15. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  16. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  17. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  18. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  19. AN EXAMINATION OF WOOD RECYCLING PROVISIONS IN NORTH AMERICAN GREEN

    E-Print Network [OSTI]

    American green building standards, with use of such materials awarded or specified. Construction-consumer materials shall be considered as recycled. In addition to reviewing provisions of various green building! ! ! AN EXAMINATION OF WOOD RECYCLING PROVISIONS IN NORTH AMERICAN GREEN BUILDING PROGRAMS DR. JIM

  20. Energy-Efficient Dynamic Capacity Provisioning in Server Farms

    E-Print Network [OSTI]

    Harchol-Balter, Mor

    Energy-Efficient Dynamic Capacity Provisioning in Server Farms Anshul Gandhi Varun Gupta Mor, either expressed or implied, of NSF. #12;Keywords: Server farms, Power management, Queueing theory #12;Abstract A central question in designing server farms today is how to efficiently provision the number

  1. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  2. American Recovery and Reinvestment Act of 2009: Summary of Provisions (released in AEO2010)

    Reports and Publications (EIA)

    2010-01-01T23:59:59.000Z

    The American Recovery and Reinvestment Act of 2009 (ARRA), signed into law in mid-February 2009, provides significant new federal funding, loan guarantees, and tax credits to stimulate investments in energy efficiency and renewable energy. The provisions of ARRA were incorporated initially as part of a revision to the Annual Energy Outlook 2009 Reference case that was released in April 2009, and they also are included in Annual Energy Outlook 2010.

  3. Edinburgh Research Explorer Reforming State Pension provision in `Liberal' Anglo Saxon

    E-Print Network [OSTI]

    Millar, Andrew J.

    Edinburgh Research Explorer Reforming State Pension provision in `Liberal' Anglo Saxon Countries, Vickerstaff, S & Loretto, W 2012, 'Reforming State Pension provision in `Liberal' Anglo Saxon Countries: Re University Press. Lain, D., Vickerstaff, S. & Loretto, W. 2012, "Reforming State Pension provision

  4. Advance Network Reservation and Provisioning for Science

    SciTech Connect (OSTI)

    Balman, Mehmet; Chaniotakis, Evangelos; Shoshani, Arie; Sim, Alex

    2009-07-10T23:59:59.000Z

    We are witnessing a new era that offers new opportunities to conduct scientific research with the help of recent advancements in computational and storage technologies. Computational intensive science spans multiple scientific domains, such as particle physics, climate modeling, and bio-informatics simulations. These large-scale applications necessitate collaborators to access very large data sets resulting from simulations performed in geographically distributed institutions. Furthermore, often scientific experimental facilities generate massive data sets that need to be transferred to validate the simulation data in remote collaborating sites. A major component needed to support these needs is the communication infrastructure which enables high performance visualization, large volume data analysis, and also provides access to computational resources. In order to provide high-speed on-demand data access between collaborating institutions, national governments support next generation research networks such as Internet 2 and ESnet (Energy Sciences Network). Delivering network-as-a-service that provides predictable performance, efficient resource utilization and better coordination between compute and storage resources is highly desirable. In this paper, we study network provisioning and advanced bandwidth reservation in ESnet for on-demand high performance data transfers. We present a novel approach for path finding in time-dependent transport networks with bandwidth guarantees. We plan to improve the current ESnet advance network reservation system, OSCARS [3], by presenting to the clients, the possible reservation options and alternatives for earliest completion time and shortest transfer duration. The Energy Sciences Network (ESnet) provides high bandwidth connections between research laboratories and academic institutions for data sharing and video/voice communication. The ESnet On-Demand Secure Circuits and Advance Reservation System (OSCARS) establishes guaranteed bandwidth of secure virtual circuits at a certain time, for a certain bandwidth and length of time. Though OSCARS operates within the ESnet, it also supplies end-to-end provisioning between multiple autonomous network domains. OSCARS gets reservation requests through a standard web service interface, and conducts a Quality-of-service (QoS) path for bandwidth guarantees. Multi-protocol Label Switching (MPLS) and the Resource Reservation Protocol (RSVP) enable to create a virtual circuit using Label Switched Paths (LSP's). It contains three main components: a reservation manager, a bandwidth scheduler, and a path setup subsystem. The bandwidth scheduler needs to have information about the current and future states of the network topology in order to accomplish end-to-end bandwidth guaranteed paths.

  5. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Bchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estve; S. Eydelman; E. Fanchini; C. Frber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Gbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gndara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugs; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefranois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Prez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  6. Advance Resource Provisioning in Bulk Data Scheduling

    SciTech Connect (OSTI)

    Balman, Mehmet

    2012-10-01T23:59:59.000Z

    Today?s scientific and business applications generate mas- sive data sets that need to be transferred to remote sites for sharing, processing, and long term storage. Because of increasing data volumes and enhancement in current net- work technology that provide on-demand high-speed data access between collaborating institutions, data handling and scheduling problems have reached a new scale. In this paper, we present a new data scheduling model with ad- vance resource provisioning, in which data movement operations are defined with earliest start and latest comple- tion times. We analyze time-dependent resource assign- ment problem, and propose a new methodology to improve the current systems by allowing researchers and higher-level meta-schedulers to use data-placement as-a-service, so they can plan ahead and submit transfer requests in advance. In general, scheduling with time and resource conflicts is NP-hard. We introduce an efficient algorithm to organize multiple requests on the fly, while satisfying users? time and resource constraints. We successfully tested our algorithm in a simple benchmark simulator that we have developed, and demonstrated its performance with initial test results.

  7. Contract Provisions and Ratchets: Utility Security or Customer Equity?

    E-Print Network [OSTI]

    Penkala, B. A.

    1987-01-01T23:59:59.000Z

    The contract provisions and ratchets contained in an electric utility's tariffs for commercial and industrial customers are often subjects of debate between the utility and its customers during regulatory proceedings. Although customers argue...

  8. Special Provisions Affecting Gas, Water, or Pipeline Companies (South Carolina)

    Broader source: Energy.gov [DOE]

    This legislation confers the rights and privileges of telegraph and telephone companies (S.C. Code 58-9) on pipeline and water companies, and contains several additional provisions pertaining to...

  9. Provisioning Virtual Private Networks under Traffic Uncertainty* A ...

    E-Print Network [OSTI]

    provisioning Virtual Private Networks (VPNs): given a set of terminals that ..... de m and satis f action by i m posing a unit fl ow between each oriented pair o f ter...

  10. Contract Provisions and Ratchets: Utility Security or Customer Equity?

    E-Print Network [OSTI]

    Penkala, B. A.

    CONTRACT PROVISIONS ANO RATCHETS: UTILITY SECURITY OR CUSTOMER EQUITY? BARBARA A. PENKALA Senior Research Analyst Houston Lighting & Power Company Houston. Texas ABSTRACT The contract provisions and ratchets con tained in an electric... of customers and the magnitude of the load served. A smaller part of the cost is dependent on kilowatt-hours. or energy supplied. The high investment required in the electric utility business relative to annual revenue has an important influence on price...

  11. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  12. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  13. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  14. Public Service Companies, General Provisions (Virginia)

    Broader source: Energy.gov [DOE]

    Public Service Companies includes gas, pipeline, electric light, heat, power and water supply companies, sewer companies, telephone companies, and all persons authorized to transport passengers or...

  15. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  16. Key regulatory drivers affecting shipments of mixed transuranic waste from Los Alamos National Laboratory to the Waste Isolation Pilot Plant

    SciTech Connect (OSTI)

    Schumann, P.B.; Bacigalupa, G.A.; Kosiewicz, S.T.; Sinkule, B.J. [and others

    1997-02-01T23:59:59.000Z

    A number of key regulatory drivers affect the nature, scope, and timing of Los Alamos National Laboratory`s (LANL`s) plans for mixed transuranic (MTRU) waste shipments to the Waste Isolation Pilot Plant (WIPP), which are planned to commence as soon as possible following WIPP`s currently anticipated November, 1997 opening date. This paper provides an overview of some of the key drivers at LANL, particularly emphasizing those associated with the hazardous waste component of LANL`s MTRU waste (MTRU, like any mixed waste, contains both a radioactive and a hazardous waste component). The key drivers discussed here derive from the federal Resource Conservation and Recovery Act (RCRA) and its amendments, including the Federal Facility Compliance Act (FFCAU), and from the New Mexico Hazardous Waste Act (NMHWA). These statutory provisions are enforced through three major mechanisms: facility RCRA permits; the New Mexico Hazardous Waste Management Regulations, set forth in the New Mexico Administrative Code, Title 20, Chapter 4, Part 1: and compliance orders issued to enforce these requirements. General requirements in all three categories will apply to MTRU waste management and characterization activities at both WIPP and LANL. In addition, LANL is subject to facility-specific requirements in its RCRA hazardous waste facility permit, permit conditions as currently proposed in RCRA Part B permit applications presently being reviewed by the New Mexico Environment Department (NNED), and facility-specific compliance orders related to MTRU waste management. Likewise, permitting and compliance-related requirements specific to WIPP indirectly affect LANL`s characterization, packaging, record-keeping, and transportation requirements for MTRU waste. LANL must comply with this evolving set of regulatory requirements to begin shipments of MTRU waste to WIPP in a timely fashion.

  17. Impact of Load Sharing on Provisioning Services with Consistency Requirements

    E-Print Network [OSTI]

    of ser- vices must provision their servers so that response times remain low even wheen demand is high. The total demand at a serving system is comprised of an aggregate of demands from multiple servicing algorithms provides upper bounds of the response times, and shows that greedy algorithms can reduce

  18. Dynamic Energy-Aware Capacity Provisioning for Cloud Computing Environments

    E-Print Network [OSTI]

    Boutaba, Raouf

    reduction in energy cost, while maintaining an acceptable average scheduling delay for individual tasksDynamic Energy-Aware Capacity Provisioning for Cloud Computing Environments Qi Zhang University by amortizing initial capital investment over large number of machines, they also incur tremendous energy cost

  19. Impact of Social Determinants on Health Care Provision

    E-Print Network [OSTI]

    von der Heydt, Rüdiger

    Perspective Presented by: Patricia M.C. Brown, Esq. 5/4/2012 #12;Health Care Reform: Two OverarchingImpact of Social Determinants on Health Care Provision Patty Brown, Es q., Pres ident of J ohns problems. 2 Approach to Session #12;· Patty Brown ­ Mission and Business Imperative for all health care

  20. Proposed Energy Provisions of the California Green Building Standards Code

    E-Print Network [OSTI]

    Proposed Energy Provisions of the California Green Building Standards Code Part 11 of the California Building Code (also known as CalGreen) Patrick Saxton, P.E. patrick.saxton@energy.ca.gov 916-651-0489 High Performance Buildings and Standards Development Office California Energy Commission September 20

  1. SEISMIC DESIGN PROVISIONS -THE CANADIAN HIGHWAY BRIDGE DESIGN CODE

    E-Print Network [OSTI]

    Bruneau, Michel

    in the 1994 American Association of State Highway and Transportation Officials Load and Resistance Factor Code in the 1994 American Association of State Highway and Transportation Officials Load and Resistance Factor CodeSEISMIC DESIGN PROVISIONS - THE CANADIAN HIGHWAY BRIDGE DESIGN CODE Denis MITCHELL Mc

  2. Energy-Constrained Provisioning for Scientific Workflow Ensembles

    E-Print Network [OSTI]

    Sakellariou, Rizos

    Energy-Constrained Provisioning for Scientific Workflow Ensembles Ilia Pietri, Maciej Malawski of Computer Science, U.K AGH University of Science and Technology, Dept. of Computer Science, Poland USC the problem of meeting energy constraints along with either budget or deadline constraints. We propose

  3. Security Provisioning in Pervasive Environments Using Multi-objective Optimization

    E-Print Network [OSTI]

    Ray, Indrakshi

    Security Provisioning in Pervasive Environments Using Multi-objective Optimization Rinku Dewri {rinku,iray,indrajit,whitley}@cs.colostate.edu Abstract. Pervasive computing applications involve applications. For example, if a communication is between a mobile de- vice and a base station

  4. Pay What You Want as Threshold Public Good Provision

    E-Print Network [OSTI]

    Mak, Vincent; Zwick, Rami; Rao, Akshay R.; Pattaratanakun, Jake A.

    2014-12-31T23:59:59.000Z

    ; feedback; market information PAY WHAT YOU WANT 2 Pay What You Want as Threshold Public Good Provision In a recent post on the Wikimedia Foundation website, Jimmy Wales, co-founder of Wikipedia, pleaded with users to donate to the website so...

  5. ENGINEERING JOURNAL / FIRST QUARTER / 2007 / 27 Seismic Provisions Reference

    E-Print Network [OSTI]

    Bruneau, Michel

    plate shear wall (SPSW) (a.k.a. special plate steel wall) is a lateral load resisting system consisting later, only the latter are allowed by the require- ments of the 2005 AISC Seismic Provisions for SPSW was considered to be out-of-plane buckling of the infill panel. To prevent buckling, engineers

  6. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  7. Asynchronous Coordination of Distributed Energy Resources for the Provisioning of Ancillary Services

    E-Print Network [OSTI]

    Hadjicostis, Christoforos

    Asynchronous Coordination of Distributed Energy Resources for the Provisioning of Ancillary the stability of asynchronous coordination protocols and studies their application to energy resource it towards energy resource provisioning of ancillary services in a power grid. I. INTRODUCTION The presence

  8. Quality Matters: Some Remarks on Internet Service Provisioning and Tariff Design

    E-Print Network [OSTI]

    Varaiya, Pravin

    Quality Matters: Some Remarks on Internet Service Provisioning and Tariff Design£ J¨orn AltmannÝ Bj on demand to derive some consequences for Internet service provisioning and tariff design. £This research

  9. Building Dynamic Models of Service Compositions with Simulation of Provision Resources

    E-Print Network [OSTI]

    Dustdar, Schahram

    Building Dynamic Models of Service Compositions with Simulation of Provision Resources Dragan compositions depends both on the composition structure, and on planning and management of compu- tational resources necessary for provision. Resource constraints on the service provider side have impact

  10. Countries Gasoline Prices Including Taxes

    Gasoline and Diesel Fuel Update (EIA)

    Selected Countries (U.S. dollars per gallon, including taxes) Date Belgium France Germany Italy Netherlands UK US 51115 6.15 6.08 6.28 6.83 6.96 6.75 3.06 5415 6.14 6.06...

  11. Sponsorship includes: Agriculture in the

    E-Print Network [OSTI]

    Nebraska-Lincoln, University of

    Sponsorship includes: · Agriculture in the Classroom · Douglas County Farm Bureau · Gifford Farm · University of Nebraska Agricultural Research and Development Center · University of Nebraska- Lincoln Awareness Coalition is to help youth, primarily from urban communities, become aware of agriculture

  12. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  13. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  14. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  15. Co-scheduling of network resource provisioning and host-to-host bandwidth reservation on high-performance network and storage systems

    DOE Patents [OSTI]

    Yu, Dantong; Katramatos, Dimitrios; Sim, Alexander; Shoshani, Arie

    2014-04-22T23:59:59.000Z

    A cross-domain network resource reservation scheduler configured to schedule a path from at least one end-site includes a management plane device configured to monitor and provide information representing at least one of functionality, performance, faults, and fault recovery associated with a network resource; a control plane device configured to at least one of schedule the network resource, provision local area network quality of service, provision local area network bandwidth, and provision wide area network bandwidth; and a service plane device configured to interface with the control plane device to reserve the network resource based on a reservation request and the information from the management plane device. Corresponding methods and computer-readable medium are also disclosed.

  16. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  17. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  18. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  19. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  20. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  1. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  2. On the security of some password-based key agreement schemes

    E-Print Network [OSTI]

    on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19

  3. Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates

    E-Print Network [OSTI]

    Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat the environmental correlates exert of the realized fitness of a species (Johnson and O'Neil 2001). They include

  4. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  5. Intellectual Property Provisions - Cooperative Agreement - Special Data Statute

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEtheInspection15 Intellectual Property ProvisionsNRD-115)15

  6. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both outcome and process goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the energy future. Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: What are the AFCI program goals? Which potential waste disposition approaches do we plan for? What are the major separations, transmutation, and fuel options? How do we address proliferation resistance? Which potential energy futures do we plan for? What potential external triggers do we plan for? Should we separate uranium? If we separate uranium, should we recycle it, store it or dispose of it? Is it practical to plan to fabricate and handle hot fuel? Which transuranic elements (TRU) should be separated and transmuted? Of those TRU separated, which should be transmuted together? Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? Should we separate and/or transmute very long-lived Tc and I isotopes? Which separation technology? What mix of transmutation technologies? What fuel technology best supports the above decisions?

  7. Montana MCA 75-20-104, Policy and General Provisions Definitions...

    Open Energy Info (EERE)

    4, Policy and General Provisions Definitions for Major Facility Siting Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation:...

  8. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  9. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  10. Directional learning and the provisioning of public goods

    E-Print Network [OSTI]

    Nax, Heinrich H

    2015-01-01T23:59:59.000Z

    We consider an environment where players are involved in a public goods game and must decide repeatedly whether to make an individual contribution or not. However, players lack strategically relevant information about the game and about the other players in the population. The resulting behavior of players is completely uncoupled from such information, and the individual strategy adjustment dynamics are driven only by reinforcement feedbacks from each player's own past. We show that the resulting "directional learning" is sufficient to explain cooperative deviations away from the Nash equilibrium. We introduce the concept of k-strong equilibria, which nest both the Nash equilibrium and the Aumann-strong equilibrium as two special cases, and we show that, together with the parameters of the learning model, the maximal k-strength of equilibrium determines the stationary distribution. The provisioning of public goods can be secured even under adverse conditions, as long as players are sufficiently responsive to ...

  11. TRUSTED COMPUTING TECHNOLOGIES AND THEIR USE IN THE PROVISION OF HIGH ASSURANCE SDR PLATFORMS

    E-Print Network [OSTI]

    Mitchell, Chris

    TRUSTED COMPUTING TECHNOLOGIES AND THEIR USE IN THE PROVISION OF HIGH ASSURANCE SDR PLATFORMS be leveraged to enable the provision of high assurance Software Defined Radio (SDR) platforms. 1. INTRODUCTION, a platform is trusted if it "behaves in an expected manner for an intended purpose" [2]. This does

  12. Building Dynamic Models of Service Compositions With Simulation of Provision Resources

    E-Print Network [OSTI]

    Politécnica de Madrid, Universidad

    Building Dynamic Models of Service Compositions With Simulation of Provision Resources Dragan of service compositions depends both on the composition structure, and on planning and management of compu- tational resources necessary for provision. Resource constraints on the service provider side have impact

  13. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  14. DCLL TBM Safety Assessment A key objective for ITER includes integrated testing of blanket concepts suitable for demonstrating fusion

    E-Print Network [OSTI]

    prototypical blanket modules into designated ports. Because ITER will be a licensed nuclear facility, occupation radiation exposure (ORE) analyzed, and decommissioning and waste disposal analysis performed

  15. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  16. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  17. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  18. Proposal for the award of a contract for the provision of maintenance services for electrical installations on the CERN site

    E-Print Network [OSTI]

    2014-01-01T23:59:59.000Z

    Proposal for the award of a contract for the provision of maintenance services for electrical installations on the CERN site

  19. Proposal for the award of a contract for the provision of maintenance services for CERN's telephone branch exchange

    E-Print Network [OSTI]

    2014-01-01T23:59:59.000Z

    Proposal for the award of a contract for the provision of maintenance services for CERN's telephone branch exchange

  20. Proposal for the award of a contract for the provision of maintenance services for industrial trucks on the CERN site

    E-Print Network [OSTI]

    2014-01-01T23:59:59.000Z

    Proposal for the award of a contract for the provision of maintenance services for industrial trucks on the CERN site

  1. Proposal for the award of a contract for the provision of civil engineering services on the CERN site

    E-Print Network [OSTI]

    2011-01-01T23:59:59.000Z

    Proposal for the award of a contract for the provision of civil engineering services on the CERN site

  2. Proposal for the award of a contract for the provision of civil engineering design services on the CERN site

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    Proposal for the award of a contract for the provision of civil engineering design services on the CERN site

  3. Proposal for the award of a contract for the provision of electrical installation services on the CERN site

    E-Print Network [OSTI]

    2015-01-01T23:59:59.000Z

    Proposal for the award of a contract for the provision of electrical installation services on the CERN site

  4. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  5. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  6. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  7. 2007 Wholesale Power Rate Schedules : 2007 General Rate Schedule Provisions.

    SciTech Connect (OSTI)

    United States. Bonneville Power Administration.

    2006-11-01T23:59:59.000Z

    This schedule is available for the contract purchase of Firm Power to be used within the Pacific Northwest (PNW). Priority Firm (PF) Power may be purchased by public bodies, cooperatives, and Federal agencies for resale to ultimate consumers, for direct consumption, and for Construction, Test and Start-Up, and Station Service. Rates in this schedule are in effect beginning October 1, 2006, and apply to purchases under requirements Firm Power sales contracts for a three-year period. The Slice Product is only available for public bodies and cooperatives who have signed Slice contracts for the FY 2002-2011 period. Utilities participating in the Residential Exchange Program (REP) under Section 5(c) of the Northwest Power Act may purchase Priority Firm Power pursuant to the Residential Exchange Program. Rates under contracts that contain charges that escalate based on BPA's Priority Firm Power rates shall be based on the three-year rates listed in this rate schedule in addition to applicable transmission charges. This rate schedule supersedes the PF-02 rate schedule, which went into effect October 1, 2001. Sales under the PF-07 rate schedule are subject to BPA's 2007 General Rate Schedule Provisions (2007 GRSPs). Products available under this rate schedule are defined in the 2007 GRSPs. For sales under this rate schedule, bills shall be rendered and payments due pursuant to BPA's 2007 GRSPs and billing process.

  8. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  9. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  10. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  11. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  12. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  13. Service Provision in Disconnected Mobile Ad hoc Networks Nicolas Le Sommer

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Service Provision in Disconnected Mobile Ad hoc Networks Nicolas Le Sommer Valoria Laboratory, University of South Brittany Nicolas.Le-Sommer@univ-ubs.fr Abstract With the proliferation of mobiles devices

  14. Volunteering for market-based environmental regulation : the substitution provision of the SO? emissions trading program

    E-Print Network [OSTI]

    Montero, Juan Pablo

    In this paper we explore the practical and welfare implications of a system of voluntary compliance within a market-based environmental regulation. The Substitution Provision of the SO2 emissions trading program allows the ...

  15. Attachment F: Summary Checklist of Model AIP Provisions and Program Policies

    Broader source: Energy.gov [DOE]

    In response to concerns expressed by DOE and State AIP program representatives, the Office of Environmental Activities has developed a list of mandatory and non-mandatory model language provisions...

  16. Analysis of Five Selected Tax Provisions of the Conference Energy Bill of 2003

    Reports and Publications (EIA)

    2004-01-01T23:59:59.000Z

    This special report was undertaken at the January 29, 2004, request of Senator John Sununu to perform an assessment of five specific tax provisions of the Conference Energy Bill of 2003.

  17. Estate-level facility provision and management in market-rate and resettlement coexisting housing compounds

    E-Print Network [OSTI]

    Bai, Jie, M.C.P. Massachusetts Institute of Technology

    2008-01-01T23:59:59.000Z

    Market-rate and resettlement coexisting housing compound (MRCHC) is a special model of mixed-income neighborhood merging with the dilapidated housing renewal in the major cities of China. The provision and management of ...

  18. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  19. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  20. The design and construction of a 10-amplifier analog computer with provisions for nuclear reactor simulation

    E-Print Network [OSTI]

    Cox, James Robert

    1959-01-01T23:59:59.000Z

    THE DESIGN AND CONSTRUCTION OF A 10-AMPLIFIER ANALOG COMPUTER WITH PROVISIONS FOR NUCLEAR REACTOR SIMULATION A Thesis by James Robert Cox Submitted to the Graduate School of the Agricultural and Mechanical College of Texas in partial... fulfillment of the requirements for the degree of MASTER OF SCIENCE August 1959 Major Subject: Ele ctr ical Engines r ing THE DESIGN AND CONSTRUCTION OF A 10-AMPLIFIER ANALOG COMPUTER WITH PROVISIONS FOR NUCLEAR REACTOR SIMULATION A The s is by Jame...

  1. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  2. Towards Scalable Cost-Effective Service and Survivability Provisioning in Ultra High Speed Networks

    SciTech Connect (OSTI)

    Bin Wang

    2006-12-01T23:59:59.000Z

    Optical transport networks based on wavelength division multiplexing (WDM) are considered to be the most appropriate choice for future Internet backbone. On the other hand, future DOE networks are expected to have the ability to dynamically provision on-demand survivable services to suit the needs of various high performance scientific applications and remote collaboration. Since a failure in aWDMnetwork such as a cable cut may result in a tremendous amount of data loss, efficient protection of data transport in WDM networks is therefore essential. As the backbone network is moving towards GMPLS/WDM optical networks, the unique requirement to support DOEs science mission results in challenging issues that are not directly addressed by existing networking techniques and methodologies. The objectives of this project were to develop cost effective protection and restoration mechanisms based on dedicated path, shared path, preconfigured cycle (p-cycle), and so on, to deal with single failure, dual failure, and shared risk link group (SRLG) failure, under different traffic and resource requirement models; to devise efficient service provisioning algorithms that deal with application specific network resource requirements for both unicast and multicast; to study various aspects of traffic grooming in WDM ring and mesh networks to derive cost effective solutions while meeting application resource and QoS requirements; to design various diverse routing and multi-constrained routing algorithms, considering different traffic models and failure models, for protection and restoration, as well as for service provisioning; to propose and study new optical burst switched architectures and mechanisms for effectively supporting dynamic services; and to integrate research with graduate and undergraduate education. All objectives have been successfully met. This report summarizes the major accomplishments of this project. The impact of the project manifests in many aspects: First, the project addressed many essential problems that arisen in current and future WDM optical networks, and provided a host of innovative solutions though there was no invention or patent filing. This project resulted in more than 2 dozens publications in major journals and conferences (including papers in IEEE Transactions and journals, as well as a book chapter). Our publications have been cited by many peer researchers. In particular, one of our conference papers was nominated for the best paper award of IEEE/Create-Net Broadnets (International Conference on Broadband Communications, Networks, and Systems) 2006. Second, the results and solutions of this project were well received by DOE Labs where presentations were given by the PI. We hope to continue the collaboration with DOE Labs in the future. Third, the project was the first to propose and extensively study multicast traffic grooming, new traffic models such as sliding scheduled traffic model and scheduled traffic model. Our research has sparkled a flurry of recent studies and publications by the research community in these areas. Fourth, the project has benefited a diverse population of students by motivating, engaging, enhancing their learning and skills. The project has been conducted in a manner conducive to the training of students both at graduate and undergraduate levels. As a result, one Ph.D., Dr. Abdur Billah, was graduated. Another Ph.D. student, Tianjian Li, will graduate in January 2007. In addition, four MS students were graduated. One undergraduate student, Jeffrey Alan Shininger, completed his university honors project. Fifth, thanks to the support of this ECPI project, the PI has obtained additional funding from the National Science Foundation, the Air Force Research Lab, and other sources. A few other proposals are pending. Finally, this project has also significantly impacted the curricula and resulted in the enhancement of courses at the graduate and undergraduate levels, therefore strengthening the bond between research and education.

  3. MHK technologies include current energy conversion

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    research leverages decades of experience in engineering and design and analysis (D&A) of wind power technologies, and its vast research complex, including high-performance...

  4. WRDA 2000 Specific Guidance (Click on hyperlinked provision. If provision is not hyperlinked, guidance is in the process of being developed)

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Partnership Program CWP Rubenstein 204 Ability to Pay CWP Shoudy 205 Property Protection Program CWO Lewis 206, guidance is in the process of being developed) Provision Subject Organization Person 101 a 2 Port of New Floodplain Management Requirements CWP Zwickl 210 Nonprofit Entities CWP Cummings 211 Performance

  5. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  6. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  7. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  8. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  9. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  10. Safety provisions for UF{sub 6} handling in the design of a new UF{sub 6} conversion plant

    SciTech Connect (OSTI)

    Bannister, S.P. [British Nuclear Fuels plc, Preston (United Kingdom)

    1991-12-31T23:59:59.000Z

    British Nuclear Fuels plc (BNFL) Fuel Division is currently undertaking the final design and construction of a new UF{sub 6} conversion plant at its production site at Springfields near Preston in the north of England. The Company has gained much experience in the handling of UF{sub 6} during operation of plants on site since 1961. The major hazard occurs during the liquefication cycle and the basis of the maximum credible incident scenario adopted for safety assessment and design purposes is discussed. This paper considers the design features which have been incorporated in the new plant to counter the hazards presented by the presence of UF{sub 6} in gaseous and liquid form and explains current thinking on operational procedures in areas of potential risk such as cylinder filling. The plant emergency response philosophy and systems are described and specific design provisions which have been included to satisfy the UK regulatory bodies are outlined in some detail.

  11. EE Regional Technology Roadmap Includes comparison

    E-Print Network [OSTI]

    EE Regional Technology Roadmap Includes comparison against 6th Power Plan (Update cyclically Data Clearinghouse BPA/RTF NEEA/Regional Programs Group Update Regional EE Technology Roadmap Lighting

  12. DIDACTICAL HOLOGRAPHIC EXHIBIT INCLUDING (HOLOGRAPHIC TELEVISION)

    E-Print Network [OSTI]

    de Aguiar, Marcus A. M.

    DIDACTICAL HOLOGRAPHIC EXHIBIT INCLUDING HoloTV (HOLOGRAPHIC TELEVISION) José J. Lunazzi , DanielCampinasSPBrasil Abstract: Our Institute of Physics exposes since 1980 didactical exhibitions of holography in Brazil where

  13. Sessions include: Beginning Farmer and Rancher

    E-Print Network [OSTI]

    Watson, Craig A.

    Sessions include: Beginning Farmer and Rancher New Markets and Regulations Food Safety Good Bug, Bad Bug ID Horticulture Hydroponics Livestock and Pastured Poultry Mushrooms Organic Live animal exhibits Saturday evening social, and Local foods Florida Small Farms and Alternative

  14. Gas storage materials, including hydrogen storage materials

    DOE Patents [OSTI]

    Mohtadi, Rana F; Wicks, George G; Heung, Leung K; Nakamura, Kenji

    2014-11-25T23:59:59.000Z

    A material for the storage and release of gases comprises a plurality of hollow elements, each hollow element comprising a porous wall enclosing an interior cavity, the interior cavity including structures of a solid-state storage material. In particular examples, the storage material is a hydrogen storage material, such as a solid state hydride. An improved method for forming such materials includes the solution diffusion of a storage material solution through a porous wall of a hollow element into an interior cavity.

  15. Gas storage materials, including hydrogen storage materials

    DOE Patents [OSTI]

    Mohtadi, Rana F; Wicks, George G; Heung, Leung K; Nakamura, Kenji

    2013-02-19T23:59:59.000Z

    A material for the storage and release of gases comprises a plurality of hollow elements, each hollow element comprising a porous wall enclosing an interior cavity, the interior cavity including structures of a solid-state storage material. In particular examples, the storage material is a hydrogen storage material such as a solid state hydride. An improved method for forming such materials includes the solution diffusion of a storage material solution through a porous wall of a hollow element into an interior cavity.

  16. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  17. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  18. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  19. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  20. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! Drivers should sit with at least

  1. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  2. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology Despite the focus here on global issues, we need to recognize that Mongolia

  3. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  4. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  5. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  6. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  7. Electric Power Monthly, August 1990. [Glossary included

    SciTech Connect (OSTI)

    Not Available

    1990-11-29T23:59:59.000Z

    The Electric Power Monthly (EPM) presents monthly summaries of electric utility statistics at the national, Census division, and State level. The purpose of this publication is to provide energy decisionmakers with accurate and timely information that may be used in forming various perspectives on electric issues that lie ahead. Data includes generation by energy source (coal, oil, gas, hydroelectric, and nuclear); generation by region; consumption of fossil fuels for power generation; sales of electric power, cost data; and unusual occurrences. A glossary is included.

  8. Communication in automation, including networking and wireless

    E-Print Network [OSTI]

    Antsaklis, Panos

    Communication in automation, including networking and wireless Nicholas Kottenstette and Panos J and networking in automation is given. Digital communication fundamentals are reviewed and networked control are presented. 1 Introduction 1.1 Why communication is necessary in automated systems Automated systems use

  9. Electrochemical cell including ribbed electrode substrates

    SciTech Connect (OSTI)

    Breault, R.D.; Goller, G.J.; Roethlein, R.J.; Sprecher, G.C.

    1981-07-21T23:59:59.000Z

    An electrochemical cell including an electrolyte retaining matrix layer located between and in contact with cooperating anode and cathode electrodes is disclosed herein. Each of the electrodes is comprised of a ribbed (or grooved) substrate including a gas porous body as its main component and a catalyst layer located between the substrate and one side of the electrolyte retaining matrix layer. Each substrate body includes a ribbed section for receiving reactant gas and lengthwise side portions on opposite sides of the ribbed section. Each of the side portions includes a channel extending along its entire length from one surface thereof (e.g., its outer surface) to but stopping short of an opposite surface (e.g., its inner surface) so as to provide a web directly between the channel and the opposite surface. Each of the channels is filled with a gas impervious substance and each of the webs is impregnated with a gas impervious substance so as to provide a gas impervious seal along the entire length of each side portion of each substrate and between the opposite faces thereof (e.g., across the entire thickness thereof).

  10. Prices include compostable serviceware and linen tablecloths

    E-Print Network [OSTI]

    California at Davis, University of

    & BLACK BEAN ENCHILADAS Fresh corn tortillas stuffed with tender brown butter sauted butternut squash, black beans and yellow on- ions, garnished with avocado and sour cream. $33 per person EDAMAME & CORN SQUASH & BLACK BEAN ENCHILADA FREE RANGE CHICK- EN SANDWICH PLATED ENTREES All plated entrees include

  11. Energy Consumption of Personal Computing Including Portable

    E-Print Network [OSTI]

    Namboodiri, Vinod

    Energy Consumption of Personal Computing Including Portable Communication Devices Pavel Somavat1 consumption, questions are being asked about the energy contribution of computing equipment. Al- though studies have documented the share of energy consumption by this type of equipment over the years, research

  12. Tax advantages of a deferred minimum annual royalty provision in oil and gas leases

    SciTech Connect (OSTI)

    Martin, R.B. Jr.

    1981-12-01T23:59:59.000Z

    This article describes how a deferred minimum annual royalty provision can serve to meet conflicting economic demands without adverse tax consequences. A deferred minimum annual royalty provision is an economic hybrid of a production royalty and a lease bonus. To a lessor, it has the advantage of guaranteeing a minimum return without regard to production. It should also encourage prompt development of the lease since a lessee will desire to void incurring subsequent minimum annual royalties on unproductive acreage. To an accrual-basis lessee, it has greater tax advantages than a lease bonus because it is deductible in the year paid or incurred. Although it exposes the lessee to more economic risk, this risk can be reduced through proper planning. In appropriate circumstances, a deferred minimum annual-royalty provision may therefore be worthy of consideration by either or both parties in an oil- and gas-leasing transaction. 44 references.

  13. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  14. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  15. Subterranean barriers including at least one weld

    DOE Patents [OSTI]

    Nickelson, Reva A.; Sloan, Paul A.; Richardson, John G.; Walsh, Stephanie; Kostelnik, Kevin M.

    2007-01-09T23:59:59.000Z

    A subterranean barrier and method for forming same are disclosed, the barrier including a plurality of casing strings wherein at least one casing string of the plurality of casing strings may be affixed to at least another adjacent casing string of the plurality of casing strings through at least one weld, at least one adhesive joint, or both. A method and system for nondestructively inspecting a subterranean barrier is disclosed. For instance, a radiographic signal may be emitted from within a casing string toward an adjacent casing string and the radiographic signal may be detected from within the adjacent casing string. A method of repairing a barrier including removing at least a portion of a casing string and welding a repair element within the casing string is disclosed. A method of selectively heating at least one casing string forming at least a portion of a subterranean barrier is disclosed.

  16. Power generation method including membrane separation

    DOE Patents [OSTI]

    Lokhandwala, Kaaeid A. (Union City, CA)

    2000-01-01T23:59:59.000Z

    A method for generating electric power, such as at, or close to, natural gas fields. The method includes conditioning natural gas containing C.sub.3+ hydrocarbons and/or acid gas by means of a membrane separation step. This step creates a leaner, sweeter, drier gas, which is then used as combustion fuel to run a turbine, which is in turn used for power generation.

  17. Rotor assembly including superconducting magnetic coil

    DOE Patents [OSTI]

    Snitchler, Gregory L. (Shrewsbury, MA); Gamble, Bruce B. (Wellesley, MA); Voccio, John P. (Somerville, MA)

    2003-01-01T23:59:59.000Z

    Superconducting coils and methods of manufacture include a superconductor tape wound concentrically about and disposed along an axis of the coil to define an opening having a dimension which gradually decreases, in the direction along the axis, from a first end to a second end of the coil. Each turn of the superconductor tape has a broad surface maintained substantially parallel to the axis of the coil.

  18. Electric power monthly, September 1990. [Glossary included

    SciTech Connect (OSTI)

    Not Available

    1990-12-17T23:59:59.000Z

    The purpose of this report is to provide energy decision makers with accurate and timely information that may be used in forming various perspectives on electric issues. The power plants considered include coal, petroleum, natural gas, hydroelectric, and nuclear power plants. Data are presented for power generation, fuel consumption, fuel receipts and cost, sales of electricity, and unusual occurrences at power plants. Data are compared at the national, Census division, and state levels. 4 figs., 52 tabs. (CK)

  19. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  20. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  1. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  2. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  3. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  4. 2000-32 V'B SAFETY PROVISIONS AND LPG

    E-Print Network [OSTI]

    Boyer, Edmond

    metres (m3 ) of LPG (exclusively butane and propane) not including the underground storage sites. Some 90% of these 95 sites were created between 1956 and 1975. These sites have over 300,000 m3 of storage capacity and 82 propane), 200 horizontal tanks and 2 vertical cryogenic tanks (35,000 and 20,000 m3

  5. Quantum key distribution over 25 km with an all-fiber continuous-variable system

    E-Print Network [OSTI]

    Jerome Lodewyck; Matthieu Bloch; Raul Garcia-Patron; Simon Fossier; Evgueni Karpov; Eleni Diamanti; Thierry Debuisschert; Nicolas J. Cerf; Rosa Tualle-Brouri; Steven W. McLaughlin; Philippe Grangier

    2007-09-04T23:59:59.000Z

    We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient LDPC error correcting codes.

  6. Quantum key distribution over 25 km with an all-fiber continuous-variable system

    SciTech Connect (OSTI)

    Lodewyck, Jerome; Fossier, Simon [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France); Laboratoire Charles Fabry de l'Institut d'Optique-CNRS-Universite Paris-Sud, Campus Polytechnique, RD 128, 91127 Palaiseau Cedex (France); Bloch, Matthieu; McLaughlin, Steven W. [GeorgiaTech-CNRS UMI 2958, 2-3 rue Marconi, 57070 Metz (France); Garcia-Patron, Raul; Karpov, Evgueni; Cerf, Nicolas J. [Centre for Quantum Information and Communication, Ecole Polytechnique, CP 165/59, Universite libre de Bruxelles, 50 av. F. D. Roosevelt, B-1050 Brussels (Belgium); Diamanti, Eleni; Tualle-Brouri, Rosa; Grangier, Philippe [Laboratoire Charles Fabry de l'Institut d'Optique-CNRS-Universite Paris-Sud, Campus Polytechnique, RD 128, 91127 Palaiseau Cedex (France); Debuisschert, Thierry [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France)

    2007-10-15T23:59:59.000Z

    We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient low-density parity check error correcting codes.

  7. Quantum key distribution using entangled-photon trains with no basis selection

    SciTech Connect (OSTI)

    Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan); NTT Basic Research Laboratories, NTT Corporation, Kanagawa 243-0198 (Japan); CREST, JST, Saitama 332-0012 (Japan); Takesue, Hiroki [NTT Basic Research Laboratories, NTT Corporation, Kanagawa 243-0198 (Japan); CREST, JST, Saitama 332-0012 (Japan)

    2006-03-15T23:59:59.000Z

    Conventional quantum key distribution (QKD) protocols include a basis selection process for providing a secure secret key. In contrast, this paper proposes an entanglement-based QKD with no basis selection procedure. Entangled-photon pulse trains with an average photon number less than one per pulse are sent to two legitimate parties, from which a secret key is created utilizing the entanglement nature. Eavesdropping on a transmission line is prevented by a condition of less than one photon per pulse, and sending classically correlated coherent pulses instead of quantum correlated ones is revealed by monitoring coincident count rate000.

  8. Multiverse rate equation including bubble collisions

    E-Print Network [OSTI]

    Michael P. Salem

    2013-02-19T23:59:59.000Z

    The volume fractions of vacua in an eternally inflating multiverse are described by a coarse-grain rate equation, which accounts for volume expansion and vacuum transitions via bubble formation. We generalize the rate equation to account for bubble collisions, including the possibility of classical transitions. Classical transitions can modify the details of the hierarchical structure among the volume fractions, with potential implications for the staggering and Boltzmann-brain issues. Whether or not our vacuum is likely to have been established by a classical transition depends on the detailed relationships among transition rates in the landscape.

  9. Upper bound on the secret key rate distillable from effective quantum correlations with imperfect detectors

    SciTech Connect (OSTI)

    Moroder, Tobias; Curty, Marcos; Luetkenhaus, Norbert [Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck Research Group, Institute of Optics, Information and Photonics, Universitaet Erlangen-Nuernberg, Staudtstrasse 7/B2, 91058 Erlangen (Germany)

    2006-01-15T23:59:59.000Z

    We provide a simple method to obtain an upper bound on the secret key rate that is particularly suited to analyze practical realizations of quantum key distribution protocols with imperfect devices. We consider the so-called trusted device scenario where Eve cannot modify the actual detection devices employed by Alice and Bob. The upper bound obtained is based on the available measurements results, but it includes the effect of the noise and losses present in the detectors of the legitimate users.

  10. Community Assessment Tool for Public Health Emergencies Including Pandemic Influenza

    SciTech Connect (OSTI)

    ORAU's Oak Ridge Institute for Science Education (HCTT-CHE)

    2011-04-14T23:59:59.000Z

    The Community Assessment Tool (CAT) for Public Health Emergencies Including Pandemic Influenza (hereafter referred to as the CAT) was developed as a result of feedback received from several communities. These communities participated in workshops focused on influenza pandemic planning and response. The 2008 through 2011 workshops were sponsored by the Centers for Disease Control and Prevention (CDC). Feedback during those workshops indicated the need for a tool that a community can use to assess its readiness for a disaster - readiness from a total healthcare perspective, not just hospitals, but the whole healthcare system. The CAT intends to do just that - help strengthen existing preparedness plans by allowing the healthcare system and other agencies to work together during an influenza pandemic. It helps reveal each core agency partners (sectors) capabilities and resources, and highlights cases of the same vendors being used for resource supplies (e.g., personal protective equipment [PPE] and oxygen) by the partners (e.g., public health departments, clinics, or hospitals). The CAT also addresses gaps in the community's capabilities or potential shortages in resources. This tool has been reviewed by a variety of key subject matter experts from federal, state, and local agencies and organizations. It also has been piloted with various communities that consist of different population sizes, to include large urban to small rural communities.

  11. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  12. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  13. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  14. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  15. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  16. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  17. Impacts of Selected Provisions of the "Agriculture Reform, Food and Jobs

    E-Print Network [OSTI]

    Noble, James S.

    May 2012 Impacts of Selected Provisions of the "Agriculture Reform, Food and Agricultural Policy Research Institute (FAPRI) at the University of Missouri (MU), 101 Park DeVille Drive, Suite E; Columbia, MO 65203. FAPRI­MU is part of the College of Agriculture, Food and Natural Resources

  18. On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients

    E-Print Network [OSTI]

    On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients Arthur Gervais , Ghassan Lightweight Bitcoin clients are gaining increasing adoption among Bitcoin users, owing to their reduced as they are only required to download and verify a part of the block chain--thus supporting the usage of Bitcoin

  19. Amendment 80 vessel replacement 1 Implementation and of Amendment 80 Vessel Replacement Provisions

    E-Print Network [OSTI]

    Amendment 80 vessel replacement 1 Implementation and of Amendment 80 Vessel Replacement Provisions vessels to use non-qualifying vessels in the sector, thus allowing replacement of a lost qualifying vessel of the CRP ambiguous as to whether replacement of qualifying vessels with non-qualifying vessels

  20. Provisioning Protected Resource Sharing in Multi-Hop Wireless E-yong Kim1

    E-Print Network [OSTI]

    Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks E-yong Kim1 Hwangnam Kim2 a protection framework for resource sharing to promote cooperation among nodes in multi-hop wireless networks. In the resource sharing protocol, a node claims cred- its when it relays others' packets. A node also issues

  1. Optimal Provisioning of Elastic Service Availability Dahai Xu Ying Li Mung Chiang A. Robert Calderbank

    E-Print Network [OSTI]

    Papadopouli, Maria

    Optimal Provisioning of Elastic Service Availability Dahai Xu Ying Li Mung Chiang A. Robert University, NJ 08544, USA Abstract-- Service availability is one of the most closely scruti- nized metrics higher service availability at the cost of higher operational expense. It is important to cost

  2. Energy Provisions of the California Green Building Standards Code Page 2 CHAPTER 4, RESIDENTIAL MANDATORY MEASURES

    E-Print Network [OSTI]

    Energy Provisions of the California Green Building Standards Code Page 2 CHAPTER 4, RESIDENTIAL of the California Green Building Standards Code Page 3 APPENDIX A4, RESIDENTIAL VOLUNTARY MEASURES APPENDIX A4 of the California Green Building Standards Code Page 4 1. Night lights which comply with Title 24, Part 6 Section

  3. An Energy and Deadline Aware Resource Provisioning, Scheduling and Optimization Framework for Cloud Systems

    E-Print Network [OSTI]

    Pedram, Massoud

    An Energy and Deadline Aware Resource Provisioning, Scheduling and Optimization Framework for Cloud demand for low-cost, high performance, and energy-efficient computing. In this large-scale, heterogeneous the sense of lowering operation costs by maximizing energy efficiency, while satisfying user deadlines

  4. Coordination and Control of Distributed Energy Resources for Provision of Ancillary Services

    E-Print Network [OSTI]

    Liberzon, Daniel

    Coordination and Control of Distributed Energy Resources for Provision of Ancillary Services--This paper discusses the utilization of distributed energy resources on the distribution side of the power side of a power system, it has been ac- knowledged that there exist many distributed energy resources

  5. PERFORMANCE-RELATED SPECIAL PROVISION FOR HIGH PERFORMANCE CONCRETE MIX DESIGNS FOR CONCRETE SUPERSTRUCTURE (Tollway)

    E-Print Network [OSTI]

    PERFORMANCE-RELATED SPECIAL PROVISION FOR HIGH PERFORMANCE CONCRETE MIX DESIGNS FOR CONCRETE of designing and furnishing high performance portland cement concrete for special applications to the decks the Illinois Tollway with a methodology to assure high quality concrete with reduced shrinkage potential, while

  6. Cost-aware Cooperative Resource Provisioning for Heterogeneous Workloads in Data Centers

    E-Print Network [OSTI]

    Shi, Weisong

    1 Cost-aware Cooperative Resource Provisioning for Heterogeneous Workloads in Data Centers Jianfeng-scale deployments [20] [29]. However, high-scale data center cost is very high, e.g., it was reported in Amazon [29] that the cost of a hosting data center with 15 megawatt (MW) power facility is high as $5.6 M per month. High

  7. Poverty measurement, spatial prices, and public goods provision Theory and evidence from rural India

    E-Print Network [OSTI]

    Bandyopadhyay, Antar

    Poverty measurement, spatial prices, and public goods provision Theory and evidence from rural India Anders Kjelsrud November, 2014 Abstract Official poverty estimates in India account for regional--meaning that a more simple poverty measurement regime that uses one common rural poverty line for every Indian state

  8. Comparison of House and Senate Clean Energy Deployment Administration (CEDA) provisions

    E-Print Network [OSTI]

    Laughlin, Robert B.

    Comparison of House and Senate Clean Energy Deployment Administration (CEDA) provisions What is CEDA? Both the American Clean Energy Leadership Act of 2009 (ACELA) in the Senate and Subtitle J- Nuclear and Advanced Technologies of the American Clean Energy and Security Act (H.R. 2454) in the House

  9. SLA-Oriented Resource Provisioning for Cloud Computing: Challenges, Architecture, and Solutions

    E-Print Network [OSTI]

    Calheiros, Rodrigo N.

    SLA-Oriented Resource Provisioning for Cloud Computing: Challenges, Architecture, and Solutions Rajkumar Buyya1,2 , Saurabh Kumar Garg1 , and Rodrigo N. Calheiros1 1 Cloud Computing and Distributed Systems (CLOUDS) Laboratory Department of Computing and Information Systems The University of Melbourne

  10. Seismic Screening, Evaluation, Rehabilitation, and Design Provisions for Wood-Framed Structures

    E-Print Network [OSTI]

    Gupta, Rakesh

    Seismic Screening, Evaluation, Rehabilitation, and Design Provisions for Wood-Framed Structures Preston Baxter, M.ASCE1 ; Thomas H. Miller, M.ASCE2 ; and Rakesh Gupta, M.ASCE3 Abstract: Seismic Database subject headings: Seismic analysis; Seismic design; Wood structures; Shear walls; Diaphragms

  11. Optical panel system including stackable waveguides

    DOE Patents [OSTI]

    DeSanto, Leonard (Dunkirk, MD); Veligdan, James T. (Manorville, NY)

    2007-11-20T23:59:59.000Z

    An optical panel system including stackable waveguides is provided. The optical panel system displays a projected light image and comprises a plurality of planar optical waveguides in a stacked state. The optical panel system further comprises a support system that aligns and supports the waveguides in the stacked state. In one embodiment, the support system comprises at least one rod, wherein each waveguide contains at least one hole, and wherein each rod is positioned through a corresponding hole in each waveguide. In another embodiment, the support system comprises at least two opposing edge structures having the waveguides positioned therebetween, wherein each opposing edge structure contains a mating surface, wherein opposite edges of each waveguide contain mating surfaces which are complementary to the mating surfaces of the opposing edge structures, and wherein each mating surface of the opposing edge structures engages a corresponding complementary mating surface of the opposite edges of each waveguide.

  12. Optical panel system including stackable waveguides

    DOE Patents [OSTI]

    DeSanto, Leonard; Veligdan, James T.

    2007-03-06T23:59:59.000Z

    An optical panel system including stackable waveguides is provided. The optical panel system displays a projected light image and comprises a plurality of planar optical waveguides in a stacked state. The optical panel system further comprises a support system that aligns and supports the waveguides in the stacked state. In one embodiment, the support system comprises at least one rod, wherein each waveguide contains at least one hole, and wherein each rod is positioned through a corresponding hole in each waveguide. In another embodiment, the support system comprises at least two opposing edge structures having the waveguides positioned therebetween, wherein each opposing edge structure contains a mating surface, wherein opposite edges of each waveguide contain mating surfaces which are complementary to the mating surfaces of the opposing edge structures, and wherein each mating surface of the opposing edge structures engages a corresponding complementary mating surface of the opposite edges of each waveguide.

  13. Thermovoltaic semiconductor device including a plasma filter

    DOE Patents [OSTI]

    Baldasaro, Paul F. (Clifton Park, NY)

    1999-01-01T23:59:59.000Z

    A thermovoltaic energy conversion device and related method for converting thermal energy into an electrical potential. An interference filter is provided on a semiconductor thermovoltaic cell to pre-filter black body radiation. The semiconductor thermovoltaic cell includes a P/N junction supported on a substrate which converts incident thermal energy below the semiconductor junction band gap into electrical potential. The semiconductor substrate is doped to provide a plasma filter which reflects back energy having a wavelength which is above the band gap and which is ineffectively filtered by the interference filter, through the P/N junction to the source of radiation thereby avoiding parasitic absorption of the unusable portion of the thermal radiation energy.

  14. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  15. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  16. Engine lubrication circuit including two pumps

    DOE Patents [OSTI]

    Lane, William H.

    2006-10-03T23:59:59.000Z

    A lubrication pump coupled to the engine is sized such that the it can supply the engine with a predetermined flow volume as soon as the engine reaches a peak torque engine speed. In engines that operate predominately at speeds above the peak torque engine speed, the lubrication pump is often producing lubrication fluid in excess of the predetermined flow volume that is bypassed back to a lubrication fluid source. This arguably results in wasted power. In order to more efficiently lubricate an engine, a lubrication circuit includes a lubrication pump and a variable delivery pump. The lubrication pump is operably coupled to the engine, and the variable delivery pump is in communication with a pump output controller that is operable to vary a lubrication fluid output from the variable delivery pump as a function of at least one of engine speed and lubrication flow volume or system pressure. Thus, the lubrication pump can be sized to produce the predetermined flow volume at a speed range at which the engine predominately operates while the variable delivery pump can supplement lubrication fluid delivery from the lubrication pump at engine speeds below the predominant engine speed range.

  17. Models of Procyon A including seismic constraints

    E-Print Network [OSTI]

    P. Eggenberger; F. Carrier; F. Bouchy

    2005-01-14T23:59:59.000Z

    Detailed models of Procyon A based on new asteroseismic measurements by Eggenberger et al (2004) have been computed using the Geneva evolution code including shellular rotation and atomic diffusion. By combining all non-asteroseismic observables now available for Procyon A with these seismological data, we find that the observed mean large spacing of 55.5 +- 0.5 uHz favours a mass of 1.497 M_sol for Procyon A. We also determine the following global parameters of Procyon A: an age of t=1.72 +- 0.30 Gyr, an initial helium mass fraction Y_i=0.290 +- 0.010, a nearly solar initial metallicity (Z/X)_i=0.0234 +- 0.0015 and a mixing-length parameter alpha=1.75 +- 0.40. Moreover, we show that the effects of rotation on the inner structure of the star may be revealed by asteroseismic observations if frequencies can be determined with a high precision. Existing seismological data of Procyon A are unfortunately not accurate enough to really test these differences in the input physics of our models.

  18. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  19. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  20. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  1. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  2. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  3. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  4. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  5. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  6. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  7. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  8. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  9. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  10. Divine Innovation: Religion and Service Provision by Religious Organizations in India

    E-Print Network [OSTI]

    Iyer, Sriya; Velu, Chander; Xue, Jun; Chakravarty, Tirthankar

    2011-03-31T23:59:59.000Z

    liberal organizations provide more education and health services, accounting perhaps for the paradoxical co-existence of a more prosperous economy and more service provision by religious organizations. We emphasize also that counter to some historical... can think of this say as education, health, employment, or other services that arise from membership of the organization). Again we think the poor will value these services more than the rich. In classic economic terms, this creates a game...

  11. Institutional processes affecting the provision of water resources for public recreational use in Texas

    E-Print Network [OSTI]

    Richardson, William Earl

    1975-01-01T23:59:59.000Z

    for the degree of MASTER OF SCIENCE December 1975 Major Subject: Recreation and Resources Development INSTITUTIONAL PROCESSES AFFECTING THE PROVISION OF WATER RESOURCES FOR PUBLIC RECREATIONAL USE IN TEXAS A Thesis by WILLIAM EARL RICHARDSON Approved... legislature for the conservation and development of the natural resources of the state. This study traced the legislative histories of legis- lation relating to the allocation of water resources for public recreational use. Additionally, the effects...

  12. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  13. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  14. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  15. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  16. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  17. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  18. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  19. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  20. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  1. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  2. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  3. Title III hazardous air pollutants

    SciTech Connect (OSTI)

    Todd, R.

    1995-12-31T23:59:59.000Z

    The author presents an overview of the key provisions of Title III of the Clean Air Act Amendments of 1990. The key provisions include the following: 112(b) -- 189 Hazardous Air Pollutants (HAP); 112(a) -- Major Source: 10 TPY/25 TPY; 112(d) -- Application of MACT; 112(g) -- Modifications; 112(I) -- State Program; 112(j) -- The Hammer; and 112(r) -- Accidental Release Provisions.

  4. UCSD Technical Report CS2012-0985, July, 2012 Battery Provisioning and Associated Costs for Data Center Power Capping

    E-Print Network [OSTI]

    Wang, Deli

    expenses, or capex) and monthly recur- ring operating expenses (opex) [19]. Capex costs are pro- portional both capex and opex costs. Power infrastructure is commonly over-provisioned in data centers

  5. Impact of seismic code provisions in the central U.S.: a performance evaluation of a reinforced concrete building

    E-Print Network [OSTI]

    Kueht, Erin

    2009-05-15T23:59:59.000Z

    The close proximity to the New Madrid Seismic Zone and the significant population and infrastructure presents a potentially substantial risk for central U.S. cities such as Memphis, Tennessee. However, seismic provisions in currently adopted Memphis...

  6. 630 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 5, JUNE 2010 Provisioning Mission-Critical Telerobotic Control

    E-Print Network [OSTI]

    Thompson, Michael

    ' since its inception [2]. To compound the problems, the US Federal Communication Commission (FCC) has630 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 5, JUNE 2010 Provisioning (ie communications (ie

  7. SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

  8. Heart Failure Symposium: Promoting Knowledge and Self-Care: The Keys to

    E-Print Network [OSTI]

    Kim, Duck O.

    Heart Failure Symposium: Promoting Knowledge and Self-Care: The Keys to a Woman's Healthy Heart This is the Fourth Annual UConn Health Center Heart Failure Symposium. This year we will focus on women and heart disease. The program will include presentations on heart disease and healthy living for women

  9. Measuring the erodibility of soil materials constituting earth embankments: a key input for dams and levees

    E-Print Network [OSTI]

    Boyer, Edmond

    Measuring the erodibility of soil materials constituting earth embankments: a key input for dams of hydraulic embankment structures, including earth embankment dams, levees and dykes, is a major concern all over the world. Still today, about one to two large dams fail every year and hundreds, probably

  10. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  11. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  12. Grandfathering provisions

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122 40 Buildingto17 3400, U.S.MajorMarketsNov-14 Dec-14 Jan-15Gas ReserveNational

  13. Proposal for the award of a contract for the provision of maintenance and operation services on cooling and ventilation installations on the CERN site

    E-Print Network [OSTI]

    2006-01-01T23:59:59.000Z

    This document concerns the award of a contract for maintenance and operation services of the cooling and ventilation installations on the CERN site. The Finance Committee is invited to agree to the negotiation of a contract with the consortium COFATHEC (UK) ?? SOTEB NATIONAL ELEKTRO (FR), the lowest bidder, for the provision of the maintenance and operation of the cooling and ventilation installations on the CERN site for three years for a total amount of 6 127 250 euros (9 588 819 Swiss francs), not subject to revision until 30 June 2009. The contract will include options for two one-year extensions beyond the initial three-year period. 2006/67/5/e

  14. QKD with finite resources: secret key rates via Rnyi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bru

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  15. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  16. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  17. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  18. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  19. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream cipher via one of the usual blockchaining methods). We use the publickey encryption

  20. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  1. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  2. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  3. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  4. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  5. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  6. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  7. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  8. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-06-09T23:59:59.000Z

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  9. Proposal for the award of a contract for the provision of high-speed data lines

    E-Print Network [OSTI]

    1999-01-01T23:59:59.000Z

    This document concerns the award of a contract for the provision of high-speed data lines of a capacity of 45Mbps to the USA for the use of CERN and a number of partners. These partners are: IN2P3 (FR), the US Department of Energy (DoE) through Caltech University, the Canadian high-energy physics community through Carleton University and the World Health Organisation. Taking advantage of the deregulation of the telecommunications market, a market survey was carried out among 18 firms in six Member States and a call for tenders (IT-2724/IT) was sent on 11 October 1999 to eight firms. By the closing date, CERN had received six tenders. The Finance Committee is invited to agree to the negotiation, on behalf of the partners, of a contract for the provision of high-speed data lines of a capacity of 45Mbps to the USA with KPN-QWEST (NL), the lowest bidder, for a total amount of 2 009 621 Swiss francs, renewable for one year, not subject to revision, of which CERN?s contribution will not exceed 400 000 Swiss francs.

  10. Determinants of efficiency in the provision of municipal street-cleaning and refuse collection services

    SciTech Connect (OSTI)

    Benito-Lopez, Bernardino, E-mail: benitobl@um.es [University of Murcia (Spain); Rocio Moreno-Enguix, Maria del, E-mail: mrmoreno@um.es [University of Murcia (Spain); Solana-Ibanez, Jose, E-mail: jsolana@um.es [University of Murcia (Spain)

    2011-06-15T23:59:59.000Z

    Effective waste management systems can make critical contributions to public health, environmental sustainability and economic development. The challenge affects every person and institution in society, and measures cannot be undertaken without data collection and a quantitative analysis approach. In this paper, the two-stage double bootstrap procedure of is used to estimate the efficiency determinants of Spanish local entities in the provision of public street-cleaning and refuse collection services. The purpose is to identify factors that influence efficiency. The final sample comprised 1072 municipalities. In the first stage, robust efficiency estimates are obtained with Data Envelopment Analysis (DEA). We apply the second stage, based on a truncated-regression, to estimate the effect of a group of environmental factors on DEA estimates. The results show the existence of a significant relation between efficiency and all the variables analysed (per capita income, urban population density, the comparative index of the importance of tourism and that of the whole economic activity). We have also considered the influence of a dummy categorical variable - the political sign of the governing party - on the efficient provision of the services under study. The results from the methodology proposed show that municipalities governed by progressive parties are more efficient.

  11. Proposal for the award of a contract for the provision of specialized maintenance service for hoisting equipment on the CERN site

    E-Print Network [OSTI]

    2014-01-01T23:59:59.000Z

    Proposal for the award of a contract for the provision of specialized maintenance service for hoisting equipment on the CERN site

  12. Proposal for the award of a contract for stores operation and provision of logistics-related activities on the CERN site

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    Proposal for the award of a contract for stores operation and provision of logistics-related activities on the CERN site

  13. Proposal for the award of a contract for the provision of third-party administration services for the CERN Health Insurance Scheme (CHIS)

    E-Print Network [OSTI]

    2014-01-01T23:59:59.000Z

    Proposal for the award of a contract for the provision of third-party administration services for the CERN Health Insurance Scheme (CHIS)

  14. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  15. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  16. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  17. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  18. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  19. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  20. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  1. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  2. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyyti, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  3. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  4. Nuclear Arms Control R&D Consortium includes Los Alamos

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Arms Control R&D Consortium includes Los Alamos Nuclear Arms Control R&D Consortium includes Los Alamos A consortium led by the University of Michigan that includes LANL as...

  5. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  6. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  7. A Roadmap to Success: Hiring, Retaining, and Including People...

    Broader source: Energy.gov (indexed) [DOE]

    A Roadmap to Success: Hiring, Retaining, and Including People with Disabilities A Roadmap to Success: Hiring, Retaining, and Including People with Disabilities December 5, 2014...

  8. [Article 1 of 7: Motivates and Includes the Consumer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and include the consumer exist. Some examples include advanced two-way metering (AMI), demand response (DR), and distributed energy resources (DER). A common misconception is...

  9. Including Retro-Commissioning in Federal Energy Savings Performance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Including Retro-Commissioning in Federal Energy Savings Performance Contracts Including Retro-Commissioning in Federal Energy Savings Performance Contracts Document describes...

  10. Investigations into the Nature of Halogen Bonding Including Symmetry...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    into the Nature of Halogen Bonding Including Symmetry Adapted Perturbation Theory Analyses. Investigations into the Nature of Halogen Bonding Including Symmetry Adapted...

  11. Design of a rural water provision system to decrease arsenic exposure in Bangladesh

    SciTech Connect (OSTI)

    Mathieu, Johanna

    2009-01-07T23:59:59.000Z

    Researchers at the Lawrence Berkeley National Laboratory have invented ARUBA (Arsenic Removal Using Bottom Ash) a material that effectively and affordably removes high concentrations of arsenic from contaminated groundwater. The technology is cost-effective because the substrate?bottom ash from coal fired power plants?is a waste material readily available in South Asia. During fieldwork in four sub-districts ofBangladesh, ARUBA reduced groundwater arsenic concentrations as high as 680 ppb to below the Bangladesh standard of 50 ppb. Key results from three trips in Bangladesh and one trip to Cambodia include (1) ARUBA removes more than half of the arsenic from contaminated water within the first five minutes of contact, andcontinues removing arsenic for 2-3 days; (2) ARUBA?s arsenic removal efficiency can be improved through fractionated dosing (adding a given amount of ARUBA in fractions versus all at once); (3) allowing water to first stand for two to three days followed by treatment with ARUBA produced final arsenic concentrations ten times lower than treating water directly out of the well; and (4) the amount of arsenic removed per gram of ARUBA is linearly related to the initial arsenic concentrationof the water. Through analysis of existing studies, observations, and informal interviews in Bangladesh, eight design strategies have been developed and used in the design of a low-cost, community-scale water treatment system that uses ARUBA to remove arsenic from drinking water. We have constructed, tested, and analyzed a scale version of the system. Experiments have shown that the system is capable of reducing high levels of arsenic (nearly 600 ppb) to below 50 ppb, while remaining affordable to people living on less than $2 per day. The system could be sustainably implemented as a public-private partnership in rural Bangladesh.

  12. KEY CONTROL Keys to University facilities are duplicated and issued by the

    E-Print Network [OSTI]

    Gering, Jon C.

    with incidents that may occur on or off campus. University Vehicles Vehicles may be scheduled by contacting. A number of vehicles, including vans and cars, are available for OFFICIAL USE ONLY. Requests should be made is open 7:30 a.m. to 1:00 a.m. daily to assist University vehicle operators with emergency road situations

  13. What every designated representative should know about Title IV and Title V enforcement provisions

    SciTech Connect (OSTI)

    Bischoff, C.A. [Gallagher and Kennedy, Phoenix, AZ (United States); Dayal, P. [Tucson Electric Power Co., Tucson, AZ (United States)

    1995-12-31T23:59:59.000Z

    Title IV of the Clean Air Act not only created a regulatory program unlike any other under the Clean Air Act, but also established a unique position--the designated representative--as an integral part of the program. The designated representative is required to meet certain basic obligations under Title IV, and a panoply of enforcement mechanisms are available to EPA in the event of noncompliance with these obligations. Also, because a designated representative may take on responsibilities under the permit provisions of Title V of the Clean Air Act, the designated representative can also be subject to an enforcement action for failure to comply with certain Title V permit requirements. This paper considers the basic definition of the designated representative under EPA`s Title IV and Title V regulations, identifies the responsibilities assigned to the designated representative, and then analyzes the enforcement mechanisms that may be applied to the designated representative if a regulatory responsibility has not been satisfied.

  14. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  15. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  16. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  17. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  18. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music by C.and model for the poetry of Edgar Bowers. From his earliest

  19. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Frhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  20. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rod

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  1. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  2. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  3. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Ltkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  4. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  5. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12; Introduction Platforms carrying acoustics Methods Applications What we have done Applications What we would like to do #12; Introduction Platforms carrying acoustics

  6. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  7. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    ystein Mary; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  8. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  9. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  10. acid analysis including: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nairn, John A. 12 A bottom-up analysis of including aviation within theEU's Emissions Trading Scheme Geosciences Websites Summary: A bottom-up analysis of including aviation...

  11. analysis including quantification: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ausloos 2004-12-31 29 A bottom-up analysis of including aviation within theEU's Emissions Trading Scheme Geosciences Websites Summary: A bottom-up analysis of including aviation...

  12. Biomarkers Core Lab Price List Does NOT Include

    E-Print Network [OSTI]

    Grishok, Alla

    v3102014 Biomarkers Core Lab Price List Does NOT Include Kit Cost PURCHASED by INVESTIGATOR/1/2013 Page 1 of 5 #12;Biomarkers Core Lab Price List Does NOT Include Kit Cost PURCHASED by INVESTIGATOR

  13. Example Retro-Commissioning Scope of Work to Include Services...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Retro-Commissioning Scope of Work to Include Services as Part of an ESPC Investment-Grade Audit Example Retro-Commissioning Scope of Work to Include Services as Part of an ESPC...

  14. Coal fly ash basins as an attractive nuisance to birds: Parental provisioning exposes nestlings to harmful trace elements

    E-Print Network [OSTI]

    Hopkins, William A.

    inhabiting settling impoundments receiving slurried ash from a coal-fired power plant located on the U. SCoal fly ash basins as an attractive nuisance to birds: Parental provisioning exposes nestlings Keywords: Coal fly ash basin Common Grackle Contaminants Quiscalus quiscala Selenium a b s t r a c t Birds

  15. A Power Provision and Capping Architecture for Large Scale Systems Yongpeng Liu, Hong Zhu, Kai Lu and Yongyan Liu

    E-Print Network [OSTI]

    Zhu, Hong

    whole system's total power consumption under budget. Two policies are designed and implemented to select amount of energy. According to the recent TOP500 list of high performance systems [2], the average powerA Power Provision and Capping Architecture for Large Scale Systems Yongpeng Liu, Hong Zhu, Kai Lu

  16. Provisioning Protected Resource Sharing in MultiHop Wireless Eyong Kim 1 Hwangnam Kim 2 Kunsoo Park 1

    E-Print Network [OSTI]

    Provisioning Protected Resource Sharing in MultiHop Wireless Networks Eyong Kim 1 Hwangnam Kim 2 a protection framework for resource sharing to promote cooperation among nodes in multihop wireless networks. In the resource sharing protocol, a node claims cred its when it relays others' packets. A node also issues

  17. EIR Charging Policy The University can charge a fee for the provision of information requested under the Environmental

    E-Print Network [OSTI]

    Glasgow, University of

    under the Environmental Information (Scotland) Regulations 2004. This policy is the UniversityEIR Charging Policy The University can charge a fee for the provision of information requested policy, the University will process the first 100 free of charge. Above the 100 threshold, fees

  18. Andy DuBois, ajd@lanl.gov and phone A key challenge in IS&T is extraction of information from

    E-Print Network [OSTI]

    for using emerging microparallelism, e.g. Cell processors and GPUs, for real-time and near to respond to key challenges of national interest, including cybersecurity, threat reduction, data from

  19. Grid Parity for Residential Photovoltaics in the United States: Key Drivers and Sensitivities; Preprint

    SciTech Connect (OSTI)

    Ong, S.; Denholm, P.; Clark, N.

    2012-08-01T23:59:59.000Z

    In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that electricity price rather than technical parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  20. Introduction to Small-Scale Wind Energy Systems (Including RETScreen...

    Open Energy Info (EERE)

    Introduction to Small-Scale Wind Energy Systems (Including RETScreen Case Study) (Webinar) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Introduction to Small-Scale...

  1. Laboratory Curiosity rover ChemCam team, including Los Alamos...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MEXICO, August 23, 2012-Members of the Mars Science Laboratory Curiosity rover ChemCam team, including Los Alamos National Laboratory scientists, squeezed in a little extra target...

  2. PLOT: A UNIX PROGRAM FOR INCLUDING GRAPHICS IN DOCUMENTS

    E-Print Network [OSTI]

    Curtis, Pavel

    2013-01-01T23:59:59.000Z

    simple, easy-to-read graphics language designed specificallyPROGRAM FOR INCLUDING GRAPHICS IN DOCUMENTS Pavel Curtismeanings as in the GRAFPAC graphics system. Definl. ~ tions

  3. analysis including plasma: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Assembly 2010 Space Plasmas in the Solar System, including Planetary Magnetospheres (D) Solar Variability, Cosmic Rays and Climate (D21) GEOMAGNETIC ACTIVITY AT HIGH-LATITUDE:...

  4. Energy Department Expands Gas Gouging Reporting System to Include...

    Energy Savers [EERE]

    Washington, DC - Energy Secretary Samuel W. Bodman announced today that the Department of Energy has expanded its gas gouging reporting system to include a toll-free telephone...

  5. arch dams including: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: insight into the gamut of shallow water waves, including kinematic, diffusion, dynamic, and gravity wavesDam-Breach Flood Wave Propagation Using...

  6. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rod; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  7. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  8. Connate Water Saturation -Irreducible or Not: the Key to Reliable Hydraulic Rock Typing in Reservoirs Straddling Multiple Capillary Windows

    E-Print Network [OSTI]

    Torres-Verdn, Carlos

    of flow capacity. High in-situ capillary pressure causes connate water saturation in reservoir rocks petrophysical analysis based solely on conventional logs, including gamma ray, neutron porosity, bulk densitySPE 166082 Connate Water Saturation - Irreducible or Not: the Key to Reliable Hydraulic Rock Typing

  9. BIOENERGY PROGRAM Agronomics is the science of soil management and the production of field crops. Key ele-

    E-Print Network [OSTI]

    Processing To meet United States Department of Energy projections, 110, 000 truckloads per day of feedstocksAgronomics BIOENERGY PROGRAM Agronomics is the science of soil management and the production of field crops. Key ele- ments of a production and delivery system include high-tonnage feedstocks, proven

  10. Associate editor: S. Pestka Functions of the cytoplasmic RNA sensors RIG-I and MDA-5: Key regulators of

    E-Print Network [OSTI]

    DeSalle, Rob

    Associate editor: S. Pestka Functions of the cytoplasmic RNA sensors RIG-I and MDA-5: Key York, NY, USA a b s t r a c ta r t i c l e i n f o Keywords: Antiviral innate immunity MDA-5 RIG been identified, which comprises the cytoplasmic sensors of viral nucleic acids, including MDA-5, RIG

  11. A Key to Common Caterpillar Pests of Vegetables

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  12. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. 2:00 p

  13. Articles which include chevron film cooling holes, and related processes

    DOE Patents [OSTI]

    Bunker, Ronald Scott; Lacy, Benjamin Paul

    2014-12-09T23:59:59.000Z

    An article is described, including an inner surface which can be exposed to a first fluid; an inlet; and an outer surface spaced from the inner surface, which can be exposed to a hotter second fluid. The article further includes at least one row or other pattern of passage holes. Each passage hole includes an inlet bore extending through the substrate from the inlet at the inner surface to a passage hole-exit proximate to the outer surface, with the inlet bore terminating in a chevron outlet adjacent the hole-exit. The chevron outlet includes a pair of wing troughs having a common surface region between them. The common surface region includes a valley which is adjacent the hole-exit; and a plateau adjacent the valley. The article can be an airfoil. Related methods for preparing the passage holes are also described.

  14. Provisioning a Multi-Tiered Data Staging Area for Extreme-Scale Machines

    SciTech Connect (OSTI)

    Prabhakar, Ramya A [ORNL; Vazhkudai, Sudharshan S [ORNL; Kim, Youngjae [ORNL; Butt, Ali R [Virginia Polytechnic Institute and State University (Virginia Tech); Li, Min [Virginia Polytechnic Institute and State University (Virginia Tech); Kandemir, Mahmut [Pennsylvania State University

    2011-01-01T23:59:59.000Z

    Massively parallel scientific applications, running on extreme-scale supercomputers, produce hundreds of terabytes of data per run, driving the need for storage solutions to improve their I/O performance. Traditional parallel file systems (PFS) in high performance computing (HPC) systems are unable to keep up with such high data rates, creating a storage wall. In this work, we present a novel multi-tiered storage architecture comprising hybrid node-local resources to construct a dynamic data staging area for extreme-scale machines. Such a staging ground serves as an impedance matching device between applications and the PFS. Our solution combines diverse resources (e.g., DRAM, SSD) in such a way as to approach the performance of the fastest component technology and the cost of the least expensive one. We have developed an automated provisioning algorithm that aids in meeting the checkpointing performance requirement of HPC applications, by using a least-cost storage configuration. We evaluate our approach using both an implementation on a large scale cluster and a simulation driven by six-years worth of Jaguar supercomputer job-logs, and show that our approach, by choosing an appropriate storage configuration, achieves 41.5% cost savings with only negligible impact on performance.

  15. Air toxics provisions of the Clean Air Act: Potential impacts on energy

    SciTech Connect (OSTI)

    Hootman, H.A.; Vernet, J.E.

    1991-11-01T23:59:59.000Z

    This report provides an overview of the provisions of the Clean Air Act and its Amendments of 1990 that identify hazardous air pollutant (HAP) emissions and addresses their regulation by the US Environmental Protection Agency (EPA). It defines the major energy sector sources of these HAPs that would be affected by the regulations. Attention is focused on regulations that would cover coke oven emissions; chromium emission from industrial cooling towers and the electroplating process; HAP emissions from tank vessels, asbestos-related activities, organic solvent use, and ethylene oxide sterilization; and emissions of air toxics from municipal waste combustors. The possible implications of Title III regulations for the coal, natural gas, petroleum, uranium, and electric utility industries are examined. The report discusses five major databases of HAP emissions: (1) TRI (EPA`s Toxic Release Inventory); (2) PISCES (Power Plant Integrated Systems: Chemical Emissions Studies developed by the Electric Power Research Institute); (3) 1985 Emissions Inventory on volatile organic compounds (used for the National Acid Precipitation Assessment Program); (4) Particulate Matter Species Manual (EPA); and (5) Toxics Emission Inventory (National Aeronautics and Space Administration). It also offers information on emission control technologies for municipal waste combustors.

  16. Air toxics provisions of the Clean Air Act: Potential impacts on energy

    SciTech Connect (OSTI)

    Hootman, H.A.; Vernet, J.E.

    1991-11-01T23:59:59.000Z

    This report provides an overview of the provisions of the Clean Air Act and its Amendments of 1990 that identify hazardous air pollutant (HAP) emissions and addresses their regulation by the US Environmental Protection Agency (EPA). It defines the major energy sector sources of these HAPs that would be affected by the regulations. Attention is focused on regulations that would cover coke oven emissions; chromium emission from industrial cooling towers and the electroplating process; HAP emissions from tank vessels, asbestos-related activities, organic solvent use, and ethylene oxide sterilization; and emissions of air toxics from municipal waste combustors. The possible implications of Title III regulations for the coal, natural gas, petroleum, uranium, and electric utility industries are examined. The report discusses five major databases of HAP emissions: (1) TRI (EPA's Toxic Release Inventory); (2) PISCES (Power Plant Integrated Systems: Chemical Emissions Studies developed by the Electric Power Research Institute); (3) 1985 Emissions Inventory on volatile organic compounds (used for the National Acid Precipitation Assessment Program); (4) Particulate Matter Species Manual (EPA); and (5) Toxics Emission Inventory (National Aeronautics and Space Administration). It also offers information on emission control technologies for municipal waste combustors.

  17. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  18. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  19. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  20. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  1. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  2. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  3. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  4. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  5. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  6. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  7. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  8. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  9. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  10. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jrgen Lemming, Poul Erik

  11. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  12. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C? amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  13. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  14. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  15. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  16. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  17. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  18. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  19. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  20. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  1. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  2. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  3. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  4. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  5. Turbomachine injection nozzle including a coolant delivery system

    DOE Patents [OSTI]

    Zuo, Baifang (Simpsonville, SC)

    2012-02-14T23:59:59.000Z

    An injection nozzle for a turbomachine includes a main body having a first end portion that extends to a second end portion defining an exterior wall having an outer surface. A plurality of fluid delivery tubes extend through the main body. Each of the plurality of fluid delivery tubes includes a first fluid inlet for receiving a first fluid, a second fluid inlet for receiving a second fluid and an outlet. The injection nozzle further includes a coolant delivery system arranged within the main body. The coolant delivery system guides a coolant along at least one of a portion of the exterior wall and around the plurality of fluid delivery tubes.

  6. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  7. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  8. [Article 1 of 7: Motivates and Includes the Consumer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    surges; the extra cost of these premium features can be included in the electric service contract. The Smart Grid will mitigate PQ events that originate in the transmission and...

  9. Including costs of supply chain risk in strategic sourcing decisions

    E-Print Network [OSTI]

    Jain, Avani

    2009-01-01T23:59:59.000Z

    Cost evaluations do not always include the costs associated with risks when organizations make strategic sourcing decisions. This research was conducted to establish and quantify the impact of risks and risk-related costs ...

  10. Limited Personal Use of Government Office Equipment including Information Technology

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-01-07T23:59:59.000Z

    The Order establishes requirements and assigns responsibilities for employees' limited personal use of Government resources (office equipment and other resources including information technology) within DOE, including NNSA. The Order is required to provide guidance on appropriate and inappropriate uses of Government resources. This Order was certified 04/23/2009 as accurate and continues to be relevant and appropriate for use by the Department. Certified 4-23-09. No cancellation.

  11. Hybrid powertrain system including smooth shifting automated transmission

    DOE Patents [OSTI]

    Beaty, Kevin D.; Nellums, Richard A.

    2006-10-24T23:59:59.000Z

    A powertrain system is provided that includes a prime mover and a change-gear transmission having an input, at least two gear ratios, and an output. The powertrain system also includes a power shunt configured to route power applied to the transmission by one of the input and the output to the other one of the input and the output. A transmission system and a method for facilitating shifting of a transmission system are also provided.

  12. H-D Substitution in Interstellar Solid Methanol: A Key Route for D Enrichment

    E-Print Network [OSTI]

    Akihiro Nagaoka; Naoki Watanabe; Akira Kouchi

    2005-03-28T23:59:59.000Z

    Deuterium enrichment of interstellar methanol is reproduced experimentally for the first time via grain-surface H-D substitution in solid methanol at an atomic D/H ratio of 0.1. Although previous gas-grain models successfully reproduce the deuterium enrichments observed in interstellar methanol molecules (D/H of up to 0.4, compared to the cosmic ratio of $\\sim 10^{-5})$, the models exclusively focus on deuterium fractionation resulting from the successive addition of atomic hydrogen/deuterium on CO. The mechanism proposed here represents a key route for deuterium enrichment that reproduces the high observed abundances of deuterated methanol, including multiple deuterations.

  13. Passive decoy-state quantum key distribution with practical light sources

    SciTech Connect (OSTI)

    Curty, Marcos [ETSI Telecomunicacion, Department of Signal Theory and Communications, University of Vigo, Campus Universitario, E-36310 Vigo (Pontevedra) (Spain); Ma, Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, N2L 3G1 Waterloo, Ontario (Canada); Qi, Bing [Center for Quantum Information and Quantum Control, Department of Physics and Department of Electrical and Computer Engineering, University of Toronto, M5S 3G4 Toronto, Ontario (Canada); Moroder, Tobias [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, N2L 3G1 Waterloo, Ontario (Canada); Quantum Information Theory Group, Institute of Theoretical Physics I, University of Erlangen-Nuernberg, D-91058 Erlangen (Germany); Max Planck Institute for the Science of Light, D-91058 Erlangen (Germany)

    2010-02-15T23:59:59.000Z

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. Although active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase-randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty et al., Opt. Lett. 34, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy-state setup with an infinite number of decoy settings. In this article we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photodetectors. In particular, we consider sources emitting thermal states, phase-randomized WCP, and strong coherent light in combination with several types of photodetectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photodetectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret key rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  14. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  15. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  16. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  17. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  18. Solar Energy Education. Renewable energy: a background text. [Includes glossary

    SciTech Connect (OSTI)

    Not Available

    1985-01-01T23:59:59.000Z

    Some of the most common forms of renewable energy are presented in this textbook for students. The topics include solar energy, wind power hydroelectric power, biomass ocean thermal energy, and tidal and geothermal energy. The main emphasis of the text is on the sun and the solar energy that it yields. Discussions on the sun's composition and the relationship between the earth, sun and atmosphere are provided. Insolation, active and passive solar systems, and solar collectors are the subtopics included under solar energy. (BCS)

  19. Methods of producing adsorption media including a metal oxide

    DOE Patents [OSTI]

    Mann, Nicholas R; Tranter, Troy J

    2014-03-04T23:59:59.000Z

    Methods of producing a metal oxide are disclosed. The method comprises dissolving a metal salt in a reaction solvent to form a metal salt/reaction solvent solution. The metal salt is converted to a metal oxide and a caustic solution is added to the metal oxide/reaction solvent solution to adjust the pH of the metal oxide/reaction solvent solution to less than approximately 7.0. The metal oxide is precipitated and recovered. A method of producing adsorption media including the metal oxide is also disclosed, as is a precursor of an active component including particles of a metal oxide.

  20. Metal vapor laser including hot electrodes and integral wick

    DOE Patents [OSTI]

    Ault, Earl R. (Livermore, CA); Alger, Terry W. (Tracy, CA)

    1995-01-01T23:59:59.000Z

    A metal vapor laser, specifically one utilizing copper vapor, is disclosed herein. This laser utilizes a plasma tube assembly including a thermally insulated plasma tube containing a specific metal, e.g., copper, and a buffer gas therein. The laser also utilizes means including hot electrodes located at opposite ends of the plasma tube for electrically exciting the metal vapor and heating its interior to a sufficiently high temperature to cause the metal contained therein to vaporize and for subjecting the vapor to an electrical discharge excitation in order to lase. The laser also utilizes external wicking arrangements, that is, wicking arrangements located outside the plasma tube.

  1. Metal vapor laser including hot electrodes and integral wick

    DOE Patents [OSTI]

    Ault, E.R.; Alger, T.W.

    1995-03-07T23:59:59.000Z

    A metal vapor laser, specifically one utilizing copper vapor, is disclosed herein. This laser utilizes a plasma tube assembly including a thermally insulated plasma tube containing a specific metal, e.g., copper, and a buffer gas therein. The laser also utilizes means including hot electrodes located at opposite ends of the plasma tube for electrically exciting the metal vapor and heating its interior to a sufficiently high temperature to cause the metal contained therein to vaporize and for subjecting the vapor to an electrical discharge excitation in order to lase. The laser also utilizes external wicking arrangements, that is, wicking arrangements located outside the plasma tube. 5 figs.

  2. Watson Library enhancements to include new service desk

    E-Print Network [OSTI]

    2008-01-01T23:59:59.000Z

    12/5/13 KU Libraries News: Watson Library enhancements to include new service desk www.lib.ku.edu/news/newservicedesk.shtml 1/1 Contact Us The University of Kansas Libraries Lawrence, KS 66045 (785) 864-8983 Copyright 2013 by the University... of Kansas Watson Library enhancements to include new service desk The University of Kansas Libraries is adding a new service desk to Watson Library to enhance the user experience and draw attention to new and existing resources. The desk, which...

  3. Thin film solar cell including a spatially modulated intrinsic layer

    DOE Patents [OSTI]

    Guha, Subhendu (Troy, MI); Yang, Chi-Chung (Troy, MI); Ovshinsky, Stanford R. (Bloomfield Hills, MI)

    1989-03-28T23:59:59.000Z

    One or more thin film solar cells in which the intrinsic layer of substantially amorphous semiconductor alloy material thereof includes at least a first band gap portion and a narrower band gap portion. The band gap of the intrinsic layer is spatially graded through a portion of the bulk thickness, said graded portion including a region removed from the intrinsic layer-dopant layer interfaces. The band gap of the intrinsic layer is always less than the band gap of the doped layers. The gradation of the intrinsic layer is effected such that the open circuit voltage and/or the fill factor of the one or plural solar cell structure is enhanced.

  4. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  5. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  6. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  7. Including Blind Students in Computer Science Through Access to Graphs

    E-Print Network [OSTI]

    Young, R. Michael

    Including Blind Students in Computer Science Through Access to Graphs Suzanne Balik, Sean Mealin SKetching tool, GSK, to provide blind and sighted people with a means to create, examine, and share graphs (node-link diagrams) in real-time. GSK proved very effective for one blind computer science student

  8. Bayesian hierarchical reconstruction of protein profiles including a digestion model

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Bayesian hierarchical reconstruction of protein profiles including a digestion model Pierre to recover the protein biomarkers content in a robust way. We will focus on the digestion step since and each branch to a molecular processing such as digestion, ionisation and LC-MS separation

  9. Biomass Potentials from California Forest and Shrublands Including Fuel

    E-Print Network [OSTI]

    Biomass Potentials from California Forest and Shrublands Including Fuel Reduction Potentials-04-004 February 2005 Revised: October 2005 Arnold Schwarzenegger, Governor, State of California #12;Biomass Tiangco, CEC Bryan M. Jenkins, University of California #12;Biomass Potentials from California Forest

  10. Optimal Energy Management Strategy including Battery Health through Thermal

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Optimal Energy Management Strategy including Battery Health through Thermal Management for Hybrid: Energy management strategy, Plug-in hybrid electric vehicles, Li-ion battery aging, thermal management, Pontryagin's Minimum Principle. 1. INTRODUCTION The interest for energy management strategy (EMS) of Hybrid

  11. Area of cooperation includes: Joint research and development on

    E-Print Network [OSTI]

    Buyya, Rajkumar

    Technologies August 2, 2006: HCL Technologies Ltd (HCL), India's leading global IT services company, has signed projects that are using this technology currently such as BioGrid in Japan, National Grid Service in UKArea of cooperation includes: · Joint research and development on Grid computing technologies

  12. Energy Transitions: A Systems Approach Including Marcellus Shale Gas Development

    E-Print Network [OSTI]

    Walter, M.Todd

    Energy Transitions: A Systems Approach Including Marcellus Shale Gas Development A Report Engineering) W. VA #12;Energy Transitions: A Systems Approach August 2011 version Page 2 Energy Transitions sources globally, some very strong short-term drivers of energy transitions reflect rising concerns over

  13. 1 INTRODUCTION A typical flexible pavement system includes four

    E-Print Network [OSTI]

    Zornberg, Jorge G.

    1 INTRODUCTION A typical flexible pavement system includes four distinct layers: asphalt concrete course in order to reduce costs or to minimize capil- lary action under the pavement. Figure 1: Cross-section of flexible pavement system (Muench 2006) Pavement distress may occur due to either traffic or environmental

  14. SAFETY AND HEALTH PROGRAM Including the Chemical Hygiene Plan

    E-Print Network [OSTI]

    Evans, Paul G.

    SAFETY AND HEALTH PROGRAM Including the Chemical Hygiene Plan Wisconsin Center for Applied, Technical Staff & Chemical Hygiene Officer kakupcho@wisc.edu 262-2982 Lab Facility Website http..........................................................................................................3 CHEMICAL HYGIENE PLAN III. Work-site Analysis and Hazard Identification 3.1 Hazardous Chemical

  15. HTS Conductor Design Issues Including Quench and Stability,

    E-Print Network [OSTI]

    HTS Conductor Design Issues Including Quench and Stability, AC Losses, and Fault Currents M. J objective and technical approach The purpose of this collaborative R&D project is an investigation of HTS conductor design optimization with emphasis on stability and protection issues for YBCO wires and coils

  16. Free Energy Efficiency Kit includes CFL light bulbs,

    E-Print Network [OSTI]

    Rose, Annkatrin

    Free Energy Efficiency Kit Kit includes CFL light bulbs, spray foam, low-flow shower head, and more for discounted energy assessments. FREE HOME ENERGY EFFICIENCY SEMINAR N e w R i ver L i g ht & Pow e r a n d W! Building Science 101 Presentation BPI Certified Building Professionals will present home energy efficiency

  17. DO NOT INCLUDE: flatten cardboard staples, tape & envelope windows ok

    E-Print Network [OSTI]

    Wolfe, Patrick J.

    / bottles Metal items other than cans/foil Napkins Paper towels Plastic bags Plastic films Plastic utensilsDO NOT INCLUDE: flatten cardboard staples, tape & envelope windows ok Aerosol cans Books Bottle, PDAs, inkjet cartridges, CFL bulbs (cushioned, sealed in plastic) computers, printers, printer

  18. cDNA encoding a polypeptide including a hevein sequence

    DOE Patents [OSTI]

    Raikhel, N.V.; Broekaert, W.F.; Namhai Chua; Kush, A.

    1993-02-16T23:59:59.000Z

    A cDNA clone (HEV1) encoding hevein was isolated via polymerase chain reaction (PCR) using mixed oligonucleotides corresponding to two regions of hevein as primers and a Hevea brasiliensis latex cDNA library as a template. HEV1 is 1,018 nucleotides long and includes an open reading frame of 204 amino acids.

  19. Perhaps federal research grants can include infrastructure costs.

    E-Print Network [OSTI]

    Sur, Mriganka

    Perhaps federal research grants can include infrastructure costs. There are signs to find favour in China, a country beset by similar problems. The particular structure of Indian science and healthystart-uppackages. The government could contribute to these costs. 487 NATURE|Vol 436|28 July 2005

  20. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Phillip Mills

    2012-02-01T23:59:59.000Z

    This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

  1. Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01T23:59:59.000Z

    "Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

  2. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  3. Comparison of Joint Modeling Approaches Including Eulerian Sliding Interfaces

    SciTech Connect (OSTI)

    Lomov, I; Antoun, T; Vorobiev, O

    2009-12-16T23:59:59.000Z

    Accurate representation of discontinuities such as joints and faults is a key ingredient for high fidelity modeling of shock propagation in geologic media. The following study was done to improve treatment of discontinuities (joints) in the Eulerian hydrocode GEODYN (Lomov and Liu 2005). Lagrangian methods with conforming meshes and explicit inclusion of joints in the geologic model are well suited for such an analysis. Unfortunately, current meshing tools are unable to automatically generate adequate hexahedral meshes for large numbers of irregular polyhedra. Another concern is that joint stiffness in such explicit computations requires significantly reduced time steps, with negative implications for both the efficiency and quality of the numerical solution. An alternative approach is to use non-conforming meshes and embed joint information into regular computational elements. However, once slip displacement on the joints become comparable to the zone size, Lagrangian (even non-conforming) meshes could suffer from tangling and decreased time step problems. The use of non-conforming meshes in an Eulerian solver may alleviate these difficulties and provide a viable numerical approach for modeling the effects of faults on the dynamic response of geologic materials. We studied shock propagation in jointed/faulted media using a Lagrangian and two Eulerian approaches. To investigate the accuracy of this joint treatment the GEODYN calculations have been compared with results from the Lagrangian code GEODYN-L which uses an explicit treatment of joints via common plane contact. We explore two approaches to joint treatment in the code, one for joints with finite thickness and the other for tight joints. In all cases the sliding interfaces are tracked explicitly without homogenization or blending the joint and block response into an average response. In general, rock joints will introduce an increase in normal compliance in addition to a reduction in shear strength. In the present work we consider the limiting case of stiff discontinuities that only affect the shear strength of the material.

  4. Multi-processor including data flow accelerator module

    DOE Patents [OSTI]

    Davidson, George S. (Albuquerque, NM); Pierce, Paul E. (Albuquerque, NM)

    1990-01-01T23:59:59.000Z

    An accelerator module for a data flow computer includes an intelligent memory. The module is added to a multiprocessor arrangement and uses a shared tagged memory architecture in the data flow computer. The intelligent memory module assigns locations for holding data values in correspondence with arcs leading to a node in a data dependency graph. Each primitive computation is associated with a corresponding memory cell, including a number of slots for operands needed to execute a primitive computation, a primitive identifying pointer, and linking slots for distributing the result of the cell computation to other cells requiring that result as an operand. Circuitry is provided for utilizing tag bits to determine automatically when all operands required by a processor are available and for scheduling the primitive for execution in a queue. Each memory cell of the module may be associated with any of the primitives, and the particular primitive to be executed by the processor associated with the cell is identified by providing an index, such as the cell number for the primitive, to the primitive lookup table of starting addresses. The module thus serves to perform functions previously performed by a number of sections of data flow architectures and coexists with conventional shared memory therein. A multiprocessing system including the module operates in a hybrid mode, wherein the same processing modules are used to perform some processing in a sequential mode, under immediate control of an operating system, while performing other processing in a data flow mode.

  5. Conversion of geothermal waste to commercial products including silica

    DOE Patents [OSTI]

    Premuzic, Eugene T. (East Moriches, NY); Lin, Mow S. (Rocky Point, NY)

    2003-01-01T23:59:59.000Z

    A process for the treatment of geothermal residue includes contacting the pigmented amorphous silica-containing component with a depigmenting reagent one or more times to depigment the silica and produce a mixture containing depigmented amorphous silica and depigmenting reagent containing pigment material; separating the depigmented amorphous silica and from the depigmenting reagent to yield depigmented amorphous silica. Before or after the depigmenting contacting, the geothermal residue or depigmented silica can be treated with a metal solubilizing agent to produce another mixture containing pigmented or unpigmented amorphous silica-containing component and a solubilized metal-containing component; separating these components from each other to produce an amorphous silica product substantially devoid of metals and at least partially devoid of pigment. The amorphous silica product can be neutralized and thereafter dried at a temperature from about 25.degree. C. to 300.degree. C. The morphology of the silica product can be varied through the process conditions including sequence contacting steps, pH of depigmenting reagent, neutralization and drying conditions to tailor the amorphous silica for commercial use in products including filler for paint, paper, rubber and polymers, and chromatographic material.

  6. Device calibration impacts security of quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16T23:59:59.000Z

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  7. An experimental study of a six key handprint chord keyboard

    E-Print Network [OSTI]

    Wolstein, Sheldon Aaron

    1986-01-01T23:59:59.000Z

    er Dr. R. Quinn Brackett Head o Department Dr. Leland T. Blank May 1986 ABSTRACT An Exper1mental Study of a Six Key Handprlnt Chord Keyboard (May 1986) Sheldon Aaron Wolstein, B. S. , Texas ASM University Cha1r of Advisory Committee: Dr... PRACTICE ARTICLE UITA 7Z 7B IUU IUB 1U7 11U 111 LIST OF TABLES Page TABLE I Results of Typing Test: Means and Standard Deviations 25 TABLE 2 Means and Variances for Letter Sequence Times 28 TABLE 3 Analysis of Variance for Letter Sequence...

  8. Effects of color coding on keying time and errors

    E-Print Network [OSTI]

    Wooldridge, Brenda Gail

    1983-01-01T23:59:59.000Z

    were to determine the effects if any oi' color coding upon the error rate and location time of special func- tion keys on a computer keyboard. An ACT-YA CRT keyboard interfaced with a Kromemco microcomputer was used. There were 84 high schoool... to comnunicate with more and more computer-like devices. The most common computer/human interface is the terminal, consisting of a display screen, and keyboard. The format and layout on the display screen of computer-generated information is generally...

  9. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  10. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  11. DOE Announces More Key Administration Posts | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartmentConsumersDevelopmentDepartmentofKey

  12. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues

  13. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey

  14. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy- FORTechnology Key to

  15. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKey

  16. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,KeyTex

  17. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  18. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA Key

  19. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyA

  20. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAA

  1. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAAA

  2. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  3. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteriesmetal-organic frameworks |A photo ofMay 2015andKEY

  4. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to Preserving

  5. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to PreservingIron

  6. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental AssessmentsGeoffrey Campbell isOklahoma City, USA OklahomaTiratIs Key

  7. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) MappingOctober 12,U.S.U.S. DOEJoanKaye D. Lathrop,KevinKey

  8. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Nobel Laureate's

  9. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  10. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  11. Encryption Key Search using Java-based ALiCE Grid

    E-Print Network [OSTI]

    Virkar, Ameya

    Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

  12. Composite armor, armor system and vehicle including armor system

    DOE Patents [OSTI]

    Chu, Henry S.; Jones, Warren F.; Lacy, Jeffrey M.; Thinnes, Gary L.

    2013-01-01T23:59:59.000Z

    Composite armor panels are disclosed. Each panel comprises a plurality of functional layers comprising at least an outermost layer, an intermediate layer and a base layer. An armor system incorporating armor panels is also disclosed. Armor panels are mounted on carriages movably secured to adjacent rails of a rail system. Each panel may be moved on its associated rail and into partially overlapping relationship with another panel on an adjacent rail for protection against incoming ordnance from various directions. The rail system may be configured as at least a part of a ring, and be disposed about a hatch on a vehicle. Vehicles including an armor system are also disclosed.

  13. cDNA encoding a polypeptide including a hevein sequence

    DOE Patents [OSTI]

    Raikhel, Natasha V. (Okemos, MI); Broekaert, Willem F. (Dilbeek, BE); Chua, Nam-Hai (Scarsdale, NY); Kush, Anil (New York, NY)

    1993-02-16T23:59:59.000Z

    A cDNA clone (HEV1) encoding hevein was isolated via polymerase chain reaction (PCR) using mixed oligonucleotides corresponding to two regions of hevein as primers and a Hevea brasiliensis latex cDNA library as a template. HEV1 is 1018 nucleotides long and includes an open reading frame of 204 amino acids. The deduced amino acid sequence contains a pu GOVERNMENT RIGHTS This application was funded under Department of Energy Contract DE-AC02-76ER01338. The U.S. Government has certain rights under this application and any patent issuing thereon.

  14. Composite material including nanocrystals and methods of making

    DOE Patents [OSTI]

    Bawendi, Moungi G.; Sundar, Vikram C.

    2010-04-06T23:59:59.000Z

    Temperature-sensing compositions can include an inorganic material, such as a semiconductor nanocrystal. The nanocrystal can be a dependable and accurate indicator of temperature. The intensity of emission of the nanocrystal varies with temperature and can be highly sensitive to surface temperature. The nanocrystals can be processed with a binder to form a matrix, which can be varied by altering the chemical nature of the surface of the nanocrystal. A nanocrystal with a compatibilizing outer layer can be incorporated into a coating formulation and retain its temperature sensitive emissive properties.

  15. A coke oven model including thermal decomposition kinetics of tar

    SciTech Connect (OSTI)

    Munekane, Fuminori; Yamaguchi, Yukio [Mitsubishi Chemical Corp., Yokohama (Japan); Tanioka, Seiichi [Mitsubishi Chemical Corp., Sakaide (Japan)

    1997-12-31T23:59:59.000Z

    A new one-dimensional coke oven model has been developed for simulating the amount and the characteristics of by-products such as tar and gas as well as coke. This model consists of both heat transfer and chemical kinetics including thermal decomposition of coal and tar. The chemical kinetics constants are obtained by estimation based on the results of experiments conducted to investigate the thermal decomposition of both coal and tar. The calculation results using the new model are in good agreement with experimental ones.

  16. Numerical evaluation of propeller noise, including non-linear effects

    E-Print Network [OSTI]

    White, Terence Alan

    1985-01-01T23:59:59.000Z

    University Chairman of Advisor y Commitee: Dr. Kenneth Korkan Using the transonic flow field(s) generated by the NASPROP-E computer code for an eight blade SR3-series propeller, a method is investigated to calculate the total noise values and frequency... in three dimensions, and the influence of the damping on the calculated noise values is investigated. Since the flow field includes the wave systems near the blade surface, the quadr upole noise sour ce term is accounted for as are the monopole...

  17. What To Include In The Whistleblower Complaint? | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14Russian Nuclear Warheads ArrivesAdministration To Include In

  18. The Chlamydomonas Genome Reveals the Evolution of Key Animal

    E-Print Network [OSTI]

    of chloroplasts or eukaryotic flagella. Analyses of the Chlamydomonas genome advance our understanding of biofuels (5, 6). The Chlorophytes (green algae, including Chlamydomonas and Ostreococcus) diverged from

  19. Solving The High Energy Evolution Equation Including Running Coupling Corrections

    E-Print Network [OSTI]

    Javier L. Albacete; Yuri V. Kovchegov

    2007-06-22T23:59:59.000Z

    We study the solution of the nonlinear BK evolution equation with the recently calculated running coupling corrections [hep-ph/0609105, hep-ph/0609090]. Performing a numerical solution we confirm the earlier result of [hep-ph/0408216] that the high energy evolution with the running coupling leads to a universal scaling behavior for the dipole scattering amplitude. The running coupling corrections calculated recently significantly change the shape of the scaling function as compared to the fixed coupling case leading to a considerable increase in the anomalous dimension and to a slow-down of the evolution with rapidity. The difference between the two recent calculations is due to an extra contribution to the evolution kernel, referred to as the subtraction term, which arises when running coupling corrections are included. These subtraction terms were neglected in both recent calculations. We evaluate numerically the subtraction terms for both calculations, and demonstrate that when the subtraction terms are added back to the evolution kernels obtained in the two works the resulting dipole amplitudes agree with each other! We then use the complete running coupling kernel including the subtraction term to find the numerical solution of the resulting full non-linear evolution equation with the running coupling corrections. Again the scaling regime is recovered at very large rapidity.

  20. Cogeneration handbook for the petroleum refining industry. [Glossary included

    SciTech Connect (OSTI)

    Not Available

    1984-02-01T23:59:59.000Z

    This Handbook deals only with industrial cogeneration, that is, simultaneous production of both heat and electricity at the industrial plant site. The cogenerator has the option of either selling all cogenerated power to the utility while simultaneously purchasing power to satisfy his plant demand, or directly supplying the plant demand with cogenerated power, thus displacing utility-supplied power. This Handbook provides the refinery plant manager or company energy coordinator with a framework for making a preliminary assessment of the feasibility and viability of cogeneration at a particular plant. The handbook is intended to provide an understanding of the potential of several standardized cogeneration systems, as well as their limitations. However, because the decision to cogenerate is very site specific, the handbook cannot provide all of the answers. It does attempt, however, to bring to light the major issues that should be addressed in the decision-making process. The decision of whether to cogenerate involves several considerations, including technical, economic, environmental, legal, and regulatory issues. Each of these issues is addressed separately in this handbook. In addition, a chapter is included on preparing a three-phase work statement, which is needed to guide the design of a cogeneration system. 39 figures, 37 tables.

  1. $?$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Jameel-Un Nabi; Irgaziev Bakhadir

    2011-08-04T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model results. This study can prove useful for the core-collapse simulators.

  2. Pulse transmission transmitter including a higher order time derivate filter

    DOE Patents [OSTI]

    Dress Jr., William B.; Smith, Stephen F.

    2003-09-23T23:59:59.000Z

    Systems and methods for pulse-transmission low-power communication modes are disclosed. A pulse transmission transmitter includes: a clock; a pseudorandom polynomial generator coupled to the clock, the pseudorandom polynomial generator having a polynomial load input; an exclusive-OR gate coupled to the pseudorandom polynomial generator, the exclusive-OR gate having a serial data input; a programmable delay circuit coupled to both the clock and the exclusive-OR gate; a pulse generator coupled to the programmable delay circuit; and a higher order time derivative filter coupled to the pulse generator. The systems and methods significantly reduce lower-frequency emissions from pulse transmission spread-spectrum communication modes, which reduces potentially harmful interference to existing radio frequency services and users and also simultaneously permit transmission of multiple data bits by utilizing specific pulse shapes.

  3. Hydraulic engine valve actuation system including independent feedback control

    DOE Patents [OSTI]

    Marriott, Craig D

    2013-06-04T23:59:59.000Z

    A hydraulic valve actuation assembly may include a housing, a piston, a supply control valve, a closing control valve, and an opening control valve. The housing may define a first fluid chamber, a second fluid chamber, and a third fluid chamber. The piston may be axially secured to an engine valve and located within the first, second and third fluid chambers. The supply control valve may control a hydraulic fluid supply to the piston. The closing control valve may be located between the supply control valve and the second fluid chamber and may control fluid flow from the second fluid chamber to the supply control valve. The opening control valve may be located between the supply control valve and the second fluid chamber and may control fluid flow from the supply control valve to the second fluid chamber.

  4. Fuel cell repeater unit including frame and separator plate

    DOE Patents [OSTI]

    Yamanis, Jean; Hawkes, Justin R; Chiapetta, Jr., Louis; Bird, Connie E; Sun, Ellen Y; Croteau, Paul F

    2013-11-05T23:59:59.000Z

    An example fuel cell repeater includes a separator plate and a frame establishing at least a portion of a flow path that is operative to communicate fuel to or from at least one fuel cell held by the frame relative to the separator plate. The flow path has a perimeter and any fuel within the perimeter flow across the at least one fuel cell in a first direction. The separator plate, the frame, or both establish at least one conduit positioned outside the flow path perimeter. The conduit is outside of the flow path perimeter and is configured to direct flow in a second, different direction. The conduit is fluidly coupled with the flow path.

  5. Copper laser modulator driving assembly including a magnetic compression laser

    DOE Patents [OSTI]

    Cook, Edward G. (Livermore, CA); Birx, Daniel L. (Oakley, CA); Ball, Don G. (Livermore, CA)

    1994-01-01T23:59:59.000Z

    A laser modulator (10) having a low voltage assembly (12) with a plurality of low voltage modules (14) with first stage magnetic compression circuits (20) and magnetic assist inductors (28) with a common core (91), such that timing of the first stage magnetic switches (30b) is thereby synchronized. A bipolar second stage of magnetic compression (42) is coupled to the low voltage modules (14) through a bipolar pulse transformer (36) and a third stage of magnetic compression (44) is directly coupled to the second stage of magnetic compression (42). The low voltage assembly (12) includes pressurized boxes (117) for improving voltage standoff between the primary winding assemblies (34) and secondary winding (40) contained therein.

  6. Electra-optical device including a nitrogen containing electrolyte

    DOE Patents [OSTI]

    Bates, John B. (Oak Ridge, TN); Dudney, Nancy J. (Knoxville, TN); Gruzalski, Greg R. (Oak Ridge, TN); Luck, Christopher F. (Knoxville, TN)

    1995-01-01T23:59:59.000Z

    Described is a thin-film battery, especially a thin-film microbattery, and a method for making same having application as a backup or primary integrated power source for electronic devices. The battery includes a novel electrolyte which is electrochemically stable and does not react with the lithium anode and a novel vanadium oxide cathode Configured as a microbattery, the battery can be fabricated directly onto a semiconductor chip, onto the semiconductor die or onto any portion of the chip carrier. The battery can be fabricated to any specified size or shape to meet the requirements of a particular application. The battery is fabricated of solid state materials and is capable of operation between -15.degree. C. and 150.degree. C.

  7. Electra-optical device including a nitrogen containing electrolyte

    DOE Patents [OSTI]

    Bates, J.B.; Dudney, N.J.; Gruzalski, G.R.; Luck, C.F.

    1995-10-03T23:59:59.000Z

    Described is a thin-film battery, especially a thin-film microbattery, and a method for making same having application as a backup or primary integrated power source for electronic devices. The battery includes a novel electrolyte which is electrochemically stable and does not react with the lithium anode and a novel vanadium oxide cathode. Configured as a microbattery, the battery can be fabricated directly onto a semiconductor chip, onto the semiconductor die or onto any portion of the chip carrier. The battery can be fabricated to any specified size or shape to meet the requirements of a particular application. The battery is fabricated of solid state materials and is capable of operation between {minus}15 C and 150 C.

  8. Including stereoscopic information in the reconstruction of coronal magnetic fields

    E-Print Network [OSTI]

    T. Wiegelmann; T. Neukirch

    2008-01-23T23:59:59.000Z

    We present a method to include stereoscopic information about the three dimensional structure of flux tubes into the reconstruction of the coronal magnetic field. Due to the low plasma beta in the corona we can assume a force free magnetic field, with the current density parallel to the magnetic field lines. Here we use linear force free fields for simplicity. The method uses the line of sight magnetic field on the photosphere as observational input. The value of $\\alpha$ is determined iteratively by comparing the reconstructed magnetic field with the observed structures. The final configuration is the optimal linear force solution constrained by both the photospheric magnetogram and the observed plasma structures. As an example we apply our method to SOHO MDI/EIT data of an active region. In the future it is planned to apply the method to analyse data from the SECCHI instrument aboard the STEREO mission.

  9. Improving Planck calibration by including frequency-dependent relativistic corrections

    E-Print Network [OSTI]

    Quartin, Miguel

    2015-01-01T23:59:59.000Z

    The Planck satellite detectors are calibrated in the 2015 release using the "orbital dipole", which is the time-dependent dipole generated by the Doppler effect due to the motion of the satellite around the Sun. Such an effect has also relativistic time-dependent corrections of relative magnitude 10^(-3), due to coupling with the "solar dipole" (the motion of the Sun compared to the CMB rest frame), which are included in the data calibration by the Planck collaboration. We point out that such corrections are subject to a frequency-dependent multiplicative factor. This factor differs from unity especially at the highest frequencies, relevant for the HFI instrument. Since currently Planck calibration errors are dominated by systematics, to the point that polarization data is currently unreliable at large scales, such a correction can in principle be highly relevant for future data releases.

  10. Protoplanetary disks including radiative feedback from accreting planets

    E-Print Network [OSTI]

    Montesinos, Matias; Perez, Sebastian; Baruteau, Clement; Casassus, Simon

    2015-01-01T23:59:59.000Z

    While recent observational progress is converging on the detection of compact regions of thermal emission due to embedded protoplanets, further theoretical predictions are needed to understand the response of a protoplanetary disk to the planet formation radiative feedback. This is particularly important to make predictions for the observability of circumplanetary regions. In this work we use 2D hydrodynamical simulations to examine the evolution of a viscous protoplanetary disk in which a luminous Jupiter-mass planet is embedded. We use an energy equation which includes the radiative heating of the planet as an additional mechanism for planet formation feedback. Several models are computed for planet luminosities ranging from $10^{-5}$ to $10^{-3}$ Solar luminosities. We find that the planet radiative feedback enhances the disk's accretion rate at the planet's orbital radius, producing a hotter and more luminous environement around the planet, independently of the prescription used to model the disk's turbul...

  11. Actuator assembly including a single axis of rotation locking member

    DOE Patents [OSTI]

    Quitmeyer, James N.; Benson, Dwayne M.; Geck, Kellan P.

    2009-12-08T23:59:59.000Z

    An actuator assembly including an actuator housing assembly and a single axis of rotation locking member fixedly attached to a portion of the actuator housing assembly and an external mounting structure. The single axis of rotation locking member restricting rotational movement of the actuator housing assembly about at least one axis. The single axis of rotation locking member is coupled at a first end to the actuator housing assembly about a Y axis and at a 90.degree. angle to an X and Z axis providing rotation of the actuator housing assembly about the Y axis. The single axis of rotation locking member is coupled at a second end to a mounting structure, and more particularly a mounting pin, about an X axis and at a 90.degree. angle to a Y and Z axis providing rotation of the actuator housing assembly about the X axis. The actuator assembly is thereby restricted from rotation about the Z axis.

  12. A Case for Including Transactions in OpenMP

    SciTech Connect (OSTI)

    Wong, M; Bihari, B L; de Supinski, B R; Wu, P; Michael, M; Liu, Y; Chen, W

    2010-01-25T23:59:59.000Z

    Transactional Memory (TM) has received significant attention recently as a mechanism to reduce the complexity of shared memory programming. We explore the potential of TM to improve OpenMP applications. We combine a software TM (STM) system to support transactions with an OpenMP implementation to start thread teams and provide task and loop-level parallelization. We apply this system to two application scenarios that reflect realistic TM use cases. Our results with this system demonstrate that even with the relatively high overheads of STM, transactions can outperform OpenMP critical sections by 10%. Overall, our study demonstrates that extending OpenMP to include transactions would ease programming effort while allowing improved performance.

  13. Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01T23:59:59.000Z

    Grid parity--or break-even cost--for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that local incentives rather than ?technical? parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  14. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Fei Gao; Su-Juan Qin; Fen-Zhuo Guo; Qiao-Yan Wen

    2011-04-20T23:59:59.000Z

    Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e. the dense-coding attack. It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice's encoding. The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed. Furthermore, this attack does not introduce any errors to the transmitted information and consequently will not be discovered by Alice and Bob. The attack strategy is described in detail and a proof for its correctness is given. At last, the root of this insecurity and a possible way to improve these protocols are discussed.

  15. A key factor to the spin parameter of uniformly rotating compact stars: crust structure

    E-Print Network [OSTI]

    Qi, B; Sun, B Y; Wang, S Y; Gao, J H

    2014-01-01T23:59:59.000Z

    We study the key factor to determine the dimensionless spin parameter $j\\equiv cJ/(GM^2)$ of different kinds of uniformly rotating compact stars, including the traditional neutron stars, hyperonic neutron stars, and hybrid stars, and check the reliability of the results on various types of equations of state of dense matter. The equations of state from the relativistic mean field theory and the MIT bag model are adopted to simulate compact stars. Numerical calculations of rigidly rotating neutron stars are performed using the RNS code in the framework of general relativity by solving the Einstein equations for stationary axis-symmetric spacetime. The crust structure of compact stars is found to be a key factor to determine the maximum value of the spin parameter $j_{\\rm max}$. For the stars with inclusion of the crust, $j_{\\rm max}\\sim 0.7$ is sustained for various kinds of compact stars with $M>0.5 M_{\\odot}$, and is found to be insensitive to the mass of star and selected equations of state. For the traditi...

  16. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19T23:59:59.000Z

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  17. Key Science Observations of AGNs with KaVA Array

    E-Print Network [OSTI]

    Kino, Motoki; Zhao, Guang-Yao; Sohn, Bong Won

    2015-01-01T23:59:59.000Z

    KaVA (KVN and VERA Array) is a new combined VLBI array with KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). First, we briefly review the imaging capabilities of KaVA array which actually achieves more than three times better dynamic range than that achieved by VERA alone. The KaVA images clearly show detailed structures of extended radio jets in AGNs. Next, we represent the key science program to be led by KaVA AGN sub working group. We will conduct the monitoring observations of Sgr A* and M87 because of the largeness of their central super-massive black hole angular sizes. The main science goals of the program are (i) testing magnetically-driven-jet paradigm by mapping velocity fields of the M87 jet, and (ii) obtaining tight constraints on physical properties of radio emitting region in Sgr A*.

  18. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  19. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  20. Extractant composition including crown ether and calixarene extractants

    DOE Patents [OSTI]

    Meikrantz, David H. (Idaho Falls, ID); Todd, Terry A. (Aberdeen, ID); Riddle, Catherine L. (Idaho Falls, ID); Law, Jack D. (Pocalello, ID); Peterman, Dean R. (Idaho Falls, ID); Mincher, Bruce J. (Idaho Falls, ID); McGrath, Christopher A. (Blackfoot, ID); Baker, John D. (Blackfoot, ID)

    2009-04-28T23:59:59.000Z

    An extractant composition comprising a mixed extractant solvent consisting of calix[4] arene-bis-(tert-octylbenzo)-crown-6 ("BOBCalixC6"), 4',4',(5')-di-(t-butyldicyclo-hexano)-18-crown-6 ("DtBu18C6"), and at least one modifier dissolved in a diluent. The DtBu18C6 may be present at from approximately 0.01M to approximately 0.4M, such as at from approximately 0.086 M to approximately 0.108 M. The modifier may be 1-(2,2,3,3-tetrafluoropropoxy)-3-(4-sec-butylphenoxy)-2-propanol ("Cs-7SB") and may be present at from approximately 0.01M to approximately 0.8M. In one embodiment, the mixed extractant solvent includes approximately 0.15M DtBu18C6, approximately 0.007M BOBCalixC6, and approximately 0.75M Cs-7SB modifier dissolved in an isoparaffinic hydrocarbon diluent. The extractant composition further comprises an aqueous phase. The mixed extractant solvent may be used to remove cesium and strontium from the aqueous phase.

  1. DETECTION OF SUBSURFACE FACILITIES INCLUDING NON-METALLIC PIPE

    SciTech Connect (OSTI)

    Mr. Herb Duvoisin

    2003-05-26T23:59:59.000Z

    CyTerra has leveraged our unique, shallow buried plastic target detection technology developed under US Army contracts into deeper buried subsurface facilities and including nonmetallic pipe detection. This Final Report describes a portable, low-cost, real-time, and user-friendly subsurface plastic pipe detector (LULU- Low Cost Utility Location Unit) that relates to the goal of maintaining the integrity and reliability of the nation's natural gas transmission and distribution network by preventing third party damage, by detecting potential infringements. Except for frequency band and antenna size, the LULU unit is almost identical to those developed for the US Army. CyTerra designed, fabricated, and tested two frequency stepped GPR systems, spanning the frequencies of importance (200 to 1600 MHz), one low and one high frequency system. Data collection and testing was done at a variety of locations (selected for soil type variations) on both targets of opportunity and selected buried targets. We developed algorithms and signal processing techniques that provide for the automatic detection of the buried utility lines. The real time output produces a sound as the radar passes over the utility line alerting the operator to the presence of a buried object. Our unique, low noise/high performance RF hardware, combined with our field tested detection algorithms, represents an important advancement toward achieving the DOE potential infringement goal.

  2. Hydrodynamic Simulation of Supernova Remnants Including Efficient Particle Acceleration

    E-Print Network [OSTI]

    Donald C. Ellison; Anne Decourchelle; Jean Ballet

    2003-08-19T23:59:59.000Z

    A number of supernova remnants (SNRs) show nonthermal X-rays assumed to be synchrotron emission from shock accelerated TeV electrons. The existence of these TeV electrons strongly suggests that the shocks in SNRs are sources of galactic cosmic rays (CRs). In addition, there is convincing evidence from broad-band studies of individual SNRs and elsewhere that the particle acceleration process in SNRs can be efficient and nonlinear. If SNR shocks are efficient particle accelerators, the production of CRs impacts the thermal properties of the shock heated, X-ray emitting gas and the SNR evolution. We report on a technique that couples nonlinear diffusive shock acceleration, including the backreaction of the accelerated particles on the structure of the forward and reverse shocks, with a hydrodynamic simulation of SNR evolution. Compared to models which ignore CRs, the most important hydrodynamical effects of placing a significant fraction of shock energy into CRs are larger shock compression ratios and lower temperatures in the shocked gas. We compare our results, which use an approximate description of the acceleration process, with a more complete model where the full CR transport equations are solved (i.e., Berezhko et al., 2002), and find excellent agreement for the CR spectrum summed over the SNR lifetime and the evolving shock compression ratio. The importance of the coupling between particle acceleration and SNR dynamics for the interpretation of broad-band continuum and thermal X-ray observations is discussed.

  3. cDNA encoding a polypeptide including a hevein sequence

    DOE Patents [OSTI]

    Raikhel, Natasha V. (Okemos, MI); Broekaert, Willem F. (Dilbeek, BE); Chua, Nam-Hai (Scarsdale, NY); Kush, Anil (New York, NY)

    1999-05-04T23:59:59.000Z

    A cDNA clone (HEV1) encoding hevein was isolated via polymerase chain reaction (PCR) using mixed oligonucleotides corresponding to two regions of hevein as primers and a Hevea brasiliensis latex cDNA library as a template. HEV1 is 1018 nucleotides long and includes an open reading frame of 204 amino acids. The deduced amino acid sequence contains a putative signal sequence of 17 amino acid residues followed by a 187 amino acid polypeptide. The amino-terminal region (43 amino acids) is identical to hevein and shows homology to several chitin-binding proteins and to the amino-termini of wound-induced genes in potato and poplar. The carboxyl-terminal portion of the polypeptide (144 amino acids) is 74-79% homologous to the carboxyl-terminal region of wound-inducible genes of potato. Wounding, as well as application of the plant hormones abscisic acid and ethylene, resulted in accumulation of hevein transcripts in leaves, stems and latex, but not in roots, as shown by using the cDNA as a probe. A fusion protein was produced in E. coli from the protein of the present invention and maltose binding protein produced by the E. coli.

  4. CDNA encoding a polypeptide including a hevein sequence

    DOE Patents [OSTI]

    Raikhel, Natasha V. (Okemos, MI); Broekaert, Willem F. (Dilbeek, BE); Chua, Nam-Hai (Scarsdale, NY); Kush, Anil (New York, NY)

    1995-03-21T23:59:59.000Z

    A cDNA clone (HEV1) encoding hevein was isolated via polymerase chain reaction (PCR) using mixed oligonucleotides corresponding to two regions of hevein as primers and a Hevea brasiliensis latex cDNA library as a template. HEV1 is 1018 nucleotides long and includes an open reading frame of 204 amino acids. The deduced amino acid sequence contains a putative signal sequence of 17 amino acid residues followed by a 187 amino acid polypeptide. The amino-terminal region (43 amino acids) is identical to hevein and shows homology to several chitin-binding proteins and to the amino-termini of wound-induced genes in potato and poplar. The carboxyl-terminal portion of the polypeptide (144 amino acids) is 74-79% homologous to the carboxyl-terminal region of wound-inducible genes of potato. Wounding, as well as application of the plant hormones abscisic acid and ethylene, resulted in accumulation of hevein transcripts in leaves, stems and latex, but not in roots, as shown by using the cDNA as a probe. A fusion protein was produced in E. coli from the protein of the present invention and maltose binding protein produced by the E. coli.

  5. cDNA encoding a polypeptide including a hevein sequence

    DOE Patents [OSTI]

    Raikhel, N.V.; Broekaert, W.F.; Chua, N.H.; Kush, A.

    1995-03-21T23:59:59.000Z

    A cDNA clone (HEV1) encoding hevein was isolated via polymerase chain reaction (PCR) using mixed oligonucleotides corresponding to two regions of hevein as primers and a Hevea brasiliensis latex cDNA library as a template. HEV1 is 1,018 nucleotides long and includes an open reading frame of 204 amino acids. The deduced amino acid sequence contains a putative signal sequence of 17 amino acid residues followed by a 187 amino acid polypeptide. The amino-terminal region (43 amino acids) is identical to hevein and shows homology to several chitin-binding proteins and to the amino-termini of wound-induced genes in potato and poplar. The carboxyl-terminal portion of the polypeptide (144 amino acids) is 74--79% homologous to the carboxyl-terminal region of wound-inducible genes of potato. Wounding, as well as application of the plant hormones abscisic acid and ethylene, resulted in accumulation of hevein transcripts in leaves, stems and latex, but not in roots, as shown by using the cDNA as a probe. A fusion protein was produced in E. coli from the protein of the present invention and maltose binding protein produced by the E. coli. 11 figures.

  6. cDNA encoding a polypeptide including a hevein sequence

    DOE Patents [OSTI]

    Raikhel, N.V.; Broekaert, W.F.; Chua, N.H.; Kush, A.

    1999-05-04T23:59:59.000Z

    A cDNA clone (HEV1) encoding hevein was isolated via polymerase chain reaction (PCR) using mixed oligonucleotides corresponding to two regions of hevein as primers and a Hevea brasiliensis latex cDNA library as a template. HEV1 is 1018 nucleotides long and includes an open reading frame of 204 amino acids. The deduced amino acid sequence contains a putative signal sequence of 17 amino acid residues followed by a 187 amino acid polypeptide. The amino-terminal region (43 amino acids) is identical to hevein and shows homology to several chitin-binding proteins and to the amino-termini of wound-induced genes in potato and poplar. The carboxyl-terminal portion of the polypeptide (144 amino acids) is 74--79% homologous to the carboxyl-terminal region of wound-inducible genes of potato. Wounding, as well as application of the plant hormones abscisic acid and ethylene, resulted in accumulation of hevein transcripts in leaves, stems and latex, but not in roots, as shown by using the cDNA as a probe. A fusion protein was produced in E. coli from the protein of the present invention and maltose binding protein produced by the E. coli. 12 figs.

  7. C -parameter distribution at N 3 LL ' including power corrections

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hoang, Andr H.; Kolodrubetz, Daniel W.; Mateu, Vicent; Stewart, Iain W.

    2015-05-01T23:59:59.000Z

    We compute the e?e? C-parameter distribution using the soft-collinear effective theory with a resummation to next-to-next-to-next-to-leading-log prime accuracy of the most singular partonic terms. This includes the known fixed-order QCD results up to O(?3s), a numerical determination of the two-loop nonlogarithmic term of the soft function, and all logarithmic terms in the jet and soft functions up to three loops. Our result holds for C in the peak, tail, and far tail regions. Additionally, we treat hadronization effects using a field theoretic nonperturbative soft function, with moments ?n. To eliminate an O(?QCD) renormalon ambiguity in the soft function, we switch from the MS to a short distance Rgap scheme to define the leading power correction parameter ?1. We show how to simultaneously account for running effects in ?1 due to renormalon subtractions and hadron-mass effects, enabling power correction universality between C-parameter and thrust to be tested in our setup. We discuss in detail the impact of resummation and renormalon subtractions on the convergence. In the relevant fit region for ?s(mZ) and ?1, the perturbative uncertainty in our cross section is ? 2.5% at Q=mZ.

  8. Interim performance criteria for photovoltaic energy systems. [Glossary included

    SciTech Connect (OSTI)

    DeBlasio, R.; Forman, S.; Hogan, S.; Nuss, G.; Post, H.; Ross, R.; Schafft, H.

    1980-12-01T23:59:59.000Z

    This document is a response to the Photovoltaic Research, Development, and Demonstration Act of 1978 (P.L. 95-590) which required the generation of performance criteria for photovoltaic energy systems. Since the document is evolutionary and will be updated, the term interim is used. More than 50 experts in the photovoltaic field have contributed in the writing and review of the 179 performance criteria listed in this document. The performance criteria address characteristics of present-day photovoltaic systems that are of interest to manufacturers, government agencies, purchasers, and all others interested in various aspects of photovoltaic system performance and safety. The performance criteria apply to the system as a whole and to its possible subsystems: array, power conditioning, monitor and control, storage, cabling, and power distribution. They are further categorized according to the following performance attributes: electrical, thermal, mechanical/structural, safety, durability/reliability, installation/operation/maintenance, and building/site. Each criterion contains a statement of expected performance (nonprescriptive), a method of evaluation, and a commentary with further information or justification. Over 50 references for background information are also given. A glossary with definitions relevant to photovoltaic systems and a section on test methods are presented in the appendices. Twenty test methods are included to measure performance characteristics of the subsystem elements. These test methods and other parts of the document will be expanded or revised as future experience and needs dictate.

  9. Updated distribution and reintroduction of the Lower Keys marsh rabbit

    E-Print Network [OSTI]

    Faulhaber, Craig Alan

    2005-02-17T23:59:59.000Z

    that might function as local populations. Surveys included 228 patches of occupied and potential habitat, 102 of which were occupied by rabbits. Patches were arranged in 56 occupied and 88 potential populations. Surveys revealed new patches of both occupied...

  10. Transportation Energy Futures: Key Opportunities and Tools for Decision Makers (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2012-12-01T23:59:59.000Z

    The Transportation Energy Futures (TEF) project examines underexplored greenhouse gas-abatement and oil-savings opportunities by consolidating transportation energy knowledge, conducting advanced analysis, and exploring additional opportunities for sound strategic action. Led by NREL, in collaboration with Argonne National Laboratory, the project's primary goal is to provide analysis to accompany DOE-EERE's long-term transportation energy planning by addressing high-priority questions, informing domestic decisions about transportation energy strategies, priorities, and investments. Research and analysis were conducted with an eye toward short-term actions that support long-term energy goals The project looks beyond technology to examine each key question in the context of the marketplace, consumer behavior, industry capabilities, and infrastructure. This updated fact sheet includes a new section on initial project findings.

  11. A Review of Loss Mechanisms and Key Design Choices for High Intensity Hadron Rings

    SciTech Connect (OSTI)

    Warsop, C.M. [Rutherford Appleton Laboratory, Oxfordshire (United Kingdom)

    2005-06-08T23:59:59.000Z

    The peak performance reached in a high intensity ring is closely related to the ability to minimise and control beam loss. The need to increase intensity has to be balanced against possible increased induction of radioactivity and the risk of interrupted operations. Losses are dependent on many factors and influence most aspects of machine design. In principle, only one aspect of low loss design needs to be sub-optimal to impose severe intensity limitations. Here, an outline is given of the key factors that need to be considered, focussing primarily on low to medium energy proton machines. Topics include space charge, instabilities, electron effects, injection and main lattice choices. Finally, we note that major progress has been made in refining low loss designs but there is still important work to be done in predicting loss levels and distributions in detail.

  12. Key statistics related to CO/sub 2/ emissions: Significant contributing countries

    SciTech Connect (OSTI)

    Kellogg, M.A.; Edmonds, J.A.; Scott, M.J.; Pomykala, J.S.

    1987-07-01T23:59:59.000Z

    This country selection task report describes and applies a methodology for identifying a set of countries responsible for significant present and anticipated future emissions of CO/sub 2/ and other radiatively important gases (RIGs). The identification of countries responsible for CO/sub 2/ and other RIGs emissions will help determine to what extent a select number of countries might be capable of influencing future emissions. Once identified, those countries could potentially exercise cooperative collective control of global emissions and thus mitigate the associated adverse affects of those emissions. The methodology developed consists of two approaches: the resource approach and the emissions approach. While conceptually very different, both approaches yield the same fundamental conclusion. The core of any international initiative to control global emissions must include three key countries: the US, USSR, and the People's Republic of China. It was also determined that broader control can be achieved through the inclusion of sixteen additional countries with significant contributions to worldwide emissions.

  13. Community Assessment Tool for Public Health Emergencies Including Pandemic Influenza

    SciTech Connect (OSTI)

    HCTT-CHE

    2011-04-14T23:59:59.000Z

    The Community Assessment Tool (CAT) for Public Health Emergencies Including Pandemic Influenza (hereafter referred to as the CAT) was developed as a result of feedback received from several communities. These communities participated in workshops focused on influenza pandemic planning and response. The 2008 through 2011 workshops were sponsored by the Centers for Disease Control and Prevention (CDC). Feedback during those workshops indicated the need for a tool that a community can use to assess its readiness for a disasterreadiness from a total healthcare perspective, not just hospitals, but the whole healthcare system. The CAT intends to do just thathelp strengthen existing preparedness plans by allowing the healthcare system and other agencies to work together during an influenza pandemic. It helps reveal each core agency partners' (sectors) capabilities and resources, and highlights cases of the same vendors being used for resource supplies (e.g., personal protective equipment [PPE] and oxygen) by the partners (e.g., public health departments, clinics, or hospitals). The CAT also addresses gaps in the community's capabilities or potential shortages in resources. While the purpose of the CAT is to further prepare the community for an influenza pandemic, its framework is an extension of the traditional all-hazards approach to planning and preparedness. As such, the information gathered by the tool is useful in preparation for most widespread public health emergencies. This tool is primarily intended for use by those involved in healthcare emergency preparedness (e.g., community planners, community disaster preparedness coordinators, 9-1-1 directors, hospital emergency preparedness coordinators). It is divided into sections based on the core agency partners, which may be involved in the community's influenza pandemic influenza response.

  14. Hydrogen storage for vehicular applications: Technology status and key development areas

    SciTech Connect (OSTI)

    Robinson, S.L.; Handrock, J.L.

    1994-04-01T23:59:59.000Z

    The state-of-the-art of hydrogen storage technology is reviewed, including gaseous, liquid, hydride, surface adsorbed media, glass microsphere, chemical reaction, and liquid chemical technologies. The review of each technology includes a discussion of advantages, disadvantages, likelihood of success, and key research and development activities. A preferred technological path for the development of effective near-term hydrogen storage includes both cur-rent DOT qualified and advanced compressed storage for down-sized highly efficient but moderate range vehicles, and liquid storage for fleet vehicle applications. Adsorbate media are also suitable for fleet applications but not for intermittent uses. Volume-optimized transition metal hydride beds are also viable for short range applications. Long-term development of coated nanoparticulate or metal matrix high conductivity magnesium alloy, is recommended. In addition, a room temperature adsorbate medium should be developed to avoid cryogenic storage requirements. Chemical storage and oxidative schemes present serious obstacles which must be addressed for these technologies to have a future role.

  15. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  16. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  17. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    at zero and increase to $47 per ton of CO2 emissions by 2030. Higher electricity prices reduce demandSixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions Summary of Key................................................................ 10 Wholesale Electricity Prices

  18. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  19. Direct and Reverse Secret-Key Capacities of a Quantum Channel

    E-Print Network [OSTI]

    Braunstein, Samuel L.

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

  20. RDI's Wisdom Way Solar Village Final Report: Includes Utility Bill Analysis of Occupied Homes

    SciTech Connect (OSTI)

    Robb Aldrich, Steven Winter Associates

    2011-07-01T23:59:59.000Z

    In 2010, Rural Development, Inc. (RDI) completed construction of Wisdom Way Solar Village (WWSV), a community of ten duplexes (20 homes) in Greenfield, MA. RDI was committed to very low energy use from the beginning of the design process throughout construction. Key features include: 1. Careful site plan so that all homes have solar access (for active and passive); 2. Cellulose insulation providing R-40 walls, R-50 ceiling, and R-40 floors; 3. Triple-pane windows; 4. Airtight construction (~0.1 CFM50/ft2 enclosure area); 5. Solar water heating systems with tankless, gas, auxiliary heaters; 6. PV systems (2.8 or 3.4kWSTC); 7. 2-4 bedrooms, 1,100-1,700 ft2. The design heating loads in the homes were so small that each home is heated with a single, sealed-combustion, natural gas room heater. The cost savings from the simple HVAC systems made possible the tremendous investments in the homes' envelopes. The Consortium for Advanced Residential Buildings (CARB) monitored temperatures and comfort in several homes during the winter of 2009-2010. In the Spring of 2011, CARB obtained utility bill information from 13 occupied homes. Because of efficient lights, appliances, and conscientious home occupants, the energy generated by the solar electric systems exceeded the electric energy used in most homes. Most homes, in fact, had a net credit from the electric utility over the course of a year. On the natural gas side, total gas costs averaged $377 per year (for heating, water heating, cooking, and clothes drying). Total energy costs were even less - $337 per year, including all utility fees. The highest annual energy bill for any home evaluated was $458; the lowest was $171.

  1. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01T23:59:59.000Z

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  2. I t=106sec3a 10 Energy key) 10'

    E-Print Network [OSTI]

    of opportunity including supernovae and gamma-ray bursts. NuSTAR builds on the High Energy Focusing Telescop. Optics for EUV, X-Ray, and Gamma-Ray Astronomy II, edited by Oberto Citterio, Stephen L. O'Dell, Proc over CGRO in gamma-rays. In pursuit of these science objectives, NuSTAR will: NuSTAR will also study

  3. Key ACA Terms A quick reference of frequently used terms

    E-Print Network [OSTI]

    Acton, Scott

    to achieving health care quality goals and outcomes that result in cost savings. Affordable Health Care Health; and pediatric services, including oral and vision care. Federal Poverty Level (FPL) A measure of income level issued annually by the Department of Health and Human Services. The federal poverty level is used

  4. Origin of a complex key innovation in an obligate insectplant mutualism

    E-Print Network [OSTI]

    Krenn, Harald W.

    Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

  5. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-Print Network [OSTI]

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  6. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  7. Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser

    E-Print Network [OSTI]

    Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

  8. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  9. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 117702 are described and two standardised as key establishment mechanism 12 in ISO/IEC 117702 [7] is vulnerable to a replay attack and also

  10. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks

    E-Print Network [OSTI]

    Hu, Jiankun

    A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Kejie propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous, the wireless sensor network can achieve higher key connectivity and higher resilience. I. INTRODUCTION Wireless

  11. Evaluation of the effects of a highway improvement project on Key deer

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30T23:59:59.000Z

    assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

  12. A Remark on Secret-Key Generation over Correlated Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    A Remark on Secret-Key Generation over Correlated Fading Channels Ashish Khisti ECE Dept. Univ@ee.ucla.edu Abstract-- We study secret-key agreement with public discussion over a flat-fading wiretap channel model. INTRODUCTION In recent years there has been a significant interest in developing secret-key agreement protocols

  13. Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion Ashish Khisti Member, IEEE Abstract Fundamental limits of secret-key generation over a two-way, reciprocal and block establish upper and lower bounds on the secret-key generation capacity with public discussion. The upper

  14. Secret-key Agreement with Channel State Information at the Transmitter

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-key Agreement with Channel State Information at the Transmitter Ashish Khisti, Member of secret-key agreement over a wiretap channel with state parameters. The transmitter com- municates discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound

  15. Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach Ashish: akhisti@comm.utoronto.ca Abstract--Fundamental limits of secret-key agreement over reciprocal wireless source generation. The resulting secret-key involves contributions of both channel sequences and source

  16. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number

  17. Submitted to IEEE Transactions on Power Systems, Nov. 2007 1 Abstract--A key need facing the electric power industry is the

    E-Print Network [OSTI]

    Submitted to IEEE Transactions on Power Systems, Nov. 2007 1 Abstract--A key need facing are included, along with external system connections to demonstrate how power is imported and exported Terms--educational technology, energy conservation, power engineering education, power systems, load

  18. Cost-effective Resource Provisioning for MapReduce in a Balaji Palanisamy, Member, IEEE, Aameek Singh, Member, IEEE Ling Liu, Senior Member, IEEE

    E-Print Network [OSTI]

    Liu, Ling

    some slack. By effectively multiplexing the available cloud resources among the jobs based on the job1 Cost-effective Resource Provisioning for MapReduce in a Cloud Balaji Palanisamy, Member, IEEE, unlike existing services that require customers to decide the resources to be used for the jobs, Cura

  19. QoS Provisioning in Wireless Networks The next-generation wireless networks such as the fourth generation (4G) cellular systems

    E-Print Network [OSTI]

    Wu, Dapeng Oliver

    , network services models, traffic specification, packet scheduling for wireless transmission, callQoS Provisioning in Wireless Networks Dapeng Wu Abstract The next-generation wireless networks, data, and multimedia over packet- switched networks. Providing quality of service (QoS) guarantees

  20. Page 1 of 2 CRADA Clearance Document NIH-OTT CRADA Reference #_____________ After the provisions of a Cooperative Research And Development Agreement

    E-Print Network [OSTI]

    Baker, Chris I.

    Page 1 of 2 CRADA Clearance Document NIH-OTT CRADA Reference #_____________ After the provisions of a Cooperative Research And Development Agreement have been negotiated, the CRADA must go through clearance procedures. This form helps gather required data and it documents the approval process. NIH CRADA Clearance