Powered by Deep Web Technologies
Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Essays in oil, conflict, and the development of resource-rich countries  

E-Print Network [OSTI]

This thesis examines three topics in the political economy of global oil markets and the development of resource-rich countries. The first chapter examines the effect of Saudi Arabia's crude pricing policies on the political ...

Peck, Jennifer Randolph

2013-01-01T23:59:59.000Z

2

BUSINESSES AS ONE OF THE KEY ELEMENTS OF A REGION'S SUSTAINABLE DEVELOPMENT  

E-Print Network [OSTI]

BUSINESSES AS ONE OF THE KEY ELEMENTS OF A REGION'S SUSTAINABLE DEVELOPMENT of sustainable development should be taken into account by these actors. Businesses (especially SMEs) whose aim-words : sustainable development, territory, businesses, governance, stakeholders Mots-clés : développement durable

3

Key word:Daylight Factor Window Wall Ratio Pendentive dome Lighting design Tropical region Architecture and Interior design  

E-Print Network [OSTI]

Abstract: Daylighting design plays important role in architecture of religious buildings such as churches and mosques where pendentive dome construction is frequently used. In daylighting design, many designers face difficulty in estimating the interior share of light which is usually expressed by daylight factor due to complexity of interior form. This study aims to provide designers with a rather high precision rule of thumb for average daylight factor in pendentive dome building. Thus, it investigates the Daylight Factor [DF] distribution of such buildings with reference to the tropics. It takes the Window Wall Ratio [WWR] into account and seeks its influence on daylight factor. By a 12 X 12 points grid, it examines five different ratios including 0.1, 0.2, 0.3, 0.4 and 0.5 on DF of the floor beneath the dome. The results endorse the direct relation of WWR and DF. The least WWR equal to 0.1 yields an average DF of 0.55 % while the greatest WWR of 0.5 yields in average DF of 2.56%. The intermediate WWR in steps of 0.2, 0.3 and 0.4 correspond to 1.04, 1.56 and 2.07 percent respectively. As a relatively precise rule of thumb, any increment in consequent steps of WWR with 0.1 intervals results in 0.5 % increase in DF. This can be employed by architects and interior designers for lighting design of pendentive dome buildings in tropical region.

Mehrdad Mazloomi

4

Public Key Cryptography and Key Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

2000-02-15T23:59:59.000Z

5

Key Milestones/Outlook  

Broader source: Energy.gov [DOE]

Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

6

Quantum dense key distribution  

SciTech Connect (OSTI)

This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

2004-03-01T23:59:59.000Z

7

Key Events Timeline  

Broader source: Energy.gov [DOE]

This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

8

Optical key system  

DOE Patents [OSTI]

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

2000-01-01T23:59:59.000Z

9

Cryptographic Key Management System  

SciTech Connect (OSTI)

This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

No, author

2014-02-21T23:59:59.000Z

10

ARM - Key Science Questions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUC : XDCResearch Related Information Collaborations Meetings ofgovScienceKey

11

NETL: Key Staff  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffreyKey Actions forEnergy Systems

12

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2014-09-29T23:59:59.000Z

13

Key-shift transmission  

SciTech Connect (OSTI)

A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

Nemoto, S.

1989-03-07T23:59:59.000Z

14

Securing non-volatile memory regions  

DOE Patents [OSTI]

Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.

Faraboschi, Paolo; Ranganathan, Parthasarathy; Muralimanohar, Naveen

2013-08-20T23:59:59.000Z

15

Key Issues Regarding Electrolytes at Interfacial Regions (subtask...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

with Emphasis on Low Temperature Performance Vehicle Technologies Office: 2009 Energy Storage R&D Annual Progress Report Development of Electrolytes for Lithium-ion Batteries...

16

Key China Energy Statistics 2011  

E-Print Network [OSTI]

Others Total Total Crude Oil Production by Region (1985-North West Chinese Crude Oil Production by Regional SharesEnergy Production (Mtce) AAGR Coal Raw Crude Oil Primary

Levine, Mark

2013-01-01T23:59:59.000Z

17

Quantum key distribution with key extracted from basis information  

E-Print Network [OSTI]

In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

Xiongfeng Ma

2014-10-20T23:59:59.000Z

18

Tomography increases key rates of quantum-key-distribution protocols  

E-Print Network [OSTI]

We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

2008-07-22T23:59:59.000Z

19

The LOFAR Transients Key Project  

E-Print Network [OSTI]

LOFAR, the Low Frequency Array, is a new radio telescope under construction in the Netherlands, designed to operate between 30 and 240 MHz. The Transients Key Project is one of the four Key Science Projects which comprise the core LOFAR science case. The remit of the Transients Key Project is to study variable and transient radio sources detected by LOFAR, on timescales from milliseconds to years. This will be achieved via both regular snapshot monitoring of historical and newly-discovered radio variables and, most radically, the development of a `Radio Sky Monitor' which will survey a large fraction of the northern sky on a daily basis.

Rob Fender; Robert Braun; Ben Stappers; Ralph Wijers; Michael Wise; Thijs Coenen; Heino Falcke; Jean-Mathias Griessmeier; Michiel van Haarlem; Peter Jonker; Casey Law; Sera Markoff; Joseph Masters; James Miller-Jones; Rachel Osten; Bart Scheers; Hanno Spreeuw; John Swinbank; Corina Vogt; Rudy Wijnands; Philippe Zarka

2006-11-09T23:59:59.000Z

20

Fermilab | Science | Particle Physics | Key Discoveries  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region service area. TheEPSCI Home ItDarkDiscoveries WorldwideDarkKey

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Regional GHG Emissions O tlook Greenhouse Gas and the Regional  

E-Print Network [OSTI]

6/5/2013 1 Regional GHG Emissions O tlook Greenhouse Gas and the Regional Power System Symposium Regional GHG Emissions ­ Outlook June 4, 2013 Steven Simmons CO2 Emission Outlook for the Pacific NW (ID-MT- OR-WA) Key Factors that determine Emissions Levels 1 Demand & Conservation 50 60 70 2 1. Demand

22

Key China Energy Statistics 2012  

E-Print Network [OSTI]

South Korea Other Crude Oil Production by Region (1985-2010)West Chinese Crude Oil Production by Regional Shares EastHenan Other Total Crude Oil Production: 209 Mt China's Crude

Levine, Mark

2013-01-01T23:59:59.000Z

23

Key China Energy Statistics 2012  

E-Print Network [OSTI]

South Korea Other Crude Oil Production by Region (1985-2010)North West Chinese Crude Oil Production by Regional SharesHenan Other Total Crude Oil Production: 209 Mt China's Crude

Levine, Mark

2013-01-01T23:59:59.000Z

24

Key Issues | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington, DC 20585on253.16582104)Key Issues Key Issues

25

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKey

26

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKeyAbout the

27

Key China Energy Statistics 2012  

E-Print Network [OSTI]

Consumption Total Primary Energy Consumption by Source AAGRFuel Wind Total Primary Energy Consumption by Source SharesFuel Wind Total Final Energy Consumption by Region Mtce East

Levine, Mark

2013-01-01T23:59:59.000Z

28

Key China Energy Statistics 2011  

E-Print Network [OSTI]

Gas Consumption Total Primary Energy Consumption by Source (Nuclear Fuel Total Primary Energy Consumption by Fuel SharesNuclear Fuel Total Final Energy Consumption by Region (1995-

Levine, Mark

2013-01-01T23:59:59.000Z

29

Monroe County Extension Services Key West Office  

E-Print Network [OSTI]

Energy Services: 305-295-1010 Florida Keys Electric Co-op: 305-852-2431 Monroe County Roads & Bridges-292-4501 http://monroe.ifas.ufl.edu Key Largo Office: 102050 Overseas Highway, Room 244 City and County Tree Lower Keys: 305-797-4929 Upper Keys: 305-852-7161 Contact local tree services throughout the Keys

Jawitz, James W.

30

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software  

E-Print Network [OSTI]

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

Dodis, Yevgeniy

31

Brain Receptor Structures Key to Future Therapeutics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

32

Quantum key distribution with entangled photon sources  

E-Print Network [OSTI]

A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

2007-03-14T23:59:59.000Z

33

Key issues of FED/INTOR impurity control system  

SciTech Connect (OSTI)

A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

Abdou, M.A.

1982-10-01T23:59:59.000Z

34

Key Activities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen OwnedofDepartment ofJared Temanson - Project LeaderDepartment's DirectivesKey

35

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » Key

36

Public/private key certification authority and key distribution. Draft  

SciTech Connect (OSTI)

Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

1995-09-25T23:59:59.000Z

37

COLLEGE AVE CAMPUS (CAC) KEY PICK UP  

E-Print Network [OSTI]

COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

38

Answering Key Fuel Cycle Questions  

SciTech Connect (OSTI)

The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

2003-10-01T23:59:59.000Z

39

Lightweight Key Establishment for Distributed Networking Environments  

E-Print Network [OSTI]

/ COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

Martin, Keith

40

Brain Receptor Structures Key to Future Therapeutics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Rutgers Regional Report # Regional Report  

E-Print Network [OSTI]

, population, income, and building permits over a 32-year period from 1969 to 2001 for the 31-county Tri counties of the Tri-State (Connecticut, New Jersey, and New York) Region have been divided for analytical the nation and the Tri-State Region. What has not been fully documented, however, is the apparent shift

Garfunkel, Eric

42

Monroe County Extension Services Key West Office  

E-Print Network [OSTI]

-292-4501 http://monroe.ifas.ufl.edu Key Largo Office: 102050 Overseas Highway, Room 244 City and County Tree Energy Services: 305-295-1010 Florida Keys Electric Co-op: 305-852-2431 Monroe County Roads & Bridges conditions based on USDA zone, water and light requirements, soil conditions, salt and wind tolerance

Florida, University of

43

Captured key electrical safety lockout system  

DOE Patents [OSTI]

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

Darimont, D.E.

1995-10-31T23:59:59.000Z

44

Captured key electrical safety lockout system  

SciTech Connect (OSTI)

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

Darimont, Daniel E. (Aurora, IL)

1995-01-01T23:59:59.000Z

45

Experimental study of high speed polarization-coding quantum key distribution with sifted-key  

E-Print Network [OSTI]

and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

46

Key Implications of the Global Economic Environment  

E-Print Network [OSTI]

Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

Lansky, Joshua

47

Extracting secret keys from integrated circuits  

E-Print Network [OSTI]

Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

Lim, Daihyun, 1976-

2004-01-01T23:59:59.000Z

48

Research Summary Key Ingredients of Collaborative Management  

E-Print Network [OSTI]

, wildlife management and water catchments. This project, developed in discussion with stakeholders, soughtResearch Summary Key Ingredients of Collaborative Management It is widely accepted that collaboration amongst stakeholders can lead to more sustainable land-management. Voluntary collaboration

49

MEASUREMENT OF IMPEDANCE CHARACTERISTICS OF COMPUTER KEYBOARD KEYS1  

E-Print Network [OSTI]

of computer keyboard keys are commonly used: rubber-dome and coil-spring keys. As indicated by their names, a rubber-dome key has a rubber dome under the keycap whereas a coil-spring key has a coil spring under of keys. From a user's perspective, the rubber-dome and coil-spring keys feel different. The properties

Nagurka, Mark L.

50

Mediated Semi-Quantum Key Distribution  

E-Print Network [OSTI]

In this paper, we design a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server. A semi-quantum user can only prepare and measure qubits in the computational basis and so must rely on this quantum server to produce qubits in alternative bases and also to perform alternative measurements. However, we assume that the sever is untrusted and we prove the unconditional security of our protocol even in the worst case: when this quantum server is an all-powerful adversary. We also compute a lower bound of the key rate of our protocol, in the asymptotic scenario, as a function of the observed error rate in the channel allowing us to compute the maximally tolerated error of our protocol. Our results show that a semi-quantum protocol may hold similar security to a fully quantum one.

Walter O. Krawec

2014-11-21T23:59:59.000Z

51

Public key infrastructure for DOE security research  

SciTech Connect (OSTI)

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

52

On the Security of Public Key Protocols  

E-Print Network [OSTI]

Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

Danny Dolev; et al.

1983-01-01T23:59:59.000Z

53

Regional Purchasing  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST3 AÇORIANONews Media » 2014 Regional

54

Key facts about Argonne National Laboratory  

E-Print Network [OSTI]

Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

Kemner, Ken

55

CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS  

E-Print Network [OSTI]

Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

Pawlowski, Wojtek

56

Roadmap for selected key measurements of LHCb  

E-Print Network [OSTI]

Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

2010-11-23T23:59:59.000Z

57

www.defra.gov.uk Environmental Key  

E-Print Network [OSTI]

that good environmental performance makes good business sense. Environmental risks and uncertainties impact. These Guidelines seek to help companies report their environmental impacts in a meaningful and cost-effective waywww.defra.gov.uk Environmental Key Performance Indicators Reporting Guidelines for UK Business #12

58

2 Key Achievements 7 Greenhouse Gas Reduction  

E-Print Network [OSTI]

Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

59

Rangeland ecology: Key global research issues & questions  

E-Print Network [OSTI]

1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

60

Rangeland ecology: Key global research issues & questions  

E-Print Network [OSTI]

1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Key Management Challenges in Smart Grid  

SciTech Connect (OSTI)

Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

2012-01-01T23:59:59.000Z

62

Experimental quantum key distribution with finite-key security analysis for noisy channels  

E-Print Network [OSTI]

In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight-bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks, or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

Davide Bacco; Matteo Canale; Nicola Laurenti; Giuseppe Vallone; Paolo Villoresi

2014-06-17T23:59:59.000Z

63

Key Response Planning Factors for the Aftermath of Nuclear Terrorism  

SciTech Connect (OSTI)

Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

Buddemeier, B R; Dillon, M B

2009-01-21T23:59:59.000Z

64

Chemical and Petroleum Engineering Key and Lab Space Agreement  

E-Print Network [OSTI]

Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

Calgary, University of

65

Key Physical Mechanisms in Nanostructured Solar Cells  

SciTech Connect (OSTI)

The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

Dr Stephan Bremner

2010-07-21T23:59:59.000Z

66

Three key elements necessary for successful testing  

SciTech Connect (OSTI)

Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

1994-07-25T23:59:59.000Z

67

Midstream Infrastructure Improvements Key to Realizing Full Potential...  

Office of Environmental Management (EM)

Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

68

Vehicle Electrification is Key to Reducing Petroleum Dependency...  

Broader source: Energy.gov (indexed) [DOE]

Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas Emission Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas...

69

analysis material key: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

70

Sandia National Laboratories: Direct Measurement of Key Molecule...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Modeling & SimulationDirect Measurement of Key Molecule Will Increase Accuracy of Combustion Models Direct Measurement of Key Molecule Will Increase Accuracy of Combustion...

71

Stratospheric ozone depletion: a key driver of recent precipitation trends in South Eastern South America  

E-Print Network [OSTI]

. In this paper we focus on South Eastern South America (SESA), a region that has exhibited one of the largest South America 1 Introduction The depletion of ozone in the polar Antarctic strato- sphere (i.e. `theStratospheric ozone depletion: a key driver of recent precipitation trends in South Eastern South

72

Tips for Key Maps / Inset Maps How Do I Add a Key Maps or Inset Maps  

E-Print Network [OSTI]

Tips for Key Maps / Inset Maps How Do I Add a Key Maps or Inset Maps You need a new data frame o the properties/look of the extent rectangle Tips Index Map o Should be a simplified version of the map o Should cover at least 5X the area of the main map o Should have its own scale/coordinates/title o Main coverage

Brownstone, Rob

73

Keyes, California: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 Throttled (botOpen6Kentwood, Michigan: EnergyKesona PowerStatistics-2010Keyes,

74

Key Renewable Energy Opportunities for Oklahoma Tribes  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About »KEY RENEWABLE

75

Another key Y-12 General Foreman remembered  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout theOFFICEAmes Laboratory Site|Andrea4»Another key Y-12 General

76

Key Agency Targets Summary _FY 2012_.doc  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfraredJeffersonJonathan PershingrelocatesKaye D.Ken T.NA>Kevlar andKey5 B

77

Key Issues Regarding Electrolytes at Interfacial Regions (subtask low  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington, DC 20585on253.16582104)

78

Quantum key distribution with entangled photon sources  

E-Print Network [OSTI]

A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

2007-01-01T23:59:59.000Z

79

Regional Summary Pacific Region Management Context  

E-Print Network [OSTI]

, for the Eastern Pacific Ocean, and the Western and Central Pacific Fishery Commission, for the Western PacificRegional Summary Pacific Region Management Context The Pacific Region includes California, Oregon, and Washington. Federal fisheries in this region are managed by the Pacific Fishery Management Council (PFMC

80

Compression station key to Texas pipeline project  

SciTech Connect (OSTI)

This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

NONE

1996-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

The impacts of urbanization on endangered florida key deer  

E-Print Network [OSTI]

for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

Harveson, Patricia Moody

2006-04-12T23:59:59.000Z

82

actual key success: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

83

Updated distribution and reintroduction of the Lower Keys marsh rabbit  

E-Print Network [OSTI]

Listed as federally-endangered in 1990, the Lower Keys marsh rabbit (LKMR, Sylvilagus palustris hefneri) exists as a metapopulation in patches of wetland habitat in Florida?s Lower Keys. This study sought to address 2 priority actions identified...

Faulhaber, Craig Alan

2005-02-17T23:59:59.000Z

84

authenticated key agreement: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

85

Exploring the context : a small hotel in Key West  

E-Print Network [OSTI]

This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

VanBeuzekom, Edrick

1984-01-01T23:59:59.000Z

86

Residential Energy Efficiency Financing: Key Elements of Program Design  

Broader source: Energy.gov [DOE]

Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

87

A Full Key Recovery Attack on HMAC-AURORA-512  

E-Print Network [OSTI]

A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

88

Grid Parity for Residential Photovoltaics in the United States: Key Drivers and Sensitivities; Preprint  

SciTech Connect (OSTI)

In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that electricity price rather than technical parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

Ong, S.; Denholm, P.; Clark, N.

2012-08-01T23:59:59.000Z

89

Northwest Regional Technology Center  

E-Print Network [OSTI]

Northwest Regional Technology Center for Homeland Security The Northwest Regional Technology Center and deployment of technologies that are effective homeland security solutions for the region, and accelerate technology transfer to the national user community. Foster a collaborative spirit across agencies

90

REGIONAL INTEGRATION AND PRODUCTIVITY GROWTH IN SOUTH ASIA  

E-Print Network [OSTI]

Title REGIONAL INTEGRATION AND PRODUCTIVITY GROWTH IN SOUTH ASIA Authors Amirul Islam Department;Abstract Understanding the role of regional integration in in productivity growth remains a key question effect of the free trade agreement on productivity. Most of the countries in South Asia have suffered

91

K:\\Operations\\Forms\\201 Key or Vendor Card Request.pdf Rev ASU DPc Key/Vendor Card Request  

E-Print Network [OSTI]

K:\\Operations\\Forms\\201 Key or Vendor Card Request.pdf Rev ASU DPc Key/Vendor Card Request Complete/Staff Undergrad Grad Asst Other Department or Vendor PO # or Agency/ORG Mail Code Affiliation (place X in one box am personally accountable for all ASU keys/vendor cards issued to me. I understand that only I am

Rhoads, James

92

2014 REGIONAL ECONOMIC OUTLOOK  

E-Print Network [OSTI]

2014 REGIONAL ECONOMIC OUTLOOK #12;2014 REGIONAL ECONOMIC OUTLOOK 2014 Overview The Cincinnati USA Partnership for Economic Development and the Northern Kentucky Chamber of Commerce are pleased to present the 2014 Regional Economic Outlook. This report was prepared by the Cincinnati USA Partnership's Regional

Boyce, Richard L.

93

Developing a Regional Recovery Framework  

SciTech Connect (OSTI)

Abstract A biological attack would present an unprecedented challenge for local, state, and federal agencies; the military; the private sector; and individuals on many fronts ranging from vaccination and treatment to prioritization of cleanup actions to waste disposal. To prepare the Seattle region to recover from a biological attack, the Seattle Urban Area Security Initiative (UASI) partners collaborated with military and federal agencies to develop a Regional Recovery Framework for a Biological Attack in the Seattle Urban Area. The goal was to reduce the time and resources required to recover and restore wide urban areas, military installations, and other critical infrastructure following a biological incident by providing a coordinated systems approach. Based on discussions in small workshops, tabletop exercises, and interviews with emergency response agency staff, the partners identified concepts of operation for various areas to address critical issues the region will face as recovery progresses. Key to this recovery is the recovery of the economy. Although the Framework is specific to a catastrophic, wide-area biological attack using anthrax, it was designed to be flexible and scalable so it could also serve as the recovery framework for an all-hazards approach. The Framework also served to coalesce policy questions that must be addressed for long-term recovery. These questions cover such areas as safety and health, security, financial management, waste management, legal issues, and economic development.

Lesperance, Ann M.; Olson, Jarrod; Stein, Steven L.; Clark, Rebecca; Kelly, Heather; Sheline, Jim; Tietje, Grant; Williamson, Mark; Woodcock, Jody

2011-09-01T23:59:59.000Z

94

Conservation Regional ConservationRegional Conservation  

E-Print Network [OSTI]

Northwest Power and Conservation Council Regional ConservationRegional Conservation Update and Conservation CouncilConservation Council January 24, 2007 #12;slide 2 Northwest Power and Conservation Council?"" #12;slide 3 Northwest Power and Conservation Council PNW Energy Efficiency AchievementsPNW Energy

95

Fake state attack on practically decoy state quantum key distribution  

E-Print Network [OSTI]

In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

Yong-gang Tan

2012-02-15T23:59:59.000Z

96

QKD with finite resources: secret key rates via Rényi entropies  

E-Print Network [OSTI]

A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

2011-05-27T23:59:59.000Z

97

Climate Action Planning: A Review of Best Practices, Key Elements...  

Open Energy Info (EERE)

Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

98

TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring...  

Broader source: Energy.gov (indexed) [DOE]

Radiation Monitoring Subgroup TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring Subgroup Radiation Monitoring Subgroup Draft Work Plan - February 4, 2008 More...

99

LANL breaks ground on key sediment control project  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sediment control project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and...

100

Hydrodynamic experiment provides key data for Stockpile Stewardship  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

predictively model and assess weapon performance in the absence of full-scale underground nuclear testing," said Webster. Los Alamos hydrodynamic experiment provides key data for...

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Worldwide Trends in Energy Use and Efficiency: Key Insights from...  

Open Energy Info (EERE)

Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

102

Water dynamics clue to key residues in protein folding  

SciTech Connect (OSTI)

A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

2010-01-29T23:59:59.000Z

103

Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

104

Key Practical Issues in Strengthening Safety Culture, INSAG-15  

Broader source: Energy.gov [DOE]

Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

105

Energy Security: A Key Requirement forSustainable Development  

E-Print Network [OSTI]

1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

106

Prairie Fruit Summary, 2010 Some key considerations for the homeowner  

E-Print Network [OSTI]

1 Prairie Fruit Summary, 2010 Some key considerations for the homeowner by Bob Bors The following list highlights some key positive (+), negative (-) and variable ( ± ) attributes for growing fruit into account. For more info visit: www.fruit.usask.ca Haskap/Blue Honeysuckle: - All varieties are very cold

Peak, Derek

107

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

108

Reflective cracking of shear keys in multi-beam bridges  

E-Print Network [OSTI]

..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

Sharpe, Graeme Peter

2009-06-02T23:59:59.000Z

109

Public Key Encryption that Allows PIR Queries Eyal Kushilevitz  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

110

Public Key Encryption that Allows PIR Queries Eyal Kushilevitz  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

Ostrovsky, Rafail

111

Electricity and Development: Global Trends and Key Challenges  

E-Print Network [OSTI]

Electricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12 and the transport burden in Tanzania. Source: Modi, 2004 #12;2. Energy and Human Development Access to electricity

112

Key ornamental innovations facilitate diversification in an avian radiation  

E-Print Network [OSTI]

Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

Rubenstein, Dustin R.

113

Practical Key-Recovery for All Possible Parameters of SFLASH  

E-Print Network [OSTI]

function over a finite field. However, unlike RSA this power function is an easy-to-invert bijec- tion a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older from the public-key. The attack uses new crypt- analytic tools, most notably pencils of matrices

Fouque, Pierre-Alain

114

Offshore Wind Power Experiences, Potential and Key Issues for  

E-Print Network [OSTI]

Offshore Wind Power Experiences, Potential and Key Issues for Deployment JĂžrgen Lemming, Poul Erik-Erik Clausen Title: Offshore Wind Power Experiences, Potential and Key Issues for Deployment Division: VEA, SYS RisĂž-R-1673(EN) January 2008 Abstract: Wind power has been growing at spectacular rates. Today

115

Apparatus, system, and method for synchronizing a timer key  

DOE Patents [OSTI]

A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

2014-04-22T23:59:59.000Z

116

Ultracompact HII Regions  

E-Print Network [OSTI]

We review some recent observational results on the properties of ultracompact HII regions, in particular the presence of extended continuum emission surrounding ultracompact sources and the discovery of a new class of so-called ``Hypercompact'' HII regions. In addition, we discuss recent attempts to probe the density structure within UC HII regions using the technique of spectral index analysis.

Stan Kurtz; Jose Franco

2001-11-20T23:59:59.000Z

117

Control of Regional and Global Weather  

E-Print Network [OSTI]

Author suggests and researches a new revolutionary idea for regional and global weather control. He offers to cover cities, bad regions of country, full country or a continent by a thin closed film with control clarity located at a top limit of the Earth troposphere (4 - 6 km). The film is supported at altitude by small additional atmospheric pressure and connected to ground by thin cables. It is known, the troposphere defines the Earth weather. Authors show this closed dome allows to do a full control of the weather in a given region (the day is always fine, the rain is only in night, no strong wind). The average Earth (white cloudy) reflectance equal 0.3 - 0.5. That means the Earth losses about 0.3 - 0.5 of a solar energy. The dome controls the clarity of film and converts the cold regions to subtropics and creates the hot deserts, desolate wildernesses to the prosperous regions with temperate climate. That is a realistic and the cheapest method of the weather control in the Earth at the current time. Key words: Global weather control, gigantic film dome, converting a cold region to subtropics, converting desolate wilderness to a prosperous region.

Alexander Bolonkin

2007-01-09T23:59:59.000Z

118

Office Civilian Waste Management Transportation Institutional Program Update on Collaborative Efforts with Key Stakeholders  

SciTech Connect (OSTI)

The Department of Energy's (DOE) Office of Civilian Radioactive Waste Management (OCRWM) created the Office of National Transportation in 2003 recognizing the need to revitalize and accelerate development of the transportation system. The Department has made a commitment to work through a collaborative planning process before developing specific policies and procedures and making transportation decisions. OCRWM has begun to build the institutional framework to support development of this transportation system. Interactions with stakeholders have been initiated. The authors describe the key stakeholders, identified issues, regional and national planning activities, and mechanisms for interaction.

E. Saris; P. Austin; J.J. Offner

2004-12-29T23:59:59.000Z

119

Reactive Support and Voltage Control Service: Key Issues and Challenges  

E-Print Network [OSTI]

reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

Gross, George

120

Detailed Description of Key NIF Milestones for NNSA Description  

E-Print Network [OSTI]

1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Key Factors in Displacement Ventilation Systems for Better IAQ  

E-Print Network [OSTI]

This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

Wang, X.; Chen, J.; Li, Y.; Wang, Z.

2006-01-01T23:59:59.000Z

122

NREL: News - NREL Scientists Find Key Function for Ferredoxins...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

614 NREL Scientists Find Key Function for Ferredoxins in Algae Hydrogen Production Two of six iron-rich proteins shown to have role in algae metabolism; discovery could lead to...

123

Daylight quantum key distribution over 1.6 km  

E-Print Network [OSTI]

Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

2000-01-01T23:59:59.000Z

124

Building America Expert Meeting: Key Innovations for Adding Energy...  

Broader source: Energy.gov (indexed) [DOE]

This report describes an expert meeting hosted by the Building America research team NAHB Research Center, which was held on February 8, 2012, in Orlando, Florida. The topic, Key...

125

Families First: Keys to Successful Family Functioning Communication  

E-Print Network [OSTI]

Families First: Keys to Successful Family Functioning Communication Rick Peterson, Extension Specialist and Assistant Professor, Department of Human Development, Virginia Tech Stephen Green, Department of Human Development, Virginia Tech www.ext.vt.edu Produced by Communications and Marketing, College

Liskiewicz, Maciej

126

Self-referenced continuous-variable quantum key distribution  

E-Print Network [OSTI]

We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

2015-01-01T23:59:59.000Z

127

Nano Lect 1 Questions and Keypoints Key Points  

E-Print Network [OSTI]

Nano Lect 1 ­ Questions and Keypoints Key Points 1. What is nano technology: a. Very small technology with device in the 1nm to 100nm lots of useful properties Questions 1. Define nanotechnology. Is an nano

Smy, Tom

128

Input from Key Stakeholders in the National Security Technology Incubator  

SciTech Connect (OSTI)

This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

None

2008-01-31T23:59:59.000Z

129

CEMI Western Regional Summit  

Broader source: Energy.gov [DOE]

Please Join Assistant Secretary of Energy Dr. David Danielson for the Clean Energy Manufacturing Initiative's Western Regional Summit. Register now for this free event.

130

HYDROGEN REGIONAL INFRASTRUCTURE PROGRAM  

E-Print Network [OSTI]

to serve as "go-to" organization to catalyze PA Hydrogen and Fuel Cell Economy development #12;FundingHYDROGEN REGIONAL INFRASTRUCTURE PROGRAM IN PENNSYLVANIA HYDROGEN REGIONAL INFRASTRUCTURE PROGRAM IN PENNSYLVANIA Melissa Klingenberg, PhDMelissa Klingenberg, PhD #12;Hydrogen ProgramHydrogen Program Air Products

131

Regional Analysis Briefs  

Reports and Publications (EIA)

Regional Analysis Briefs (RABs) provide an overview of specific regions that play an important role in world energy markets, either directly or indirectly. These briefs cover areas that are currently major producers (Caspian Sea), have geopolitical importance (South China Sea), or may have future potential as producers or transit areas (East Africa, Eastern Mediterranean).

2028-01-01T23:59:59.000Z

132

Regional Transportation Coordination Study  

E-Print Network [OSTI]

Regional Planning Commission Wanda Carter-Dyer Public Transportation Coordinator Texas Department of Transportation Councilperson Debra Martinez Briseno Cities in Calhoun County Laura G. Sanders Executive Director Golden Crescent Workforce... Regional Planning Commission Wanda Carter-Dyer Public Transportation Coordinator Texas Department of Transportation Councilperson Debra Martinez Briseno Cities in Calhoun County Laura G. Sanders Executive Director Golden Crescent Workforce...

Golden Crescent Regional Planning Commission

133

Regional Competitions - EERE Commercialization Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Regional Competitions Six Regional Clean Energy Business Plan Competitions are taking place across the country- representing all of the United States' distinct regions. The...

134

Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities  

SciTech Connect (OSTI)

Grid parity--or break-even cost--for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that local incentives rather than ?technical? parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

2009-12-01T23:59:59.000Z

135

How Do I Use Renewable Energy in My Region?  

SciTech Connect (OSTI)

NREL can asses renewable energy resource information and integrate it with data using geographic information systems (GIS) and interface the data with key analytical models. Planners and energy developers use these integrated resource assessments to make decisions about the feasibility, cost-effectiveness, and risks of developing projects in specific locations and for regional planning.

Not Available

2005-11-01T23:59:59.000Z

136

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris Škori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

137

Field Test of Measurement-Device-Independent Quantum Key Distribution  

E-Print Network [OSTI]

A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

2014-08-11T23:59:59.000Z

138

Security Proof of a Semi-Quantum Key Distribution Protocol  

E-Print Network [OSTI]

Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their security analysis is difficult and little is known concerning how secure they are compared to their fully quantum counterparts. In this paper we prove the unconditional security of a particular semi-quantum protocol. We derive an expression for the key rate of this protocol, in the asymptotic scenario, as a function of the quantum channel's noise. Finally, we will show that this semi-quantum protocol can tolerate a maximal noise level comparable to certain fully quantum protocols.

Walter O. Krawec

2014-11-30T23:59:59.000Z

139

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey DatesKey

140

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKeyKey Dates

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKeyKey

142

Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington, DC 20585on253.16582104)Key Issues Key

143

Key Concepts in Project Development and Financing in Alaska  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKeyAbout

144

Regional Districts (Texas)  

Broader source: Energy.gov [DOE]

Adjacent Water Control and Improvement Districts and Municipal Utility Districts can opt to form a Regional District to oversee water issues. Such districts may be created:(1) to purchase, own,...

145

Regional Carbon Sequestration Partnerships  

Broader source: Energy.gov [DOE]

DOE has created a network of seven Regional Carbon Sequestration Partnerships (RCSPs) to help develop the technology, infrastructure, and regulations to implement large-scale CO2 storage (also...

146

BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo  

E-Print Network [OSTI]

BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

147

Cedar Key Aquaculture Workshop Sulfide Concentrations in Sediments  

E-Print Network [OSTI]

Cedar Key Aquaculture Workshop Sulfide Concentrations in Sediments and Water: Influence on Hard;ObjectivesObjectives Examine sediment sulfide levels in the SuwanneeExamine sediment sulfide levels of sulfide on hard clam survivalsurvival #12;MethodsMethods SedimentSediment porewaterporewater samples

Florida, University of

148

Dictionaries Using Variable-Length Keys and Data, with Applications *  

E-Print Network [OSTI]

(Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

Blelloch, Guy E.

149

TICKS: KEY TO GENERA IN UNITED STATES Harry D. Pratt  

E-Print Network [OSTI]

·38 TICKS: KEY TO GENERA IN UNITED STATES Harry D. Pratt I Capitulum inferior; scutum absent. without definite sutural line. anus, indistinct, or absent. j ~ I lated .... ~ :. / ORNITHODOROS I ment Mouthparts much longer than ..~".'LJv--_, .0",,,,L } }_..., ---'~':r,.-.__.{ Mouthparts as long as basis

150

news and views A key issue for hydrogen storage materi-  

E-Print Network [OSTI]

news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

Palumbi, Stephen

151

Using Key Performance Indicators to Manage Energy Costs  

E-Print Network [OSTI]

-effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

Van Gorp, J. C.

2005-01-01T23:59:59.000Z

152

Page 1 of 4 Creating and Submitting a Key Request  

E-Print Network [OSTI]

of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

Howitt, Ivan

153

Cold Boot Key Recovery by Solving Polynomial Systems with Noise  

E-Print Network [OSTI]

Cold Boot Key Recovery by Solving Polynomial Systems with Noise Martin Albrecht and Carlos Cid 1 proposed in [9]; the technique was called Cold Boot attacks. When considering block ciphers Cold Boot attacks, was proposed in [9] and also provided an insight into the strength of a particular

Sheldon, Nathan D.

154

The Seven Keys to Success in Energy Management and Conservation  

E-Print Network [OSTI]

This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

Darby, D. F.

1984-01-01T23:59:59.000Z

155

SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK  

E-Print Network [OSTI]

SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK Murat Cihan1 and Cžetin Kaya Kožc2,3 1 I@eecs.oregonstate.edu Abstract. Mobile ad hoc networks require specialized authentication protocols due to the mobility of users and lack of always-available trusted servers. There are a variety of mobile ad hoc authentication protocols

156

Termites, elephants and fire are key drivers of tree mortality  

E-Print Network [OSTI]

mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

157

Daylight quantum key distribution over 1.6 km  

E-Print Network [OSTI]

Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

2000-01-25T23:59:59.000Z

158

Key words: STREAMLINE, yeast, scale up, automation, sanitization.  

E-Print Network [OSTI]

adsorption by defining a realistic process example at small scale and taking it all the way up to a fullyKey words: STREAMLINE, yeast, scale up, automation, sanitization. Abstract This application note was evaluated by performing a sanitization study in which the column and system were challenged with culture

Lebendiker, Mario

159

Highly Efficient Quantum Key Distribution Immune to All Detector Attacks  

E-Print Network [OSTI]

Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

2014-10-10T23:59:59.000Z

160

Essentials of Energy Key concepts for the day  

E-Print Network [OSTI]

Essentials of Energy 4/14/05 Key concepts for the day Markets monopoly Substitution volatility Energy intensity Levelized costs externalities I. Market essentials Are there working energy markets · international geo-political issues Speculation Long lead times for development so supply is not very responsive

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches  

E-Print Network [OSTI]

Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

162

BERNAL and RESTREPO Key issues for decentralization in municipal  

E-Print Network [OSTI]

BERNAL and RESTREPO Key issues for decentralization in municipal wastewater treatment Diana Paola, the inadequate management and disposal of wastewater and the implementation of sophisticated treatment systems is the decentralisation in wastewater treatment. In this article, it is proposed an overview of the state of the art

Boyer, Edmond

163

Public-Key Locally-Decodable Codes Brett Hemenway  

E-Print Network [OSTI]

Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

Ostrovsky, Rafail

164

In 2010 a group of key forestry players  

E-Print Network [OSTI]

Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

165

The U.S. ISO Key Project on Quasars  

E-Print Network [OSTI]

Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

1998-09-22T23:59:59.000Z

166

Architecture of the Secoqc Quantum Key Distribution network  

E-Print Network [OSTI]

The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

Mehrdad Dianati; Romain Alleaume

2006-10-25T23:59:59.000Z

167

The Design of a Group Key Agreement API Giuseppe Ateniese  

E-Print Network [OSTI]

and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

Kim, Dae-Shik

168

Cryptanalysis of two knapsack public-key cryptosystems  

E-Print Network [OSTI]

Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

169

Putting cancer in focusPathologists key to picking the  

E-Print Network [OSTI]

Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

Eichman, Brandt F.

170

Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes  

E-Print Network [OSTI]

Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

171

The Key Coal Producers ONLINE SUPPORTING MATERIALS to  

E-Print Network [OSTI]

The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

Patzek, Tadeusz W.

172

Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,  

E-Print Network [OSTI]

Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

Zheng, Yuliang

173

Northeast Regional Biomass Program  

SciTech Connect (OSTI)

The Northeast Regional Biomass Program has been in operation for a period of nine years. During this time, state managed programs and technical programs have been conducted covering a wide range of activities primarily aim at the use and applications of wood as a fuel. These activities include: assessments of available biomass resources; surveys to determine what industries, businesses, institutions, and utility companies use wood and wood waste for fuel; and workshops, seminars, and demonstrations to provide technical assistance. In the Northeast, an estimated 6.2 million tons of wood are used in the commercial and industrial sector, where 12.5 million cords are used for residential heating annually. Of this useage, 1504.7 mw of power has been generated from biomass. The use of wood energy products has had substantial employment and income benefits in the region. Although wood and woodwaste have received primary emphasis in the regional program, the use of municipal solid waste has received increased emphasis as an energy source. The energy contribution of biomass will increase as potentia users become more familiar with existing feedstocks, technologies, and applications. The Northeast Regional Biomass Program is designed to support region-specific to overcome near-term barriers to biomass energy use.

Lusk, P.D.

1992-12-01T23:59:59.000Z

174

Regional companies eye growth  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromising ScienceRecentRegional companies eye growth Regional

175

Public key Steganography Using Discrete Cross-Coupled Chaotic Maps  

E-Print Network [OSTI]

By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

2012-11-01T23:59:59.000Z

176

I t=106sec3a 10 Energy key) 10'  

E-Print Network [OSTI]

. Optics for EUV, X-Ray, and Gamma-Ray Astronomy II, edited by Oberto Citterio, Stephen L. O'Dell, ProcRXTE HE& I t=106sec3a - AEIEH/2 a =10 - 10 Energy key) 10' IBIS NuSTAR Hard X-ray Optics Jason ESTAR will be the first satellite mission to employ focusing optics in the hard X-ray band (8- 80 keV). Its design

177

Economy key to 1992 U. S. oil, gas demand  

SciTech Connect (OSTI)

This paper provides a forecast US oil and gas markets and industry in 1992. An end to economic recession in the U.S. will boost petroleum demand modestly in 1992 after 2 years of decline. U.S. production will resume its slide after a fractional increase in 1991. Drilling in the U.S. will set a record low. Worldwide, the key questions are economic growth and export volumes from Iraq, Kuwait, and former Soviet republics.

Beck, R.J.

1992-01-27T23:59:59.000Z

178

City of Key West, Florida (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhio (UtilityHolyrood, Kansas (Utility Company)JohnsonKennett, MissouriKey

179

Regional Report Issue Paper  

E-Print Network [OSTI]

Regional Report Introduction The economy of the United States is more than three and one-half years accounting for both increasing shares of the economy and of recessionary employment losses. Manufacturing, driven by globalization and advancing information technology. Recoveries now produce jobs new

180

architecture architecture urban & regional  

E-Print Network [OSTI]

in architectural design, history, building construction, structures, and environmental technology from ourlandscape architecture architecture urban & regional planning environment + design college of fine-disciplinary studies. 18-to-1 Student-Teacher Ratio You'll enjoy individual, one-on-one attention in your architecture

Hwu, Wen-mei W.

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

New Approach to Quantum Key Distribution Via Quantum Encryption  

E-Print Network [OSTI]

In this Paper, we investigate the security of Zhang, Li and Guo quantum key distribution via quantum encryption protocol [$\\text{Phys. Rev. A} \\textbf{64}, 24302 (2001)$] and show that it is not secure against some of Eve's attacks and with the probability one half she gets all of keys without being detected by the two parties. The main defect in this protocol is that there is an attack strategy by which Eve can change the previously shared Bell state between Alice and Bob to two Bell states among herself and Alice and Bob. Hence, we show that with probability $1/d$ its generalization to $d$-dimension systems is not secure and show that its extension to the case of more partners based on the reusable GHZ states is not secure and with probability one half Eve gets all of keys without being detected by the two parties. In what follows, we show how in going to higher dimensions those protocols can be repaired.

A. Fahmi

2006-04-25T23:59:59.000Z

182

THE IMPACT OF NEW IONIZING FLUXES ON ISO OBSERVATIONS OF HII REGIONS AND STARBURSTS \\Lambda  

E-Print Network [OSTI]

1 THE IMPACT OF NEW IONIZING FLUXES ON ISO OBSERVATIONS OF HII REGIONS AND STARBURSTS \\Lambda on the IR lines are shown. First comparisons of our starburst models with IR­diagnostics and the ISO observations of Genzel et al. (1998) are also presented. Key words: HII regions, galaxies: starburst, ISO. 1

Schaerer, Daniel

183

E-Print Network 3.0 - access technologies key Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

electronic identifier (IdentiKey) including access and password requirements, account lockout... that are accessed using a university electronic identifier or IdentiKey. The...

184

A Comparison of Key PV Backsheet and Module Properties from Fielded...  

Broader source: Energy.gov (indexed) [DOE]

of Key PV Backsheet and Module Properties from Fielded Module Exposures and Accelerated Test Conditions A Comparison of Key PV Backsheet and Module Properties from Fielded...

185

The continental margin is a key source of iron to the HNLC North Pacific Ocean  

SciTech Connect (OSTI)

Here we show that labile particulate iron and manganese concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll (HNLC) region, have prominent subsurface maxima between 100-200 m, reaching 3 nM and 600 pM, respectively. The subsurface concentration maxima in particulate Fe are characterized by a more reduced oxidation state, suggesting a source from primary volcagenic minerals such as from the Kuril/Kamchatka margin. The systematics of these profiles suggest a consistently strong lateral advection of labile Mn and Fe from redox-mobilized labile sources at the continental shelf supplemented by a more variable source of Fe from the upper continental slope. This subsurface supply of iron from the continental margin is shallow enough to be accessible to the surface through winter upwelling and vertical mixing, and is likely a key source of bioavailable Fe to the HNLC North Pacific.

Lam, P.J.; Bishop, J.K.B

2008-01-15T23:59:59.000Z

186

Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)  

SciTech Connect (OSTI)

"Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

2009-12-01T23:59:59.000Z

187

Similarities and Differences between Coronal Holes and the Quiet Sun: Are Loop Statistics the Key?  

E-Print Network [OSTI]

Coronal holes (CH) emit significantly less at coronal temperatures than quiet-Sun regions (QS), but can hardly be distinguished in most chromospheric and lower transition region lines. A key quantity for the understanding of this phenomenon is the magnetic field. We use data from SOHO/MDI to reconstruct the magnetic field in coronal holes and the quiet Sun with the help of a potential magnetic model. Starting from a regular grid on the solar surface we then trace field lines, which provide the overall geometry of the 3D magnetic field structure. We distinguish between open and closed field lines, with the closed field lines being assumed to represent magnetic loops. We then try to compute some properties of coronal loops. The loops in the coronal holes (CH) are found to be on average flatter than in the QS. High and long closed loops are extremely rare, whereas short and low-lying loops are almost as abundant in coronal holes as in the quiet Sun. When interpreted in the light of loop scaling laws this result suggests an explanation for the relatively strong chromospheric and transition region emission (many low-lying, short loops), but the weak coronal emission (few high and long loops) in coronal holes. In spite of this contrast our calculations also suggest that a significant fraction of the cool emission in CHs comes from the open flux regions. Despite these insights provided by the magnetic field line statistics further work is needed to obtain a definite answer to the question if loop statistics explain the differences between coronal holes and the quiet Sun.

T. Wiegelmann; S. K. Solanki

2008-02-01T23:59:59.000Z

188

Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal  

E-Print Network [OSTI]

Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

189

Key results from SB8 simulant flowsheet studies  

SciTech Connect (OSTI)

Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

Koopman, D. C.

2013-04-26T23:59:59.000Z

190

Orthogonal-state-based protocols of quantum key agreement  

E-Print Network [OSTI]

Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

Chitra Shukla; Nasir Alam; Anirban Pathak

2013-10-05T23:59:59.000Z

191

2014 CATEE: Collaboration is the Key- Public/Private Partnerships  

E-Print Network [OSTI]

, Texas Nov. 18-20 HGOC Education and Outreach ? District Meetings ? Peer Exchange ? Workshops ? Webinars ? One-on-One Trainings ? Newsletters ? Social media ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18...2014 CATEE Collaboration is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston...

Lin, L.

2014-01-01T23:59:59.000Z

192

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 ThrottledInformation KumasiTools < LEDSGP‎ | DIA-Toolkit Jump<Key

193

NERSC Played Key Role in Nobel Laureate's Discovery  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSC logos arePlayed Key Role in Nobel

194

NNSA Administrator, Three Lab Directors Tour Key Weapons Facility |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffreyKey ActionsThe NextAwards

195

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey Dates

196

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey

197

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe ÎČ-Research andA Hollow-IonHybridA Key

198

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe ÎČ-Research andA Hollow-IonHybridA KeyA

199

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe ÎČ-Research andA Hollow-IonHybridA KeyAA

200

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe ÎČ-Research andA Hollow-IonHybridA KeyAAA

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Iron is the Key to Preserving Dinosaur Soft Tissue  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for andFuel-Efficient Engines |Iron is the Key to

202

Iron is the Key to Preserving Dinosaur Soft Tissue  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for andFuel-Efficient Engines |Iron is the Key toIron is

203

Key Activities in Energy Efficiency | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » Key Activities

204

GE Key Partner in Innovation Institutes | GE Global Research  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Big Sky Learning Fun with Big SkyDIII-D Performance ToolsGlobalIs Key

205

Key Activities in Wind Energy | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |EnergyonSupport0.pdf5 OPAM SEMIANNUAL REPORT TOJaredKansas City DataKen Salazar AboutKey

206

Key Activities of the Geothermal Technologies Office | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana.ProgramJulietipDepartmentJuneWhen IAjani Stewart was close toKeri FultonKey

207

Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASL Symposium:and Technical Information Catalogue ofKEY

208

Florida Keys El Coop Assn, Inc | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Power Basics (TheEtelligence (SmartHome Kyoung's pictureFlint ElectricKeys El

209

US Green Building Council Keys Branch Presents: Designing Mosquito Free Cisterns  

E-Print Network [OSTI]

Higgins, Sustainability Director - City of Key West Rainwater Harvesting from Roof Collection through

Watson, Craig A.

210

Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys  

E-Print Network [OSTI]

Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

Paris-Sud XI, Université de

211

Encryption Key Search using Java-based ALiCE Grid  

E-Print Network [OSTI]

Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

Virkar, Ameya

212

Regional Energy Baseline  

E-Print Network [OSTI]

ESL-TR-11-09-02 REGIONAL ENERGY BASELINE (1960 ~ 2009) 0 100 200 300 400 500 600 700 800 1960 1965 1970 1975 1980 1985 1990 1995 2000 2005 To tal En erg y U se pe r C ap ita (M MB tu) Year Total Energy... Use per Capita (1960-2009) US SEEC 12-States TX Hyojin Kim Juan-Carlos Baltazar, Ph.D. Jeff S. Haberl, Ph.D., P.E. September 2011 ENERGY SYSTEMS LABORATORY Texas Engineering Experiment Station Texas A&M University...

Kim, H.; Baltazar, J.C.; Haberl, J.

213

Regional Science Bowl 2015  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromising ScienceRecent SRELRecyclingProjectsRegionalRegionaldefault

214

Regional Education Partners  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearch Welcome to theNewsCenterandGas SeparationsRelevantRegional

215

Colorado Regional Faults  

SciTech Connect (OSTI)

Citation Information: Originator: Earth Science &Observation Center (ESOC), CIRES, University of Colorado at Boulder Originator: Colorado Geological Survey (CGS) Publication Date: 2012 Title: Regional Faults Edition: First Publication Information: Publication Place: Earth Science & Observation Center, Cooperative Institute for Research in Environmental Science, University of Colorado, Boulder Publisher: Earth Science &Observation Center (ESOC), CIRES, University of Colorado at Boulder Description: This layer contains the regional faults of Colorado Spatial Domain: Extent: Top: 4543192.100000 m Left: 144385.020000 m Right: 754585.020000 m Bottom: 4094592.100000 m Contact Information: Contact Organization: Earth Science &Observation Center (ESOC), CIRES, University of Colorado at Boulder Contact Person: Khalid Hussein Address: CIRES, Ekeley Building Earth Science & Observation Center (ESOC) 216 UCB City: Boulder State: CO Postal Code: 80309-0216 Country: USA Contact Telephone: 303-492-6782 Spatial Reference Information: Coordinate System: Universal Transverse Mercator (UTM) WGS’1984 Zone 13N False Easting: 500000.00000000 False Northing: 0.00000000 Central Meridian: -105.00000000 Scale Factor: 0.99960000 Latitude of Origin: 0.00000000 Linear Unit: Meter Datum: World Geodetic System 1984 (WGS ’984) Prime Meridian: Greenwich Angular Unit: Degree Digital Form: Format Name: Shape file

Hussein, Khalid

2012-02-01T23:59:59.000Z

216

Southeast Regional Carbon Sequestration Partnership (SECARB)  

SciTech Connect (OSTI)

The Southeast Regional Carbon Sequestration Partnership (SECARB) is a diverse partnership covering eleven states involving the Southern States Energy Board (SSEB) an interstate compact; regulatory agencies and/or geological surveys from member states; the Electric Power Research Institute (EPRI); academic institutions; a Native American enterprise; and multiple entities from the private sector. Figure 1 shows the team structure for the partnership. In addition to the Technical Team, the Technology Coalition, an alliance of auxiliary participants, in the project lends yet more strength and support to the project. The Technology Coalition, with its diverse representation of various sectors, is integral to the technical information transfer, outreach, and public perception activities of the partnership. The Technology Coalition members, shown in Figure 2, also provide a breadth of knowledge and capabilities in the multiplicity of technologies needed to assure a successful outcome to the project and serve as an extremely important asset to the partnership. The eleven states comprising the multi-state region are: Alabama; Arkansas; Florida; Georgia; Louisiana; Mississippi; North Carolina; South Carolina; Tennessee; Texas; and Virginia. The states making up the SECARB area are illustrated in Figure 3. The primary objectives of the SECARB project include: (1) Supporting the U.S. Department of Energy (DOE) Carbon Sequestration Program by promoting the development of a framework and infrastructure necessary for the validation and deployment of carbon sequestration technologies. This requires the development of relevant data to reduce the uncertainties and risks that are barriers to sequestration, especially for geologic storage in the SECARB region. Information and knowledge are the keys to establishing a regional carbon dioxide (CO{sub 2}) storage industry with public acceptance. (2) Supporting the President's Global Climate Change Initiative with the goal of reducing greenhouse gas intensity by 18 percent by 2012. A corollary to the first objective, this objective requires the development of a broad awareness across government, industry, and the general public of sequestration issues and establishment of the technological and legal frameworks necessary to achieve the President's goal. The information developed by the SECARB team will play a vital role in achieving the President's goal for the southeastern region of the United States. (3) Evaluating options and potential opportunities for regional CO{sub 2} sequestration. This requires characterization of the region regarding the presence and location of sources of greenhouse gases (GHGs), primarily CO{sub 2}, the presence and location of potential carbon sinks and geological parameters, geographical features and environmental concerns, demographics, state and interstate regulations, and existing infrastructure.

Kenneth J. Nemeth

2005-09-30T23:59:59.000Z

217

Innovative . Flexible . RegionalInnovative . Flexible . Regional Health Care  

E-Print Network [OSTI]

Executive Master in Innovative . Flexible . RegionalInnovative . Flexible . Regional Health Care Learning Outcomes Health Systems, Policy and Reform - Communicating with Policy Makers - Evidence - Human Resources Management - Data and Decision Making Executive Master in Health Care Leadership (EMHCL

Shihadeh, Alan

218

WEST COAST REGIONAL CARBON SEQUESTRATION PARTNERSHIP  

SciTech Connect (OSTI)

The West Coast Regional Carbon Sequestration Partnership is one of seven partnerships which have been established by the US Department of Energy (DOE) to evaluate carbon dioxide capture, transport and sequestration (CT&S) technologies best suited for different regions of the country. The West Coast Region comprises Arizona, California, Nevada, Oregon, Washington, and the North Slope of Alaska. Led by the California Energy Commission, the West Coast Partnership is a consortium of over thirty five organizations, including state natural resource and environmental protection agencies; national labs and universities; private companies working on CO{sub 2} capture, transportation, and storage technologies; utilities; oil and gas companies; nonprofit organizations; and policy/governance coordinating organizations. In an eighteen month Phase I project, the Partnership will evaluate both terrestrial and geologic sequestration options. Work will focus on five major objectives: (1) Collect data to characterize major CO{sub 2} point sources, the transportation options, and the terrestrial and geologic sinks in the region, and compile and organize this data via a geographic information system (GIS) database; (2) Address key issues affecting deployment of CT&S technologies, including storage site permitting and monitoring, injection regulations, and health and environmental risks (3) Conduct public outreach and maintain an open dialogue with stakeholders in CT&S technologies through public meetings, joint research, and education work (4) Integrate and analyze data and information from the above tasks in order to develop supply curves and cost effective, environmentally acceptable sequestration options, both near- and long-term (5) Identify appropriate terrestrial and geologic demonstration projects consistent with the options defined above, and create action plans for their safe and effective implementation A kickoff meeting for the West Coast Partnership was held on Sept 30-Oct.1. Contracts were then put into place with twelve organizations which will carry out the technical work required to meet Partnership objectives.

Larry Myer; Terry Surles; Kelly Birkinshaw

2004-01-01T23:59:59.000Z

219

Southern Region Watershed Management Project  

E-Print Network [OSTI]

Coordinators and the organization, management and activities of the Southern Region Water Quality Planning1 Southern Region Watershed Management Project September 15, 2000 to September 14, 2005 Terminal responding to water quality and conservation issues with educational assistance, technology development

220

6, 1332313366, 2006 Regional pollution  

E-Print Network [OSTI]

ACPD 6, 13323­13366, 2006 Regional pollution potentials of major population centers M. G. Lawrence a Creative Commons License. Atmospheric Chemistry and Physics Discussions Regional pollution potentials. Lawrence (lawrence@mpch-mainz.mpg.de) 13323 #12;ACPD 6, 13323­13366, 2006 Regional pollution potentials

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Regional Summary Pacific Management Context  

E-Print Network [OSTI]

. Bocaccio, Pacific ocean perch, cowcod, and darkblotched and widow rockfish are currently in rebuildingRegional Summary Pacific Management Context The Pacific Region includes California, Oregon, and Washington. Federal fisheries in this region are managed by the Pacific Fishery Management Council (PFMC

222

Some Key Questions in the Climate Change Policy Debate  

U.S. Energy Information Administration (EIA) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ <Information Administration (EIA) 10 MECS Survey Data9c : U.S. RegionalAndyFuture ofSetting-

223

Risk and Performance Technologies: Identifying the Keys to Successful Implementation  

SciTech Connect (OSTI)

The nuclear power industry has been utilizing risk and performance based technologies for over thirty years. Applications of these technologies have included risk assessment (e.g. Individual Plant Examinations), burden reduction (e.g. Risk-Informed Inservice Inspection, RI-ISI) and risk management (Maintenance Rule, 10CFR50.65). Over the last five to ten years the number of risk-informed (RI) burden reduction initiatives has increased. Unfortunately, the efficiencies of some of these applications have been questionable. This paper investigates those attributes necessary to support successful, cost-effective RI-applications. The premise to this paper is that by understanding the key attributes that support one successful application, insights can be gleaned that will streamline/coordinate future RI-applications. This paper is an extension to a paper presented at the Pressure Vessel and Piping (PVP-2001) Conference. In that paper, a number issues and opportunities were identified that needed to be assessed in order to support future (and efficient) RI-applications. It was noted in the paper that a proper understanding and resolution of these issues will facilitate implementation of risk and performance technology in the operation, maintenance and design disciplines. In addition, it will provide the foundation necessary to support regulatory review and approval. (authors)

McClain, Lynn [Niagara Mohawk (United States); Smith, Art [Entergy Operations (United States); O'Regan, Patrick [Electric Power Research Institute - EPRI, 3420 Hillview Avenue, Palo Alto, California 94304 (United States)

2002-07-01T23:59:59.000Z

224

Environmental labelling of green electricity with LCA key parameter models  

E-Print Network [OSTI]

Since the opening of European electricity markets, companies are launching green electricity products. In Switzerland the privately initiated eco-label “naturemade star ” ensures the environmental and ecological quality of electricity from renewable energy sources on a local scale and from a life cycle perspective. For the life cycle perspective, a simplified and partly site-specific life cycle assessment (LCA) is applied using the Eco-indicator 99 (Hierachist perspective) impact assessment method. In a first step, detailed LCAs case studies are made for power plants and technologies that are candidates for the „naturemade star “ label. They allow identifying technology-specific parameters that dominate the outcome of the LCA and for which data are available for the owner or operator of the power plant at issue. Based on this knowledge, key parameter models for photovoltaic, wind and hydroelectric power and electricity from biogas have been established on a spreadsheet-basis. With the help of the parameter models, operators of power plants can carry out the required LCA within a few hours. At the same time, they can check whether the plant fulfils the “naturemade star ” threshold or not, which has been set to 50 % of the environmental impact of a gas combined cycle power plant. Within a few months since the introduction of the labelling scheme, companies successfully applied the parameter models on nearly 50 photovoltaic and on several hydroelectric power plants. LCA is, in combination with other tools, a useful method for the definition of standards for environmental labelling of green electricity.

unknown authors

225

Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics  

SciTech Connect (OSTI)

Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

HANSEN,FRANCIS D.

1999-09-01T23:59:59.000Z

226

Understanding Regional Economic Growth in IndiaUnderstanding Regional Economic Growth in India Understanding Regional Economic  

E-Print Network [OSTI]

Understanding Regional Economic Growth in IndiaUnderstanding Regional Economic Growth in India Understanding Regional Economic Growth in India* Jeffrey D. Sachs Director The Earth Institute at Columbia_ramiah@yahoo.co.uk Asian Economic Papers 1:3 © 2002 The Earth Institute at Columbia University and the Massachusetts

227

Lowest Engine-Out Emissions as the Key to the Future of the Heavy...  

Broader source: Energy.gov (indexed) [DOE]

Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

228

Regional-Scale Climate Change: Observations and Model Simulations  

SciTech Connect (OSTI)

This collaborative proposal addressed key issues in understanding the Earthâ??s climate system, as highlighted by the U.S. Climate Science Program. The research focused on documenting past climatic changes and on assessing future climatic changes based on suites of global and regional climate models. Geographically, our emphasis was on the mountainous regions of the world, with a particular focus on the Neotropics of Central America and the Hawaiian Islands. Mountain regions are zones where large variations in ecosystems occur due to the strong climate zonation forced by the topography. These areas are particularly susceptible to changes in critical ecological thresholds, and we conducted studies of changes in phonological indicators based on various climatic thresholds.

Raymond S. Bradley; Henry F. Diaz

2010-12-14T23:59:59.000Z

229

Evaluation of the effects of a highway improvement project on Key deer  

E-Print Network [OSTI]

assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

Braden, Anthony Wayne

2006-10-30T23:59:59.000Z

230

Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser  

E-Print Network [OSTI]

Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

231

Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices  

E-Print Network [OSTI]

to achieve explicit key confirmation. We also point out Wu's scheme decreases efficiency by using the double by the traditional public-key cryptography (Rivest et al., 1978; ElGama, l985). The computation ability and battery the number of users is increased, KAC needs a large storage space to store users' public keys

232

Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates  

E-Print Network [OSTI]

, such as roads, buildings, and pollution. Including these fine-scale attributes of an animal's environment whenImnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat

233

Origin of a complex key innovation in an obligate insectplant mutualism  

E-Print Network [OSTI]

Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

Krenn, Harald W.

234

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin  

E-Print Network [OSTI]

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

235

Distribution and abundance of endangered Florida Key deer on outer islands  

E-Print Network [OSTI]

parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

Watts, Dominque Elijah

2007-04-25T23:59:59.000Z

236

A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the  

E-Print Network [OSTI]

A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale projects are hard, because the impact and relevance of key technologies go beyond their core technological

Zdun, Uwe

237

The key to minimizing minesite versus utility laboratory analyses on Powder River Basin coals  

SciTech Connect (OSTI)

Powder River Basin (PRB) coals are continuing to expand their areas of use into regions previously reserved for higher ranked coals. PRB coals are subbituminous by rank. Inherent moisture values of 25 to 30 percent are the norm. PRB coals, being lower rank in nature, also tend to oxidize very easily. These factors combined produce a coal which can cause analysis problems for laboratories unaccustomed to PRB coals. In fact, even laboratories that deal with this type of coal on a daily basis can experience analytical difficulties. Special care needs to be taken by both minesite laboratory and the utility laboratory to ensure accurate analyses. Cooperation between both parties is the key to reproducible analyses. Only by working together can parties fully analyze the situation and develop analytical methods acceptable to both. This paper will describe the methods employed by the Caballo Rojo Mine (CRM) and the Georgia Power Company (GPC) to resolve laboratory analysis differences found during shipments by CRM to GPC beginning in 1994. The following topics are discussed: initial comparative results, analytical investigations, the cooperative process, recent comparative results, and conclusions.

Rexin, M.G.

1995-08-01T23:59:59.000Z

238

Conservation Regional Conservation SavingsRegional Conservation Savings  

E-Print Network [OSTI]

1 Northwest Power and Conservation Council Regional Conservation SavingsRegional Conservation the Plan''s Targets?s Targets? March 14, 2008 slide 2 Northwest Power and Conservation Council 55thth Plan Conservation ResourcePlan Conservation Resource Acquisition TargetsAcquisition Targets 20052005 ­­ 2009 = 700 a

239

Coordinated Regional Public Transportation Plan: Heart of Texas Region  

E-Print Network [OSTI]

Coordinated Regional Public Transportation Plan Heart of Texas Region Bosque, Falls, Freestone, Hill, Limestone & McLennan Counties December 1, 2006 TABLE OF CONTENTS Acknowledgements... of Texas Council of Governments (HOTCOG) and the McLennan County Youth Collaboration (MCYC) ---21 Central Texas Senior Ministries (CTSM), Hill County Transit (HCT) and Scott and White (S&W) Medical Facilities...

Heart of Texas Council of Governments

2006-12-01T23:59:59.000Z

240

The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.  

SciTech Connect (OSTI)

Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

2010-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices  

SciTech Connect (OSTI)

In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

2011-01-01T23:59:59.000Z

242

1, 497531, 2004 Regional hydrology  

E-Print Network [OSTI]

BGD 1, 497­531, 2004 Regional hydrology controls stream microbial biofilms T. J. Battin et al hydrology controls stream microbial biofilms: evidence from a glacial catchment T. J. Battin1, , A. Wille2@pflaphy.pph.univie.ac.at) 497 #12;BGD 1, 497­531, 2004 Regional hydrology controls stream microbial biofilms T. J. Battin et al

Boyer, Edmond

243

Presentation of Regional SDSN Center  

E-Print Network [OSTI]

;Conference topics: Pollution in the Mediterranean sea Climate change Improving the management Energy#12;Presentation of UN SDSN and MED SDSN Regional SDSN Center for the Mediterranean Region #12;UN for the Mediterranean Basin Why a Mediterranean Network? Shared history Shared environment Shared future MED

Garulli, Andrea

244

NORTHEAST REGIONAL REFINED PETROLEUM PRODUCT RESERVE | Department...  

Broader source: Energy.gov (indexed) [DOE]

NORTHEAST REGIONAL REFINED PETROLEUM PRODUCT RESERVE NORTHEAST REGIONAL REFINED PETROLEUM PRODUCT RESERVE The Northeast region of the U.S. is particularly vulnerable to gasoline...

245

Regional Public Coordination Transportation Plan Texoma Region #22  

E-Print Network [OSTI]

in conjunction with TxDOT to increase public awareness of the project. As an integral part of this project, each of the 24 regions studying public transportation in their area was charged with assessing Barriers, Constraints and Best Practices in public... Sherman TAPS TAPS TAPS operates in seven (7) counties, with three (3) of the counties in the Texoma Region. TAPS services include demand response, commuter bus services and special services. Square Miles Population ?00 Rider Trips ?05 Clay 1...

Texoma Council of Governments

2006-12-01T23:59:59.000Z

246

Wide Area Security Region Final Report  

SciTech Connect (OSTI)

This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.

Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

2010-03-31T23:59:59.000Z

247

Secure multi-party communication with quantum key distribution managed by trusted authority  

DOE Patents [OSTI]

Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

2013-07-09T23:59:59.000Z

248

Daylight operation of a free space, entanglement-based quantum key distribution system  

E-Print Network [OSTI]

Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

2008-01-01T23:59:59.000Z

249

Daylight operation of a free space, entanglement-based quantum key distribution system  

E-Print Network [OSTI]

Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

2008-12-10T23:59:59.000Z

250

E-Print Network 3.0 - apoptosis key players Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: -publication: http:www.landesbioscience.comjournalsccabstract.php?id3262 KEY WORDS cyclin A, apoptosis, Xenopus... is Sufficient but not Required for the...

251

E-Print Network 3.0 - address key issues Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

term schedule. Summary: to their rental fees, before they obtain their locker key. Lockout situations can only be addressed through... of the renter to clean out hisher locker...

252

Modeling Metal Fatigue As a Key Step in PV Module Life Time Prediction (Presentation)  

SciTech Connect (OSTI)

This presentation covers modeling metal fatigue as a key step in photovoltaic (PV) module lifetime predictions. Described are time-dependent and time-independent case studies.

Bosco, N.

2012-02-01T23:59:59.000Z

253

Your biodiversity in my backyard : key local stakeholders' perceptions of biodiversity conservation in Gorontalo, Indonesia.  

E-Print Network [OSTI]

??The establishment of protected areas (PAs) has been the key national strategy in biodiversity conservation, through preserving the unique wildlife and ecosystems in Indonesia. As… (more)

Kartikasari, Sri Nurani

2008-01-01T23:59:59.000Z

254

Anomalous Emission from HII regions  

E-Print Network [OSTI]

Spinning dust appears to be the best explanation for the anomalous emission that has been observed at $\\sim 10-60$ GHz. One of the best examples of spinning dust comes from a HII region in the Perseus molecular cloud. Observations of other HII regions also show tentative evidence for excess emission at frequencies $\\sim 30$ GHz, although at lower emissivity levels. A new detection of excess emission at 31 GHz in the HII region RCW175 has been made. The most plausible explanation again comes from spinning dust. HII regions are a good place to look for spinning dust as long as accurate radio data spanning the $\\sim 5-100$ GHz range is available.

C. Dickinson

2008-08-04T23:59:59.000Z

255

RAFT Regional Algal Feedstock Testbed  

Broader source: Energy.gov [DOE]

Breakout Session 3B—Integration of Supply Chains III: Algal Biofuels Strategy RAFT Regional Algal Feedstock Testbed Kimberly Ogden, Professor, University of Arizona, Engineering Technical Lead, National Alliance for Advanced Biofuels and Bioproducts

256

Pacific Islands Region News Release  

E-Print Network [OSTI]

Pacific Islands Region News Release Contact: Wende Goo FOR IMMEDIATE RELEASE 808-721-4098 May 27 of these unique twins by contributing more than 100 hours of work to construct a holding pen for the young seal

257

Regional  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST3 AÇORIANO ORIENTAL SEGUNDA-FEIRA, 5 DE MARÇO DE

258

Gulf of Mexico Regional Collaborative Final Report  

SciTech Connect (OSTI)

This report presents the results of the Gulf of Mexico Regional Collaborative (GoMRC), a year-long project funded by NASA. The GoMRC project was organized around end user outreach activities, a science applications team, and a team for information technology (IT) development. Key outcomes are summarized below for each of these areas. End User Outreach ? Successfully engaged federal and state end users in project planning and feedback ? With end user input, defined needs and system functional requirements ? Conducted demonstration to End User Advisory Committee on July 9, 2007 and presented at Gulf of Mexico Alliance (GOMA) meeting of Habitat Identification committee ? Conducted significant engagement of other end user groups, such as the National Estuary Programs (NEP), in the Fall of 2007 ? Established partnership with SERVIR and Harmful Algal Blooms Observing System (HABSOS) programs and initiated plan to extend HABs monitoring and prediction capabilities to the southern Gulf. ? Established a science and technology working group with Mexican institutions centered in the State of Veracruz. Key team members include the Federal Commission for the Protection Against Sanitary Risks (COFEPRIS), the Ecological Institute (INECOL) a unit of the National Council for science and technology (CONACYT), the Veracruz Aquarium (NOAA’s first international Coastal Ecology Learning Center) and the State of Veracruz. The Mexican Navy (critical to coastal studies in the Southern Gulf) and other national and regional entities have also been engaged. ? Training on use of SERVIR portal planned for Fall 2007 in Veracruz, Mexico Science Applications ? Worked with regional scientists to produce conceptual models of submerged aquatic vegetation (SAV) ecosystems ? Built a logical framework and tool for ontological modeling of SAV and HABs ? Created online guidance for SAV restoration planning ? Created model runs which link potential future land use trends, runoff and SAV viability ? Analyzed SAV cover change at five other bays in the Gulf of Mexico to demonstrate extensibility of the analytical tools ? Initiated development of a conceptual model for understanding the causes and effects of HABs in the Gulf of Mexico IT Tool Development ? Established a website with the GoMRC web-based tools at www.gomrc.org ? Completed development of an ArcGIS-based decision support tool for SAV restoration prioritization decisions, and demonstrated its use in Mobile Bay ? Developed a web-based application, called Conceptual Model Explorer (CME), that enables non-GIS users to employ the prioritization model for SAV restoration ? Created CME tool enabling scientists to view existing, and create new, ecosystem conceptual models which can be used to document cause-effect relationships within coastal ecosystems, and offer guidance on management solutions. ? Adapted the science-driven advanced web search engine, Noesis, to focus on an initial set of coastal and marine resource issues, including SAV and HABs ? Incorporated map visualization tools with initial data layers related to coastal wetlands and SAVs

Judd, Kathleen S.; Judd, Chaeli; Engel-Cox, Jill A.; Gulbransen, Thomas; Anderson, Michael G.; Woodruff, Dana L.; Thom, Ronald M.; Guzy, Michael; hardin, danny; Estes, Maury

2007-12-01T23:59:59.000Z

259

Regional Transmission Projects: Finding Solutions  

SciTech Connect (OSTI)

The Keystone Center convened and facilitated a year-long Dialogue on "Regional Transmission Projects: Finding Solutions" to develop recommendations that will help address the difficult and contentious issues related to expansions of regional electric transmission systems that are needed for reliable and economic transmission of power within and across regions. This effort brought together a cross-section of affected stakeholders and thought leaders to address the problem with the collective wisdom of their experience and interests. Transmission owners sat at the table with consumer advocates and environmental organizations. Representatives from regional transmission organizations exchanged ideas with state and federal regulators. Generation developers explored common interests with public power suppliers. Together, the Dialogue participants developed consensus solutions about how to begin unraveling some of the more intractable issues surrounding identification of need, allocation of costs, and reaching consensus on siting issues that can frustrate the development of regional transmission infrastructure. The recommendations fall into three broad categories: 1. Recommendations on appropriate institutional arrangements and processes for achieving regional consensus on the need for new or expanded transmission infrastructure 2. Recommendations on the process for siting of transmission lines 3. Recommendations on the tools needed to support regional planning, cost allocation, and siting efforts. List of Dialogue participants: List of Dialogue Participants: American Electric Power American Transmission Company American Wind Energy Association California ISO Calpine Corporation Cinergy Edison Electric Institute Environmental Defense Federal Energy Regulatory Commission Great River Energy International Transmission Company ISO-New England Iowa Public Utility Board Kanner & Associates Midwest ISO National Association of Regulatory Utility Commissioners National Association of State Utility Consumer Advocates National Grid Northeast Utilities PA Office of Consumer Advocates Pacific Gas & Electric Corporation Pennsylvania Public Utility Commission PJM Interconnection The Electricity Consumers Resource Council U.S. Department of Energy US Department of the Interior Van Ness Feldman Western Interstate Energy Board Wind on the Wires Wisconsin Public Service Commission Xcel Energy

The Keystone Center

2005-06-15T23:59:59.000Z

260

Southeast Texas Region Regional Public Transportation Coordination Plan  

E-Print Network [OSTI]

Providers Public transportation in the southeast Texas region includes primarily demand- response service, with two localities managing fixed-route systems. Table 2 identifies the transportation providers within the region. The major transportation... citywide bus services with eleven local routes. PAT operates from 6:15am to 6:15pm five days a week. Annual ridership for BMT totaled 671,420 fixed route and 22,155 demand response trips in 2005, while PAT ridership reached 116,632 fixed route and 20...

Southeast Texas Regional Planning Commission

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Major Long Haul Truck Idling Generators in Key States ELECTRIC POWER RESEARCH INSTITUTE  

E-Print Network [OSTI]

Major Long Haul Truck Idling Generators in Key States 1013776 #12;#12;ELECTRIC POWER RESEARCH-0813 USA 800.313.3774 650.855.2121 askepri@epri.com www.epri.com Major Long Haul Truck Idling Generators Haul Truck Idling Generators in Key States. EPRI, Palo Alto, CA: 2008. 1013776. #12;#12;v PRODUCT

262

The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean  

E-Print Network [OSTI]

The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean Phoebe J. Lam1 concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll a key source of bioavailable Fe to the HNLC North Pacific. Keywords: iron, continental margin, HNLC 1

263

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

264

Granite Recrystallization The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb  

E-Print Network [OSTI]

Granite Recrystallization ­ The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb, and hence the key to the entire strategy, depends on whether sufficient melting of granite host rock can-temperature, high-pressure experiments reported here demonstrate that granite can be partially melted and completely

Sheffield, University of

265

A Single-Key Attack on 6-Round KASUMI Teruo Saito1  

E-Print Network [OSTI]

A Single-Key Attack on 6-Round KASUMI Teruo Saito1 NEC Software Hokuriku, Ltd. 1, Anyoji, Hakusan. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical

266

Band structures Optical absorption Summary Key concepts in Density Functional Theory (II)  

E-Print Network [OSTI]

Band structures Optical absorption Summary Key concepts in Density Functional Theory (II) Kohn, Belfast Key concepts in Density Functional Theory (II) Silvana Botti #12;Band structures Optical in Density Functional Theory (II) Silvana Botti #12;Band structures Optical absorption Summary Outline 1 From

Botti, Silvana

267

An efficient certificateless two-party authenticated key agreement scheme from  

E-Print Network [OSTI]

-based cryptography. Key agreement(KA) schemes are designed to provide secure communications between two or more proposed. However, these schemes need to compute at least one pairing on-line. In order to improve to finished the key agreement. Our scheme's overhead is lower than that of previous schemes [3

268

Modified Bennett-Brassard 1984 Quantum Key Distribution With Two-way Classical Communications  

E-Print Network [OSTI]

The quantum key distribution protocol without public announcement of bases is equipped with a two-way classical communication symmetric entanglement purification protocol. This modified key distribution protocol is unconditionally secure and has a higher tolerable error rate of 20%, which is higher than previous scheme without public announcement of bases.

Kai Wen; Gui Lu Long

2005-08-27T23:59:59.000Z

269

Linkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event  

E-Print Network [OSTI]

of a dark water plume from near Charlotte Harbor, Florida, to the Dry Tortugas in the Florida Keys in mid, respectively. The dark color became increasingly dominated by colored dissolved organic matter, toward the DryLinkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event

270

Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky #  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky a public­key encryption scheme for Alice that allows PIR searching over encrypted documents. Our solution­trivially small communication complexity. The main technique of our solution also allows for Single­Database PIR

271

Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks  

E-Print Network [OSTI]

Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks Xueying-- In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless energy efficiency with a level of security suitable for wireless sensor networks. Keywords - wireless

Heys, Howard

272

A Method for Obtaining Digital Signatures and PublicKey Cryptosystems  

E-Print Network [OSTI]

re­ vealing an encryption key does not thereby reveal the corresponding decryption key. This has two, or the entire work requires specific permission as does republication, or systematic or multiple reproduction . Formally, D(E(M) = M: (1) (b) Both E and D are easy to compute. (c) By publicly revealing E the user does

Goldwasser, Shafi

273

Direct quadrature phase shift keying modulator using six-port technology  

E-Print Network [OSTI]

Direct quadrature phase shift keying modulator using six-port technology Y. Zhao, C. Viereck, J.F. Frigon, R.G. Bosisio and K. Wu A direct quadrature phase shift keying modulator based on six-port technology is presented. The modulator comprises a six-port circuit, a switch matrix and open and short

Frigon, Jean-François

274

Structured Codes Improve the Bennett-Brassard-84 Quantum Key Rate  

E-Print Network [OSTI]

A central goal in information theory and cryptography is finding simple characterizations of optimal communication rates subject to various restrictions and security requirements. Ideally, the optimal key rate for a quantum key distribution (QKD) protocol would be given by {\\em single-letter formula} involving a simple optimization over a single use of an effective channel. We explore the possibility of such a formula for one of the simplest and most widely used QKD protocols--Bennett-Brassard-84 (BB84) with one way classical post-processing. We show that a conjectured single-letter key-rate formula is false, uncovering a deep ignorance about asymptotically good private codes and pointing towards unfortunate complications in the theory of QKD. These complications are not without benefit--with added complexity comes better key rates than previously thought possible. We improve the threshold for secure key generation from a bit error rate of 0.124 to 0.129.

Graeme Smith; Joseph M. Renes; John A. Smolin

2008-04-28T23:59:59.000Z

275

A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE  

SciTech Connect (OSTI)

This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on 'rapid' and, because the available keys contained a very large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained many more genera than we would ever encounter and because this larger number of genera required more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher), more time was required to process samples. In developing this set of keys I emphasized character states that are easier for nonspecialists to recognize. I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that, when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.

Martin, D

2007-09-04T23:59:59.000Z

276

Regional Partnerships | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromising ScienceRecent SRELRecyclingProjectsRegionalRegional

277

Saskatchewan's Regional Colleges: Towards a New System  

E-Print Network [OSTI]

Saskatchewan's Regional Colleges: Towards a New System ReGional ColleGe Review FiNal RepoRT · Ma and any other matters concerning the Act. There are seven regional colleges in Saskatchewan: Carlton TrailVieW CHaiR Saskatchewan's Regional Colleges: Towards a New System #12;ReGional ColleGe Review 2010 Fi

Saskatchewan, University of

278

Bottle Habitat Region: Great Lakes  

E-Print Network [OSTI]

-liter plastic soda bottles for each group · A water source · A light source (sunlight or a halogen lamp) · BlackBottle Habitat Region: Great Lakes Grade Level(s): 5-8 Time Required: One 50 minute class period/Instructional Strategies: 1. Students will, in groups of four, construct 2 aquatic habitats using 2 two-liter soda bottles

279

Regional water planning Milind Sohoni  

E-Print Network [OSTI]

­ irrigation: generally subsidized by state ­ poor households generally subsidized within community #12;CaseRegional water planning Milind Sohoni Pooja Prasad CTARA IIT Bombay #12;Need for planning · Rising Annual Gross Utilisation : 134.26 Mcft. 166.08 Mcft. 12 Top of Dam Level : 103.00 m. 134.00 m. 13 H

Sohoni, Milind

280

Phase-remapping attack in practical quantum-key-distribution systems  

SciTech Connect (OSTI)

Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.

Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong [Center for Quantum Information and Quantum Control, Department of Electrical and Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario (Canada); Tamaki, Kiyoshi [NTT Basic Research Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa 243-0198, Japan and CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Saitama 332-0012 (Japan)

2007-03-15T23:59:59.000Z

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths  

E-Print Network [OSTI]

This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths when we employ the decoy method. Using the formula, we can guarantee the security parameter for realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting.

Masahito Hayashi; Ryota Nakayama

2013-11-19T23:59:59.000Z

282

Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using “Omics”  

SciTech Connect (OSTI)

Soils process and store large amounts of C; however, considerable uncertainty still exists about the details of that influence microbial partitioning of C into soil C pools, and what are the main influential forces that control the fraction of the C input that is stabilized. The soil microbial community is genotypically and phenotypically diverse. Despite our ability to predict the kinds of regional environmental changes that will accompany global climate change, it is not clear how the microbial community will respond to climate-induced modification of precipitation and inter-precipitation intervals, and if this response will affect the fate of C deposited into soil by the local plant community. Part of this uncertainty lies with our ignorance of how the microbial community adapts genotypically and physiologically to changes in soil moisture brought about by shifts in precipitation. Our overarching goal is to harness the power of multiple meta-omics tools to gain greater understanding of the functioning of whole-soil microbial communities and their role in C cycling. We will do this by meeting the following three objectives: 1. Further develop and optimize a combination of meta-omics approaches to study how environmental factors affect microbially-mediated C cycling processes. 2. Determine the impacts of long-term changes in precipitation timing on microbial C cycling using an existing long-term field manipulation of a tallgrass prairie soil. 3. Conduct laboratory experiments that vary moisture and C inputs to confirm field observations of the linkages between microbial communities and C cycling processes. We took advantage of our state-of-the-art expertise in community “omics” to better understand the functioning soil C cycling within the Great Prairie ecosystem, including our ongoing Konza Prairie soil metagenome flagship project at JGI and the unique rainfall manipulation plots (RaMPs) established at this site more than a decade ago. We employed a systems biology approach, considering the complex soil microbial community as a functioning system and using state-of-the-art metatranscriptomic, metaproteomic, and metabolomic approaches. These omics tools were refined, applied to field experiments, and confirmed with controlled laboratory studies. Our experiments were designed to specifically identify microbial community members and processes that are instrumental players in processing of C in the prairie soils and how these processes are impacted by wetting and drying events. This project addresses a key ecosystem in the United States that current climate models predict will be subjected to dramatic changes in rainfall patterns as a result of global warming. Currently Mollisols, such as those of the tallgrass prairie, are thought to sequester more C than is released into the atmosphere, but it is not known what changes in rainfall patterns will have on future C fluxes. Through an analysis of the molecular response of the soil microbial community to shifts in precipitation cycles that are accompanied by phenologically driven changes in quality of plant C rhizodeposits, we gained deeper insight into how the metabolism of microbes has adapted to different precipitation regimes and the impact of this adaption on the fate of C deposited into soil. In doing so, we addressed key questions about the microbial cycling of C in soils that have been identified by the DOE.

Myrold, David D. [Oregon State University; Bottomely, Peter J. [Oregon State University; Jumpponen, Ari [Kansas State University; Rice, Charles W. [Kansas State University; Zeglin, Lydia H. [Kansas State University; David, Maude M. [Lawrence Berkeley National Laboratory; Jansson, Janet K. [Lawrence Berkeley National Laboratory; Prestat, Emmanuel [Lawrence Berkeley National Laboratory; Hettich, Robert L. [Oak Ridge National Laboratory

2014-09-17T23:59:59.000Z

283

EE Regional Technology Roadmap Includes comparison  

E-Print Network [OSTI]

EE Regional Technology Roadmap Includes comparison against 6th Power Plan (Update cyclically Data Clearinghouse BPA/RTF NEEA/Regional Programs Group Update Regional EE Technology Roadmap Lighting

284

Quantum key distribution over 25 km with an all-fiber continuous-variable system  

E-Print Network [OSTI]

We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient LDPC error correcting codes.

Jerome Lodewyck; Matthieu Bloch; Raul Garcia-Patron; Simon Fossier; Evgueni Karpov; Eleni Diamanti; Thierry Debuisschert; Nicolas J. Cerf; Rosa Tualle-Brouri; Steven W. McLaughlin; Philippe Grangier

2007-09-04T23:59:59.000Z

285

Regional GHG Emissions Stat s Greenhouse Gas and the Regional  

E-Print Network [OSTI]

(milliontonsCO2) Petroleum + Pet Coke Natural Gas Coal 8 0.0 10.0 20.0 1995 1996 1997 1998 1999 2000 2001 2002 and œ Valmy coal plants) 2 #12;6/5/2013 2 GHG Emissions by Economic Sector in the Pacific Northwest (2010 Renewables 7 6%In 2011, the region 0.2% 6.4% Coal, 15.7% Nuclear, 2.0% 7.6%, g generated ~27,000 MWa ­ 68

286

Texas State Planning Region 3 Report of Regional Transportation Coordination  

E-Print Network [OSTI]

of the 24 regions studying public transportation in their area was charged with assessing Barriers, Constraints and Best Practices in public transportation. This Coordination Committee addressed this issue with enthusiasm, generating significant topics...DOT requirement that all vehicles be ADA compliant, Medicaid restrictions and Insurance as significant barriers to public transportation. Best practices included sharing of information regarding this project through publication in rural newspapers, inter...

Nortex Regional Planning Commission

2006-12-01T23:59:59.000Z

287

Regional geophysics, Cenozoic tectonics and geologic resources...  

Open Energy Info (EERE)

and adjoining regions Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Proceedings: Regional geophysics, Cenozoic tectonics and geologic resources of...

288

Clean Cities Regional Support & Petroleum Displacement Awards...  

Broader source: Energy.gov (indexed) [DOE]

Clean Cities Regional Support & Petroleum Displacement Awards Clean Cities Regional Support & Petroleum Displacement Awards 2009 DOE Hydrogen Program and Vehicle Technologies...

289

Regional Systems Development for Geothermal Energy Resources...  

Open Energy Info (EERE)

Jump to: navigation, search OpenEI Reference LibraryAdd to library Report: Regional Systems Development for Geothermal Energy Resources Pacific Region (California and Hawaii)....

290

Key Collections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformationPostdocs & Graduates > TheFoxLeads DOE's E-gov

291

Regional Slip Tendency Analysis of the Great Basin Region  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

- The resulting along?fault and fault?to?fault variation in slip or dilation potential is a proxy for along fault and fault?to?fault variation in fluid flow conduit potential. Stress Magnitudes and directions were calculated across the entire Great Basin. Stress field variation within each focus area was approximated based on regional published data and the world stress database (Hickman et al., 2000; Hickman et al., 1998 Robertson?Tait et al., 2004; Hickman and Davatzes, 2010; Davatzes and Hickman, 2006; Blake and Davatzes 2011; Blake and Davatzes, 2012; Moeck et al., 2010; Moos and Ronne, 2010 and Reinecker et al., 2005). The minimum horizontal stress direction (Shmin) was contoured, and spatial bins with common Shmin directions were calculated. Based on this technique, we subdivided the Great Basin into nine regions (Shmin <070, 070140). Slip and dilation tendency were calculated using 3DStress for the faults within each region using the mean Shmin for the region. Shmin variation throughout Great Basin are shown on Figure 3. For faults within the Great Basin proper, we applied a normal faulting stress regime, where the vertical stress (sv) is larger than the maximum horizontal stress (shmax), which is larger than the minimum horizontal stress (sv>shmax>shmin). Based on visual inspection of the limited stress magnitude data in the Great Basin, we used magnitudes such that shmin/shmax = .527 and shmin/sv= .46. These values are consistent with stress magnitude data at both Dixie Valley (Hickman et al., 2000) and Yucca Mountain (Stock et al., 1985). For faults within the Walker Lane/Eastern California Shear Zone, we applied a strike?slip faulting stress, where shmax > sv > shmin. Upon visual inspection of limited stress magnitude data from the Walker Lane and Eastern California Shear zone, we chose values such that SHmin/SHmax = .46 and Shmin/Sv= .527 representative of the region. Results: The results of our slip and dilation tendency analysis are shown in Figures 4 (dilation tendency), 5 (slip tendency) and 6 (slip tendency + dilation tendency). Shmin varies from northwest to east?west trending throughout much of the Great Basin. As such, north? to northeast?striking faults have the highest tendency to slip and to dilate, depending on the local trend of shmin. These results provide a first order filter on faults and fault systems in the Great Basin, affording focusing of local?scale exploration efforts for blind or hidden geothermal resources.

Faulds, James E.

292

Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures  

E-Print Network [OSTI]

Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures Staff Summary of Ecotope Recommendation: Staff Response and Recommended Action: 4.1.3 Ductless Heat Pumps Staff Summary of Ecotope Recommendation

293

Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management  

E-Print Network [OSTI]

Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management Simon N. Foley, Thomas B. Quillinan, John P. Morrison, David A. Power, James J. Kennedy. Department of Computer Science

Foley, Simon

294

Broadband marine MT exploration of the East Pacific Rise at 9500 Kerry Key and Steven Constable  

E-Print Network [OSTI]

Broadband marine MT exploration of the East Pacific Rise at 9°°500 N Kerry Key and Steven Constable., and S. Constable, Broadband marine MT exploration of the East Pacific Rise at 9°500 N, Geophys. Res

Key, Kerry

295

Test Scanning Request Form Please complete one form for each test and key.  

E-Print Network [OSTI]

Test Scanning Request Form Please complete one form for each test and key. This Section: Test Name: Contact Person: Email Regarding This Scan Date Received Time Initials Number of Tests Scored: / / : A.M. P

Pantaleone, Jim

296

Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action,  

E-Print Network [OSTI]

Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action, environmentalism, collective interest model. Mark Lubell Department The literature on environmental activism has failed to produce a model of individual decision- making explicitly

Lubell, Mark

297

Vit Plant receives and sets key air filtration equipment for Low Activity Waste Facility  

Broader source: Energy.gov [DOE]

WTP lifted a nearly 100-ton carbon bed absorber into the Low-Activity Waste Facility. This key piece of air-filtration equipment will remove mercury and acidic gases before air is channeled through...

298

HES Human Environmental Sciences KEY: # = new course * = course changed = course dropped  

E-Print Network [OSTI]

HES Human Environmental Sciences KEY: # = new course * = course changed = course dropped SchoolofHumanEnvironmentalSciences HES 100 AN INTRODUCTION TO PROFESSIONS IN HUMAN ENVIRONMENTAL SCIENCES. (1) An orientation to human environmental sciences, its history, contemporary issues and philosophy

MacAdam, Keith

299

Security of the Quantum Key Distribution with Blind Polarization Bases against Impersonation Attack  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the impersonation attack.

Won-Ho Kye; M. S. Kim

2006-02-24T23:59:59.000Z

300

Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

Won-Ho Kye; M. S. Kim

2005-08-03T23:59:59.000Z

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Concise and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths  

E-Print Network [OSTI]

We present a tight security analysis of the Bennett-Brassard 1984 protocol taking into account the finite size effect of key distillation, and achieving unconditional security. We begin by presenting a concise analysis utilizing the normal approximation of the hypergeometric function. Then next we show that a similarly tight bound can also be obtained by a rigorous argument without relying on any approximation. In particular, for the convenience of experimentalists who wish to evaluate the security of their QKD systems, we also give explicit procedures of our key distillation, and also show how to calculate the secret key rate and the security parameter from a given set of experimental parameters. Besides the exact values of key rates and security parameters, we also present how to obtain their rough estimates using the normal approximation.

Masahito Hayashi; Toyohiro Tsurumaru

2012-05-17T23:59:59.000Z

302

Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution  

E-Print Network [OSTI]

The effect of scintillation, arising from propagation through atmospheric turbulence, on the sift and error probabilities of a quantum key distribution (QKD) system that uses the weak-laser-pulse version of the Bennett-Brassard ...

Shapiro, Jeffrey H.

303

A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey  

E-Print Network [OSTI]

A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey of the Menderes Massif in western Turkey, and subsequently a map-view restoration of its Neogene unroofing history

Utrecht, Universiteit

304

A Comparison of Key PV Backsheet and Module Properties from Fielded...  

Broader source: Energy.gov (indexed) [DOE]

of Key PV Backsheet and Module Properties from Fielded Module Exposures and Accelerated Test Conditions W. Gambogi 1 , O. Fu 2 , Y. Heta 3 , K. Hashimoto 3 , J. Kopchick 1...

305

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Broader source: Energy.gov (indexed) [DOE]

Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

306

Technology, Knowledge, Culture, and Management: the keys The shift from industrial societies to information societies  

E-Print Network [OSTI]

Technology, Knowledge, Culture, and Management: the keys to success Abstract The shift from to success: technology, knowledge, culture and management. Organizations employ technology with the goal of improving efficiency and reducing operational costs. Hence technology structures within organizations must

Kopec, Danny

307

Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Democracy Movement  

E-Print Network [OSTI]

Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Digest | July 2010 | www.publicsectordigest.com underlying tensions and tough choices inherent to most

308

Redox states of Desulfovibrio vulgaris DsrC, a key protein in...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Venceslau SS, JR Cort, ES Baker, RK Chu, EW Robinson, C Dahl, LM Saraiva, and IA Pereira.2013."Redox states of Desulfovibrio vulgaris DsrC, a key protein in dissimilatory...

309

Tritium inventory control in ITER Charles Skinner with key contributions from  

E-Print Network [OSTI]

Tritium inventory control in ITER Charles Skinner with key contributions from Charles Gentile permitted" Tritium inventory control Worrisome issue: Once at the tritium limit there won't be any more

Princeton Plasma Physics Laboratory

310

Faculty & Information Centres Building Car Park Key Facilities Building Car Park  

E-Print Network [OSTI]

10 ORANGE A PURPLE Navitas 2 ORANGE A ORANGE North Australian Centre for Oil and Gas 7 PINK B PURPLE7 WATER TANK 5 4 18 S Faculty & Information Centres Building Car Park Key Facilities Building Car

311

Demand Response in the U.S.- Key trends and federal facility participation  

Broader source: Energy.gov [DOE]

Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—provides demand response (DR) definition, current status of DR in the United States, key DR trends, and federal participation issues.

312

Southeast Regional Carbon Sequestration Partnership  

SciTech Connect (OSTI)

The Southeast Regional Carbon Sequestration Partnership's (SECARB) Phase I program focused on promoting the development of a framework and infrastructure necessary for the validation and commercial deployment of carbon sequestration technologies. The SECARB program, and its subsequent phases, directly support the Global Climate Change Initiative's goal of reducing greenhouse gas intensity by 18 percent by the year 2012. Work during the project's two-year period was conducted within a ''Task Responsibility Matrix''. The SECARB team was successful in accomplishing its tasks to define the geographic boundaries of the region; characterize the region; identify and address issues for technology deployment; develop public involvement and education mechanisms; identify the most promising capture, sequestration, and transport options; and prepare action plans for implementation and technology validation activity. Milestones accomplished during Phase I of the project are listed below: (1) Completed preliminary identification of geographic boundaries for the study (FY04, Quarter 1); (2) Completed initial inventory of major sources and sinks for the region (FY04, Quarter 2); (3) Completed initial development of plans for GIS (FY04, Quarter 3); (4) Completed preliminary action plan and assessment for overcoming public perception issues (FY04, Quarter 4); (5) Assessed safety, regulatory and permitting issues (FY05, Quarter 1); (6) Finalized inventory of major sources/sinks and refined GIS algorithms (FY05, Quarter 2); (7) Refined public involvement and education mechanisms in support of technology development options (FY05, Quarter 3); and (8) Identified the most promising capture, sequestration and transport options and prepared action plans (FY05, Quarter 4).

Kenneth J. Nemeth

2006-08-30T23:59:59.000Z

313

Practical free-space quantum key distribution over 10 km in daylight and at night  

E-Print Network [OSTI]

We have demonstrated quantum key distribution (QKD) over a 10-km, 1-airmass atmospheric range during daylight and at night. Secret random bit sequences of the quality required for the cryptographic keys used to initialize secure communications devices were transferred at practical rates with realistic security. By identifying the physical parameters that determine the system's secrecy efficiency, we infer that free-space QKD will be practical over much longer ranges under these and other atmospheric and instrumental conditions.

Richard J. Hughes; Jane E. Nordholt; Derek Derkacs; Charles G. Peterson

2002-06-14T23:59:59.000Z

314

A study of an optimum filter for a random phase-shift keyed signal  

E-Print Network [OSTI]

59 62 77 BIBLIOGRAPHY 85 LIST OF FIGURES Figure Page 1. Phase-shift key modulation 2, The filter problem 3. Block diagram representation of a delay modulator 12 4. A conceptual delay modulator for a phase- shift keyed signal 5. Random... PSK signal from the corruption of white noise. The fact that the PSK signal is random necessitates the use of a statistical theory of linear systems which was originated by Norbert Wiener. 3 The statistical filter problem is illustrated in Figure...

Barr, Frederick James

1968-01-01T23:59:59.000Z

315

Historical change in marine animal populations and coastal ecosystems in the Caribbean and Florida Keys  

E-Print Network [OSTI]

region-wide declines in Caribbean corals. Science 301:958-region-wide declines in Caribbean corals. Science 301:958-mass mortality through the Caribbean. Science 226:335-337.

McClenachan, Loren Elizabeth

2009-01-01T23:59:59.000Z

316

Regional aquifers and petroleum in Williston Basin region of US  

SciTech Connect (OSTI)

At least five major aquifers underlie the northern Great Plains of the US, which includes parts of the Williston basin in Montana and North Dakota. These aquifers form a hydrologic system that extends more than 960 km from recharge areas in the Rocky Mountains to discharge areas in eastern North Dakota and the Canadian Provinces of Manitoba and Saskatchewan. The regional flow system in the aquifers has had a major effect on the chemical composition of ground water within the Williston basin. Hydrodynamic forces may contribute to the accumulation of petroleum within the basin.

Downey, J.S.; Busby, J.F.; Dinwiddie, G.A.

1985-05-01T23:59:59.000Z

317

Twin Cities Regional Bicycle System Study  

E-Print Network [OSTI]

Twin Cities Regional Bicycle System Study Developing a Regional Bicycle Network CTS Research Corridors Analysis Results Proposed Regional Bicycle Network Critical Bicycle Links Next Steps Introduction #12;3 Improve knowledge base of regional bicycle transportation system and learn · How on

Minnesota, University of

318

Analysis of sheltering and evacuation strategies for a national capital region nuclear detonation scenario.  

SciTech Connect (OSTI)

Development of an effective strategy for shelter and evacuation is among the most important planning tasks in preparation for response to a low yield, nuclear detonation in an urban area. Extensive studies have been performed and guidance published that highlight the key principles for saving lives following such an event. However, region-specific data are important in the planning process as well. This study examines some of the unique regional factors that impact planning for a 10 kT detonation in the National Capital Region. The work utilizes a single scenario to examine regional impacts as well as the shelter-evacuate decision alternatives at one exemplary point. For most Washington, DC neighborhoods, the excellent assessed shelter quality available make shelter-in-place or selective transit to a nearby shelter a compelling post-detonation strategy.

Yoshimura, Ann S.; Brandt, Larry D.

2011-12-01T23:59:59.000Z

319

Regional East Tennessee Information | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromising ScienceRecent SRELRecyclingProjectsRegional Dialogue

320

Regions for Select Spot Prices  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromising ScienceRecentRegional companies eye growth

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

A study of a macro-spicule and a transition region explosive event in a solar coronal hole  

E-Print Network [OSTI]

A study of a macro-spicule and a transition region explosive event in a solar coronal hole M. D Key Laboratory of Basic Plasma Physics, Univ. of Science and Technology of China, Hefei, Anhui, China-spicules (jet-like structures seen at the solar limb) are believed to be the dominant mechanism for mass

322

Being the partial proceedings of a conference co-organized by the South-African Regional Poverty Network,  

E-Print Network [OSTI]

Being the partial proceedings of a conference co-organized by the South-African Regional Poverty, Southern African governments have identified the eradication or alleviation of poverty as a key objective of developmental programmes. In spite of these repeated articulations and ongoing efforts poverty levels have

Boyer, Edmond

323

U.S. Energy Information Administration (EIA)  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

of 2011. Figure DataThe AEO2011 Reference case also includes signifi cant long-term potential for supply from non-OPEC producers. In several resource-rich regions (including...

324

Weaknesses in the Key Scheduling Algorithm of Scott Fluhrer1, Itsik Mantin2, and Adi Shamir2  

E-Print Network [OSTI]

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1, Itsik Mantin2, and Adi Shamir2 1 and previous results about its security. In Section 3 we consider a slightly mod- i ed variant of the Key

Sirer, Emin Gun

325

Iron abundance in HII regions  

E-Print Network [OSTI]

Optical CCD spectra are used to determine the Fe abundances at several positions inside seven bright Galactic HII regions. The observed [FeIII] line ratios are compared with the predictions of different sets of collision strengths and transition probabilities for this ion to select the atomic data providing the best fit to the observations. The values found for the Fe++ and Fe+ abundances, along with ionization correction factors for the contribution of Fe3+, obtained from available grids of photoionized models, imply that the Fe/O ratio in the ionized gas is between 2% and 30% of solar. The Fe abundances derived for each area are correlated both with the degree of ionization and the colour excess. A possible explanation is suggested, namely the presence of a population of small grains, probably originating from the fragmentation of larger grains. These small grains would release Fe atoms into the gas after the absorption of energetic photons; the small grains surviving this destruction process would be swept out of the ionized region by the action of radiation pressure or stellar winds. An indication of a further and more efficient destruction agent is given by the high Fe abundance derived for a position sampling the optical jet H399 in M20, where dust destruction due to shock waves has presumably taken place.

M. Rodriguez

2002-03-22T23:59:59.000Z

326

Building Chairs & Alternates by Building May 2014 Bldg/Key Name/Dept Location Email/EHS Contact  

E-Print Network [OSTI]

by Building May 2014 Bldg/Key Name/Dept Location Email/EHS Contact Hefter Conference Tom Bjornstad Hefter

Saldin, Dilano

327

Wellcome Trust SUBMISSION OF EVIDENCE Wellcome Trust response to Department for Education: Reforming Key Stage 4 qualifications  

E-Print Network [OSTI]

: Reforming Key Stage 4 qualifications December 2012 Department for Education: Reforming Key Stage 4 science skills. 2. We are pleased to have the opportunity to respond to the consultation on reforms to Key consultations on the reform to curriculum and assessment at various stages of schooling. There is an opportunity

Rambaut, Andrew

328

Deterministic quantum-public-key encryption: forward search attack and randomization  

E-Print Network [OSTI]

In the classical setting, public-key encryption requires randomness in order to be secure against a forward search attack, whereby an adversary compares the encryption of a guess of the secret message with that of the actual secret message. We show that this is also true in the information-theoretic setting -- where the public keys are quantum systems -- by defining and giving an example of a forward search attack for any deterministic quantum-public-key bit-encryption scheme. However, unlike in the classical setting, we show that any such deterministic scheme can be used as a black box to build a randomized bit-encryption scheme that is no longer susceptible to this attack.

Georgios M. Nikolopoulos; Lawrence M. Ioannou

2009-03-27T23:59:59.000Z

329

Hydrogen demand, production, and cost by region to 2050.  

SciTech Connect (OSTI)

This report presents an analysis of potential hydrogen (H{sub 2}) demand, production, and cost by region to 2050. The analysis was conducted to (1) address the Energy Information Administration's (EIA's) request for regional H{sub 2} cost estimates that will be input to its energy modeling system and (2) identify key regional issues associated with the use of H{sub 2} that need further study. Hydrogen costs may vary substantially by region. Many feedstocks may be used to produce H{sub 2}, and the use of these feedstocks is likely to vary by region. For the same feedstock, regional variation exists in capital and energy costs. Furthermore, delivery costs are likely to vary by region: some regions are more rural than others, and so delivery costs will be higher. However, to date, efforts to comprehensively and consistently estimate future H{sub 2} costs have not yet assessed regional variation in these costs. To develop the regional cost estimates and identify regional issues requiring further study, we developed a H{sub 2} demand scenario (called 'Go Your Own Way' [GYOW]) that reflects fuel cell vehicle (FCV) market success to 2050 and allocated H{sub 2} demand by region and within regions by metropolitan versus non-metropolitan areas. Because we lacked regional resource supply curves to develop our H{sub 2} production estimates, we instead developed regional H{sub 2} production estimates by feedstock by (1) evaluating region-specific resource availability for centralized production of H{sub 2} and (2) estimating the amount of FCV travel in the nonmetropolitan areas of each region that might need to be served by distributed production of H{sub 2}. Using a comprehensive H{sub 2} cost analysis developed by SFA Pacific, Inc., as a starting point, we then developed cost estimates for each H{sub 2} production and delivery method by region and over time (SFA Pacific, Inc. 2002). We assumed technological improvements over time to 2050 and regional variation in energy and capital costs. Although we estimate substantial reductions in H{sub 2} costs over time, our cost estimates are generally higher than the cost goals of the U.S. Department of Energy's (DOE's) hydrogen program. The result of our analysis, in particular, demonstrates that there may be substantial variation in H{sub 2} costs between regions: as much as $2.04/gallon gasoline equivalent (GGE) by the time FCVs make up one-half of all light-vehicle sales in the GYOW scenario (2035-2040) and $1.85/GGE by 2050 (excluding Alaska). Given the assumptions we have made, our analysis also shows that there could be as much as a $4.82/GGE difference in H{sub 2} cost between metropolitan and non-metropolitan areas by 2050 (national average). Our national average cost estimate by 2050 is $3.68/GGE, but the average H{sub 2} cost in metropolitan areas in that year is $2.55/GGE and that in non-metropolitan areas is $7.37/GGE. For these estimates, we assume that the use of natural gas to produce H{sub 2} is phased out. This phase-out reflects the desire of DOE's Office of Hydrogen, Fuel Cells and Infrastructure Technologies (OHFCIT) to eliminate reliance on natural gas for H{sub 2} production. We conducted a sensitivity run in which we allowed natural gas to continue to be used through 2050 for distributed production of H{sub 2} to see what effect changing that assumption had on costs. In effect, natural gas is used for 66% of all distributed production of H{sub 2} in this run. The national average cost is reduced to $3.10/GGE, and the cost in non-metropolitan areas is reduced from $7.37/GGE to $4.90, thereby reducing the difference between metropolitan and non-metropolitan areas to $2.35/GGE. Although the cost difference is reduced, it is still substantial. Regional differences are similarly reduced, but they also remain substantial. We also conducted a sensitivity run in which we cut in half our estimate of the cost of distributed production of H{sub 2} from electrolysis (our highest-cost production method). In this run, our national average cost estimate is reduced even further, to

Singh, M.; Moore, J.; Shadis, W.; Energy Systems; TA Engineering, Inc.

2005-10-31T23:59:59.000Z

330

Muon collider interaction region design  

SciTech Connect (OSTI)

Design of a muon collider interaction region (IR) presents a number of challenges arising from low {beta}* < 1 cm, correspondingly large beta-function values and beam sizes at IR magnets, as well as the necessity to protect superconducting magnets and collider detectors from muon decay products. As a consequence, the designs of the IR optics, magnets and machine-detector interface are strongly interlaced and iterative. A consistent solution for the 1.5 TeV c.o.m. muon collider IR is presented. It can provide an average luminosity of 10{sup 34} cm{sup -2}s{sup -1} with an adequate protection of magnet and detector components.

Alexahin, Y.I.; Gianfelice-Wendt, E.; Kashikhin, V.V.; Mokhov, N.V.; Zlobin, A.V.; /Fermilab; Alexakhin, V.Y.; /Dubna, JINR

2010-05-01T23:59:59.000Z

331

Double blinding-attack on entanglement-based quantum key distribution protocols  

E-Print Network [OSTI]

We propose a double blinding-attack on entangled-based quantum key distribution protocols. The principle of the attack is the same as in existing blinding attack except that instead of blinding the detectors on one side only, Eve is blinding the detectors of both Alice and Bob. In the BBM92 protocol, the attack allows Eve to get a full knowledge of the key and remain undetected even if Alice and Bob are using 100% efficient detectors. The attack can be easily extended to Ekert protocol, with an efficiency as high as 85.3%.

Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

2011-06-14T23:59:59.000Z

332

Optimum design for BB84 quantum key distribution in tree-type passive optical networks  

E-Print Network [OSTI]

We show that there is a tradeoff between the useful key distribution bit rate and the total length of deployed fiber in tree-type passive optical networks for BB84 quantum key distribution applications. A two stage splitting architecture where one splitting is carried in the central office and a second in the outside plant and figure of merit to account for the tradeoff are proposed. We find that there is an optimum solution for the splitting ratios of both stages in the case of Photon Number Splitting (PNS) attacks and Decoy State transmission. We then analyze the effects of the different relevant physical parameters of the PON on the optimum solution.

Jose Capmany; Carlos R. Fernandez-Pousa

2011-03-24T23:59:59.000Z

333

A 24 km fiber-based discretely signaled continuous variable quantum key distribution system  

E-Print Network [OSTI]

We report a continuous variable key distribution system that achieves a final secure key rate of 3.45 kb/sec over a distance of 24.2 km of optical fiber. The protocol uses discrete signaling and post-selection to improve reconciliation speed and quantifies security by means of quantum state tomography. Polarization multiplexing and a frequency translation scheme permit transmission of a continuous wave local oscillator and suppression of noise from guided acoustic wave Brillouin scattering by more than 27 dB.

Quyen Dinh Xuan; Zheshen Zhang; Paul L. Voss

2009-10-06T23:59:59.000Z

334

Chromidio: an interface for color tracking with key frames in Max and Nato  

E-Print Network [OSTI]

11 QuickTime Movie Input 11 Interactive Color Picking 12 Key Frames 12 Useful Output 14 File Management 16 C.play I 6 IV I M P L E M E N T A T I O N A N D RESULTS 17 Chromidio User Interface 17 QuickTime Movie Display and Playback 22 vi i... CHAPTER Page Interactive Color Picking 26 Key Frame Management 27 Data Analysis and Output 32 Project File Management 36 C.play 39 User Interface 39 Mathematical Functions and F ilters 41 MIDI Implementations 44 Output : 46 Results Using C...

Tucker, Amy Rebecca

2002-01-01T23:59:59.000Z

335

Regional Revolving Loan Trust Fund (New York)  

Broader source: Energy.gov [DOE]

The Regional Revolving Loan Trust Fund Program, coordinated by the Empire State Development program, is operated in six regions by nonprofit organizations and provides working capital loans (up to ...

336

Enhancing regional security agreements through cooperative monitoring  

SciTech Connect (OSTI)

This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers.

Pregenzer, A.L.

1995-05-01T23:59:59.000Z

337

Sandia National Laboratories: Photovoltaic Regional Testing Center...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Grid Integration, Modeling, Modeling & Analysis, News, News & Events, Partnership, Photovoltaic, Photovoltaic Regional Testing Center (PV RTC), Photovoltaic Systems Evaluation...

338

Segmentation into fuzzy regions using topographic distance  

E-Print Network [OSTI]

recognition from fuzzy regions. Keywords: Segmentation, Fuzzy region, Watershed, Color image, TopographicSegmentation into fuzzy regions using topographic distance SYLVIE PHILIPP­FOLIGUET 1 MARCELO@dcc.ufmg.br, arnaldo@dcc.ufmg.br 3 Supported by CAPES. Abstract. This paper exposes an algorithm that leads to a fuzzy

Philipp-Foliguet, Sylvie

339

6, 1092910958, 2006 Regional scale CO2  

E-Print Network [OSTI]

ACPD 6, 10929­10958, 2006 Regional scale CO2 flux estimation using radon A. I. Hirsch Title Page Chemistry and Physics Discussions On using radon-222 and CO2 to calculate regional-scale CO2 fluxes A. I (Adam.Hirsch@noaa.gov) 10929 #12;ACPD 6, 10929­10958, 2006 Regional scale CO2 flux estimation using

Paris-Sud XI, Université de

340

Regional Technical Forum AND 2012 PROGRESS UPDATE  

E-Print Network [OSTI]

Review of the Northwest Energy System.The report recommended forming a technical group to help the region the guidelines were adopted in June 2011, the RTF began reviewing its existing portfolio of energy savingsRegional Technical Forum AND 2012 PROGRESS UPDATE 2011 Annual Report #12;PAGE 2 > REGIONAL

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Biochar and Carbon Sequestration: A Regional Perspective  

E-Print Network [OSTI]

Biochar and Carbon Sequestration: A Regional Perspective A report prepared for East of England #12;Low Carbon Innovation Centre Report for EEDA Biochar and Carbon Sequestration: A Regional Perspective 20/04/2009 ii Biochar and Carbon Sequestration: A Regional Perspective A report prepared for East

Everest, Graham R

342

SNAP-25 in hippocampal CA3 region is required for long-term memory formation  

SciTech Connect (OSTI)

SNAP-25 is a synaptosomal protein of 25 kDa, a key component of synaptic vesicle-docking/fusion machinery, and plays a critical role in exocytosis and neurotransmitter release. We previously reported that SNAP-25 in the hippocampal CA1 region is involved in consolidation of contextual fear memory and water-maze spatial memory (Hou et al. European J Neuroscience, 20: 1593-1603, 2004). SNAP-25 is expressed not only in the CA1 region, but also in the CA3 region, and the SNAP-25 mRNA level in the CA3 region is higher than in the CA1 region. Here, we provide evidence that SNAP-25 in the CA3 region is also involved in learning/memory. Intra-CA3 infusion of SNAP-25 antisense oligonucleotide impaired both long-term contextual fear memory and water-maze spatial memory, with short-term memory intact. Furthermore, the SNAP-25 antisense oligonucleotide suppressed the long-term potentiation (LTP) of field excitatory post-synaptic potential (fEPSP) in the mossy-fiber pathway (DG-CA3 pathway), with no effect on paired-pulse facilitation of the fEPSP. These results are consistent with the notion that SNAP-25 in the hippocampal CA3 region is required for long-term memory formation.

Hou Qiuling [Laboratory of Higher Brain Functions, Institute of Neurobiology, Institutes of Brain Science, Fudan University, 220 Han-Dan Road, Shanghai 200433 (China); Gao Xiang [Key Laboratory of Stem Cell Biology, Laboratory of Molecular Cell Biology, Institute of Biochemistry and Cell Biology, Shanghai Institutes for Biological Sciences, Chinese Academy of Sciences, 320 Yue-Yang Road, Shanghai 200031 (China); Lu Qi [Laboratory of Higher Brain Functions, Institute of Neurobiology, Institutes of Brain Science, Fudan University, 220 Han-Dan Road, Shanghai 200433 (China); Zhang Xuehan [Laboratory of Higher Brain Functions, Institute of Neurobiology, Institutes of Brain Science, Fudan University, 220 Han-Dan Road, Shanghai 200433 (China); Tu Yanyang [Key Laboratory of Stem Cell Biology, Laboratory of Molecular Cell Biology, Institute of Biochemistry and Cell Biology, Shanghai Institutes for Biological Sciences, Chinese Academy of Sciences, 320 Yue-Yang Road, Shanghai 200031 (China); Jin Meilei [Research Center of Biotechnology, Shanghai Institutes for Biological Sciences, Chinese Academy of Sciences, 500 Cao-Bao Road, Shanghai 200233 (China); Zhao Guoping [Chinese National Human Genome Center at Shanghai, 351 Guo-Shou-Jing Road, Zhang-Jiang Hi-Tech Park, Shanghai 201203 (China); Yu Lei [Department of Genetics and Center of Alcohol Studies, Rutgers University, 145 Bevier Road, Piscataway, New Jersey 08854 (United States); Jing Naihe [Key Laboratory of Stem Cell Biology, Laboratory of Molecular Cell Biology, Institute of Biochemistry and Cell Biology, Shanghai Institutes for Biological Sciences, Chinese Academy of Sciences, 320 Yue-Yang Road, Shanghai 200031 (China); Li Baoming [Laboratory of Higher Brain Functions, Institute of Neurobiology, Institutes of Brain Science, Fudan University, 220 Han-Dan Road, Shanghai 200433 (China)]. E-mail: bmli@fudan.edu.cn

2006-09-08T23:59:59.000Z

343

Level of Preparedness for Pandemic Influenza among Key Leaders in Brazos County  

E-Print Network [OSTI]

With the outbreak of the 2009 pandemic influenza A (H1N1) comes the need to evaluate the preparedness level of government entities that had preparedness plans. This study looks at the preparedness level for pandemic influenza among key leaders...

Kaster, Elizabeth

2012-02-14T23:59:59.000Z

344

Key to images: [1] Model system: fission yeast [2] Cryo-EM structure  

E-Print Network [OSTI]

Key to images: [1] Model system: fission yeast [2] Cryo-EM structure of the MCM helicase [3 combing [8] Model system: Xenopus [9] Extreme environments [10] Model system: C.elegans. Background image of the evolution of the replication machinery highlighted. BSRC B306 Email: sam31@st-and.ac.uk 1 2 3 4 5 6 7 8 9 10

Brierley, Andrew

345

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

346

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

347

Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence  

E-Print Network [OSTI]

Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence Reto Kohlas Ueli an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management and the valuation of confidence values in the general context of reasoning based on uncertain evidence. Second, we

Maurer, Ueli

348

Confidence Valuation in a PublicKey Infrastructure based on Uncertain Evidence  

E-Print Network [OSTI]

Confidence Valuation in a Public­Key Infrastructure based on Uncertain Evidence Reto Kohlas Ueli an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management and the valuation of confidence values in the general context of reasoning based on uncertain evidence. Second, we

Maurer, Ueli

349

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14  

E-Print Network [OSTI]

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

Dixon, Peter

350

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14  

E-Print Network [OSTI]

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14 Are you starting a full-time course at university or college in the autumn? · Find out what student finance is available to you finance. Apply online by 31 May 2013. · Giving Student Finance England your UK passport number and your

Dixon, Peter

351

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13  

E-Print Network [OSTI]

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

Oakley, Jeremy

352

Key factors governing uncertainty in the response to sunshade geoengineering from a comparison  

E-Print Network [OSTI]

Key factors governing uncertainty in the response to sunshade geoengineering from a comparison of solar geoengineering are central to evaluating whether such approaches may help to reduce the harmful impacts of global warming. In this study we compare the sunshade solar geoengineering response

Robock, Alan

353

Capacity Development, Education & Training Integrated and sustained action is the key  

E-Print Network [OSTI]

Capacity Development, Education & Training Integrated and sustained action is the key Thematic Background Paper January 2004 Author: John Christensen Global Network on Energy for Sustainable Development to sustainable energy development. The rapid development of individual RE technologies along with basic changes

354

TERRESTRIAL ROCK VARNISH: A KEY TO UNDERSTANDING THE SURFACE COMPOSITION OF MARS. J. G. Ward1  

E-Print Network [OSTI]

TERRESTRIAL ROCK VARNISH: A KEY TO UNDERSTANDING THE SURFACE COMPOSITION OF MARS. J. G. Ward1 , L produces a strong spectral band contrast. This also gives varnish its shiny appearance. On Earth rock varnish may have a microbial origin [3]. Clays are transported from an external source and deposited

Kirkland, Laurel

355

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell  

E-Print Network [OSTI]

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

Mitchell, Chris

356

Red Algae Lose Key Mitochondrial Genes in Response to Becoming Parasitic  

E-Print Network [OSTI]

Red Algae Lose Key Mitochondrial Genes in Response to Becoming Parasitic Lillian Hancock1 , Lynda independently evolved hundreds of times among the floridiophyte red algae. Much is known about the life history class of red algae, Plocamiocolax puvinata, has lost the atp8 gene entirely, indicating that this gene

Lane, Chris

357

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups  

E-Print Network [OSTI]

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups Mark Manulis Horst of various group-oriented applications for mo- bile ad-hoc groups requires a group secret shared between all- and wide-area wired networks, can also be used in ad-hoc sce- narios because of the similar security

Manulis, Mark

358

Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives  

E-Print Network [OSTI]

policies and business models to create self-sustaining markets for financing energy efficiency, renewable on leveraging resources through partnerships with businesses, academia, and other countries. Therefore.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas

359

New species of Anthostomella on fynbos, with a key to the genus in South Africa  

E-Print Network [OSTI]

New species of Anthostomella on fynbos, with a key to the genus in South Africa Seonju LEE, South Africa. E-mail : slee@maties.sun.ac.za Received 3 April 2002; accepted 18 November 2002. A study of saprobic fungi occurring on the fynbos of the Western Cape Province of South Africa yielded four unknown

360

Differential-phase-shift quantum key distribution with segmented pulse trains  

SciTech Connect (OSTI)

We present a modified scheme of differential-phase-shift (DPS) quantum key distribution (QKD) for improving its performance. A transmitter sends a weak coherent pulse train segmented with vacant pulses. Then, a receiver can find eavesdropping by monitoring the photon detection rate at particular time slots. Simulations show that the proposed scheme is robust against a sequential attack and a general individual attack.

Kawahara, Hiroki; Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan)

2011-06-15T23:59:59.000Z

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key  

E-Print Network [OSTI]

Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol of Technology, Hoboken, New Jersey, USA, 07030 {amyasnik,aushakov}@stevens.edu Abstract. The length based attack and Tannenbaum in [9]. Several attempts have been made to implement the attack [6], but none of them had produced

Myasnikov, Aleksey

362

Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol  

E-Print Network [OSTI]

We present the wavelength attack on a practical continuous-variable quantum-key-distribution system with a heterodyne protocol, in which the transmittance of beam splitters at Bob's station is wavelength-dependent. Our strategy is proposed independent of but analogous to that of Huang et al. [arXiv: 1206.6550v1 [quant-ph

Xiang-Chun Ma; Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

2014-03-04T23:59:59.000Z

363

Attack on Private Signature Keys of the OpenPGP format, PGPTM  

E-Print Network [OSTI]

- 1 - Attack on Private Signature Keys of the OpenPGP format, PGPTM programs and other applications Prague, t.rosa@decros.cz Abstract. The article describes an attack on OpenPGP format, which leads these applications must undergo the same revision as the actual program PGPTM . The success of the attack

364

Fish and Wildlife Management Questions and RM&E Strategies Key Management Questions  

E-Print Network [OSTI]

1 Fish and Wildlife Management Questions and RM&E Strategies Key Management Questions 1. Are we meeting biological and programmatic performance objectives established within the Columbia Basin Fish implemented and accomplished as proposed? Strategic Category: Fish Population Status Monitoring The following

365

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

Sheldon, Nathan D.

366

Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis  

E-Print Network [OSTI]

-resilient cryptography is its significant performance overheads, it naturally suggests an intermediate line of re- searchTowards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis Sonia advantage of our analysis to extract new design principles for block ciphers to be used in leakage

367

Poster Sessions Friday, 18 April 2008 183 Identification of key breast cancer phenotypes  

E-Print Network [OSTI]

in node positive, hormone positive breast cancer patients. Materials and Methods: We have conductedPoster Sessions Friday, 18 April 2008 183 445 Poster Identification of key breast cancer phenotypes for class membership. Material and Methods: Expression of twenty-five proteins, with known relevance

Aickelin, Uwe

368

64 IRE TRANSACTIONS ON ENGINEERING MANAGEMENT July Systenas Engineering-Key to Modern Development  

E-Print Network [OSTI]

to ascertain the current output of this phase is the creative idea that marks the status of systems engineering64 IRE TRANSACTIONS ON ENGINEERING MANAGEMENT July Systenas Engineering-Key to Modern Development, integration, emphasis on the field of systems engineering. Though and evaluation. In a sense, these terms

Rhoads, James

369

Manure Harvesting Frequency: The Key to Feedyard Dust Control in a Summer Drought  

E-Print Network [OSTI]

Summer drought can make dust control in feedyards more challenging than usual. Supplemental water may not keep pace with daily evaporation. The key to dust control is managing the depth of dry manure in the pens by harvesting manure more frequently...

Auvermann, Brent W.; Parker, David B.; Sweeten, John M.

2000-11-27T23:59:59.000Z

370

NREL builds community and industry support by addressing concerns voiced by key standards organizations.  

E-Print Network [OSTI]

NREL builds community and industry support by addressing concerns voiced by key standards standards developed through consensus processes. Because U.S. PV module safety stan- dards are not aligned with international standards, manufacturers must test their modules twice--and sometimes maintain separate product

371

Heart Failure Symposium: Promoting Knowledge and Self-Care: The Keys to  

E-Print Network [OSTI]

Heart Failure Symposium: Promoting Knowledge and Self-Care: The Keys to a Woman's Healthy Heart This is the Fourth Annual UConn Health Center Heart Failure Symposium. This year we will focus on women and heart disease. The program will include presentations on heart disease and healthy living for women

Kim, Duck O.

372

Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model  

E-Print Network [OSTI]

proceed, let us review at a high level the utility and security of multiparty NIKE. We consider a setting a public value. Utility: Consider any subset of the parties who wish to derive a common secret key in the ensuing. - Query the challenger to register an honest party ­ upon this query, the challenger outputs

373

E-Business Value Creation in Jordanian Banking Services Industry: An Empirical Analysis of Key Factors  

E-Print Network [OSTI]

E-Business Value Creation in Jordanian Banking Services Industry: An Empirical Analysis of Key an extended conceptual research model for assessing the value of e-business at the bank level environment) that may affect value creation of carrying out e- business in Jordanian banking sector. Survey

374

E-Banking Diffusion in the Jordanian Banking Services Sector: An Empirical Analysis of Key Factors  

E-Print Network [OSTI]

E-Banking Diffusion in the Jordanian Banking Services Sector: An Empirical Analysis of Key Factors influence e- banking adoption in Jordanian banks. This article added some constructs to (TOE) framework, availability of online revenues, competition intensity or pressure, and regulatory support environment) while e

375

The Gender-Brand Effect of Key Phrases on User Clicks in Sponsored  

E-Print Network [OSTI]

to the positive attitude and customer loyalty generated by brand image. Author Keywords Search Engine MarketingThe Gender-Brand Effect of Key Phrases on User Clicks in Sponsored Search Abstract In this research-phrases, and (3) the occurrence of branded terms in those queries. The aim of this research is increased

Jansen, James

376

Towards prospective Life Cycle Assessment: how to identify key parameters inducing most  

E-Print Network [OSTI]

of Life Cycle Assessments (LCA) have been undertaken, attempting to give a quantitative assessmentTowards prospective Life Cycle Assessment: how to identify key parameters inducing most Blanc1 MINES ParisTech, O.I.E. center, Sophia Antipolis, France Abstract. Prospective Life Cycle

Paris-Sud XI, Université de

377

Growing Green As part of its strategic plan to foster growth and development in key  

E-Print Network [OSTI]

reconstruction, nuclear waste containment and disposal, and photochemical deconstruction of pollutants Key remediation technologies for hazardous industrial pollutants in soil and groundwater · Geotechnical Research contamination and remediation, and management of mine wastes For more information, please visit: www.uwo.ca/enviro

Denham, Graham

378

Simplified authenticated key exchange based on the q(th) root problem  

SciTech Connect (OSTI)

Finding a q{sup th} root in GF(p), where p and q are prunes, q is large and q{sup 2} divides (p{minus}1) is a difficult problem equivalent to the discrete logarithm problem using an element of order q as the base. This paper describes an authenticated key exchange algorithm utilizing this hard problem.

JOHNSTON,ANNA M.; GEMMELL,PETER S.

2000-02-29T23:59:59.000Z

379

PublicKey LocallyDecodable Codes Brett Hemenway # Rafail Ostrovsky +  

E-Print Network [OSTI]

Semantically­Secure Public Key En­ cryption (SS­PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

Ostrovsky, Rafail

380

Environmental Impact of Wastewater Disposal in the Florida Keys, Monroe County Tom Higginbotham  

E-Print Network [OSTI]

Environmental Impact of Wastewater Disposal in the Florida Keys, Monroe County Tom Higginbotham University of Florida Soil and Water Science #12;Environmental Impact of Wastewater Disposal in the Florida affecting the normally oligotrophic marine waters. Typical methods of wastewater disposal include large

Ma, Lena

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

College of Fine Arts KEY: # = new course * = course changed = course dropped  

E-Print Network [OSTI]

College of Fine Arts TAD Dance KEY: # = new course * = course changed = course dropped University of Kentucky 2013-2014 Undergraduate Bulletin 1 *TAD 140 INTRODUCTION TO DANCE. (3) This course will provide of the semester. TAD 141 MODERN DANCE I. (2) Foundationscourseinbasicmovementconceptsoftime

MacAdam, Keith

382

Use of Nested Certificates for Efficient, Dynamic and Trust Preserving Public Key Infrastructure  

E-Print Network [OSTI]

Use of Nested Certificates for Efficient, Dynamic and Trust Preserving Public Key Infrastructure the certificates on this path recursively. This is the classical methodology. Nested certification is a novel nested certificates ­ for other certificates. Nested certificates can be used together with classical

Levi, Albert

383

Use of Nested Certificates for Efficient, Dynamic and Trust Preserving Public Key Infrastructure  

E-Print Network [OSTI]

Use of Nested Certificates for Efficient, Dynamic and Trust Preserving Public Key Infrastructure), and verify the certificates on this path recursively. This is the classical methodology. Nested certification certificates ­ called nested certificates ­ for other certificates. Nested certificates can be used together

384

Establishing the School of Engineering and Applied Sciences: Rationale and Key Issues  

E-Print Network [OSTI]

Establishing the School of Engineering and Applied Sciences: Rationale and Key Issues Science and engineering, ever changing, are becoming increasingly coupled. Their interplay is leading to dramatic progress transformations. They are driving economic development, underpinning cultural changes, and helping meet societal

385

Visualizing Key Words and Trends in a Subset of the US Patent Database Andrew B. Godbehere  

E-Print Network [OSTI]

Visualizing Key Words and Trends in a Subset of the US Patent Database Andrew B. Godbehere Laurent of an interactive content visualization tool as applied to a subset of the US Patent Database pertaining to clean ed word is an associated list of patents from the given time window mentioning both the query terms

Sekhon, Jasjeet S.

386

Formalization and Verification of PLC Timers in Coq Key Lab for ISS of MOE,  

E-Print Network [OSTI]

Formalization and Verification of PLC Timers in Coq Hai Wan Key Lab for ISS of MOE, School used in embedded systems. A timer plays a pivotal role in PLC real-time applications. The paper presents a formalization of TON-timers of PLC programs in the theorem proving system Coq. The behavior

Paris-Sud XI, Université de

387

Enzymatically based cellulosic ethanol production technology was selected as a key area for biomass  

E-Print Network [OSTI]

Enzymatically based cellulosic ethanol production technology was selected as a key area for biomass cellulosic ethanol com- petitive. Improvements in dilute acid pretreatment and cellulase produced by Trichoderma reesei discov- ered during World War II led to most of the historic cellulosic ethanol cost

California at Riverside, University of

388

Introduction! Carbon capture and storage (CCS) may be a key option  

E-Print Network [OSTI]

with a network for higher storage goals? SimCCS model A cost surface, i.e. a raster grid of the cost to lay a pipeline across each grid cell, was estimated using geographical datasets including protected areas is in the East (Lorraine region), another is in the North (Nord­Pas de Calais region). Also, scenarios

Boyer, Edmond

389

Key Economic Drivers Impacting Eagle Ford Development from Resource to Reserves  

E-Print Network [OSTI]

–single-well, 100-well, and Full-well–in each of the proposed production regions of the Eagle Ford shale, with calibrated probabilistic inputs for each region. Single-well results show how it is hard to produce complete distributions of reserves all across the play...

Del Busto Pinzon, Andres Mauricio

2013-11-25T23:59:59.000Z

390

Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution  

E-Print Network [OSTI]

Measurement-device-independent quantum key distribution (MDI-QKD) has been demonstrated in both laboratories and field-tests using attenuated lasers combined with the decoy-state technique. Although researchers have studied various decoy-state MDI-QKD protocols with two or three decoy states, a clear comparison between these protocols is still missing. This invokes the question of how many types of decoy states are needed for practical MDI-QKD. Moreover, the system parameters to implement decoy-state MDI-QKD are only partially optimized in all previous works, which casts doubt on the actual performance of former demonstrations. Here, we present analytical and numerical decoy-state methods with one, two and three decoy states. We provide a clear comparison among these methods and find that two decoy states already enable a near optimal estimation and more decoy states cannot improve the key rate much in either asymptotic or finite-data settings. Furthermore, we perform a full optimization of system parameters and show that full optimization can significantly improve the key rate in the finite-data setting. By simulating a real experiment, we find that full optimization can increase the key rate by more than one order of magnitude compared to non-optimization. A local search method to optimize efficiently the system parameters is proposed. This method can be four orders of magnitude faster than a trivial exhaustive search to achieve a similar optimal key rate. We expect that this local search method could be valuable for general fields in physics.

Feihu Xu; He Xu; Hoi-Kwong Lo

2014-06-01T23:59:59.000Z

391

International conference on the role of the polar regions in global change: Proceedings. Volume 2  

SciTech Connect (OSTI)

The International Conference on the Role of the Polar Regions in Global Change took place on the campus of the University of Alaska Fairbanks on June 11--15, 1990. The goal of the conference was to define and summarize the state of knowledge on the role of the polar regions in global change, and to identify gaps in knowledge. To this purpose experts in a wide variety of relevant disciplines were invited to present papers and hold panel discussions. While there are numerous conferences on global change, this conference dealt specifically with the polar regions which occupy key positions in the global system. These two volumes of conference proceedings include papers on (1) detection and monitoring of change; (2) climate variability and climate forcing; (3) ocean, sea ice, and atmosphere interactions and processes; and (4) effects on biota and biological feedbacks; (5) ice sheet, glacier and permafrost responses and feedbacks, (6) paleoenvironmental studies; and, (7) aerosol and trace gases.

Weller, G.; Wilson, C.L.; Severin, B.A.B. [eds.

1991-12-01T23:59:59.000Z

392

International conference on the role of the polar regions in global change: Proceedings. Volume 1  

SciTech Connect (OSTI)

The International Conference on the Role of the Polar Regions in Global Change took place on the campus of the University of Alaska Fairbanks on June 11--15, 1990. The goal of the conference was to define and summarize the state of knowledge on the role of the polar regions in global change, and to identify gaps in knowledge. To this purpose experts in a wide variety of relevant disciplines were invited to present papers and hold panel discussions. While there are numerous conferences on global change, this conference dealt specifically with polar regions which occupy key positions in the global system. These two volumes of conference proceedings include papers on (1) detection and monitoring of change; (2) climate variability and climate forcing; (3) ocean, sea ice, and atmosphere interactions and processes; (4) effects on biota and biological feedbacks; (5) ice sheet, glacier and permafrost responses and feedbacks; (6) paleoenvironmental studies; and, (7) aerosols and trace gases.

Weller, G.; Wilson, C.L.; Severin, B.A.B. [eds.

1991-12-01T23:59:59.000Z

393

Geodesic Active Regions Using Non-parametric Statistical Regional Description and Their  

E-Print Network [OSTI]

Geodesic Active Regions Using Non-parametric Statistical Regional Description and Their Application {mhg,afrangi}@unizar.es Abstract. The inclusion of statistical region-based information in the Geodesic for the segmentation of brain aneurysms in CTA data with the Geodesic Active Regions model. 1 Introduction Brain

Frangi, Alejandro

394

Gigahertz quantum key distribution with InGaAs avalanche photodiodes  

E-Print Network [OSTI]

We report a demonstration of quantum key distribution (QKD) at GHz clock rates with InGaAs avalanche photodiodes (APDs) operating in a self-differencing mode. Such a mode of operation allows detection of extremely weak avalanches so that the detector afterpulse noise is sufficiently suppressed. The system is characterized by a secure bit rate of 2.37 Mbps at 5.6 km and 27.9 kbps at 65.5 km when the fiber dispersion is not compensated. After compensating the fiber dispersion, the QKD distance is extended to 101 km, resulting in a secure key rate of 2.88 kbps. Our results suggest that InGaAs APDs are very well suited to GHz QKD applications.

Z. L. Yuan; A. R. Dixon; J. F. Dynes; A. W. Sharpe; A. J. Shields

2008-05-22T23:59:59.000Z

395

The ISO/NASA Key Project on AGN Spectral Energy Distributions (Characteristics of the ISO Data)  

E-Print Network [OSTI]

The U.S. ISO Key Project on quasar spectral energy distributions seeks to better understand the very broad-band emission features of quasars from radio to X-rays. A key element of this project is observations of 72 quasars with the ISOPHOT instrument at 8 bands, from 5 to 200 microns. The sample was chosen to span a wide range of redshifts and quasar types. This paper presents an overview of the analysis and reduction techniques, as well as general trends within the data set (comparisons with IRAS fluxes, uncertainties as a function of background sky brightness, and an analysis of vignetting corrections in chopped observing mode). A more detailed look at a few objects in the sample is presented in Wilkes et al. 1999, astro-ph/9902084.

Eric J. Hooper; Belinda J. Wilkes; Kim K. McLeod; Martin S. Elvis; Chris D. Impey; Carol J. Lonsdale; Matt A. Malkan; Jonathan C. McDowell

1999-02-05T23:59:59.000Z

396

Device-independent quantum key distribution with generalized two-mode Schrödinger cat states  

E-Print Network [OSTI]

We show how weak non-linearities can be used in a device-independent quantum key distribution (QKD) protocol using generalized two-mode Schr\\"odinger cat states. The QKD protocol is therefore shown to be secure against collective attacks and for some coherent attacks. We derive analytical formulas for the optimal values of the Bell parameter, the quantum bit error rate, and the device- independent secret key rate in the noiseless lossy bosonic channel. Additionally, we give the filters and measurements which achieve these optimal values. We find that over any distance in this channel the quantum bit error rate is identically zero, in principle, and the states in the protocol are always able to violate a Bell inequality. The protocol is found to be superior in some regimes to a device-independent QKD protocol based on polarization entangled states in a depolarizing channel. Finally, we propose an implementation for the optimal filters and measurements.

Curtis J. Broadbent; Kevin Marshall; Christian Weedbrook; John C. Howell

2015-03-05T23:59:59.000Z

397

Developing a decision model to describe levels of self-directedness based upon the key assumptions of andragogy  

E-Print Network [OSTI]

.................................................................................76 22 Students? Level of Self-Directedness Compared with Students? Level of Agreement with the Key Assumptions of Andragogy for Course A................78 23 Students? Level of Self-Directedness Compared with Students? Level of Agreement... with the Key Assumptions of Andragogy in Course B..................79 24 Students? Level of Self-Directedness Compared with Students? Level of Agreement with the Key Assumptions of Andragogy in Course C..................80 25 Students? Level of Self...

Richards, Lance Jonathan

2005-11-01T23:59:59.000Z

398

Short period fluctuations of sea level in the West Florida Keys  

E-Print Network [OSTI]

of Sea Level in the West Florida Keys (December, 1978) Sangem Hsu, B. S. , Taiwan Provincial College of Marine and Oceanic Technology. Chairman of Advisory Committee: Dr. Takashi Ichiye In addition to oscillations of astronomical origin, tidal... records often contain shorter or longer period oscillations. Short period oscillations usually have very small amplitudes and often cannot be recognized in the tidal records except near crests or troughs at days of calm weather. The purposes...

Hsu, Sangem

1978-01-01T23:59:59.000Z

399

Eavesdropping Attack with Hong-Ou-Mandel Interferometer and Random Basis Shuffling in Quantum Key Distribution  

E-Print Network [OSTI]

We introduce new sophisticated attacks with a Hong-Ou-Mandel interferometer against quantum key distribution (QKD) and propose a new QKD protocol grafted with random basis shuffling to block up those attacks. When the polarization basis is randomly and independently shuffled by sender and receiver, the new protocol can overcome the attacks even for not-so-weak coherent pulses. We estimate the number of photons to guarantee the security of the protocol.

Chil-Min Kim; Yun Jin Choi; Young-Jai Park

2006-03-02T23:59:59.000Z

400

Differential-phase-shift quantum key distribution with phase modulation to combat sequential attacks  

SciTech Connect (OSTI)

Phase-modulated differential-phase-shift (DPS) quantum key distribution (QKD) is presented for combating sequential attacks that most severely restrict the DPS-QKD system distance. Slow phase modulation imposed onto the DPS signal obstructs the optimum unambiguous state discrimination measurement conducted in the sequential attack and improves the QKD distance as a result. The condition with which the phase modulation does not degrade the DPS-QKD system performance is also described.

Kawahara, Hiroki; Oka, Toru; Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan)

2011-11-15T23:59:59.000Z

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Dissipation attack on Bennett-Brassard 1984 protocol in practical quantum key distribution system  

E-Print Network [OSTI]

We propose a new kind of individual attack, based on randomly selected dissipation, on Bennett-Brassard 1984 protocol of practical quantum key distribution (QKD) system with lossy and noisy quantum channel. Since an adversary with super quantum channel can disguise loss and errors induced by his attack as that of the system, he can obtain innegligible amount of information for a practical QKD system, without being detected by legal participants.

Li Yang; Bing Zhu

2013-05-24T23:59:59.000Z

402

A Differential Phase Shift Scheme for Quantum Key Distribution in Passive Optical Networks  

E-Print Network [OSTI]

We propose a scheme for quantum key distribution (QKD) in a passive optical network (PON) based on differential phase shift (DPS) coding. A centralized station including all expensive components serves many users, making it suitable for a true multi-user network in a local environment with moderate distances on the order of a few kilometers. The emphasis lies on an asymmetric design for cost effective implementation of network end points.

Michael Hentschel; Andreas Poppe; Bernhard Schrenk; Momtchil Peev; Edwin Querasser; Roland Lieger

2014-12-19T23:59:59.000Z

403

Expert Meeting Report: Key Innovations for Adding Energy Efficiency to Maintenance Projects  

SciTech Connect (OSTI)

This report describes an expert meeting hosted by the Building America research team NAHB Research Center, which was held on February 8, 2012, in Orlando, Florida. The topic, Key Innovations for Adding Energy Efficiency to Maintenance Projects, was intended to provide direction to more focused efforts to increase the efficiency of existing homes; in this meeting, the focus was specifically for re-roofing and the opportunities for adding energy efficiency upgrades during this major home repair activity.

Wood, A.; Wiehagen, J.

2012-09-01T23:59:59.000Z

404

NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions  

SciTech Connect (OSTI)

This document provides key definitions, plant capabilities, and inputs and assumptions related to the Next Generation Nuclear Plant to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor. These definitions, capabilities, and assumptions were extracted from a number of NGNP Project sources such as licensing related white papers, previously issued requirement documents, and preapplication interactions with the Nuclear Regulatory Commission (NRC).

Wayne Moe

2013-05-01T23:59:59.000Z

405

Hydrogen Fuel Cell Performance in the Key Early Markets of Material Handling Equipment and Backup Power (Presentation)  

SciTech Connect (OSTI)

This presentation summarizes the results of NREL's analysis of hydrogen fuel cell performance in the key early markets of material handling equipment (MHE) and backup power.

Kurtz, J.; Sprik, S.; Ramsden, T.; Saur, G.; Ainscough, C.; Post, M.; Peters, M.

2013-10-01T23:59:59.000Z

406

Enforcement Policy Statement: Compliance Period for Regional...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

energy conservation standards for residential furnaces, central air conditioners, and heat pumps, including regional standards for different product types in indicated States....

407

Enforcement Policy Statement: Regional Standards Enforcement...  

Office of Environmental Management (EM)

which set forth amended energy conservation standards for central air conditioners and heat pumps, including regional standards in certain States. 76 FR 37408. DOE has initiated...

408

Clean Cities Regional Support & Petroleum Displacement Awards  

Broader source: Energy.gov (indexed) [DOE]

Clean Cities Regional Support & Petroleum Displacement Awards Mike Scarpino & Kay Kelly National Energy Technology Laboratory 052009 This presentation does not contain any...

409

Northwest Region Combined Heat and Power Projects  

Broader source: Energy.gov [DOE]

DOE's Regional CHP Technical Assistance Partnerships (CHP TAPs) have compiled a select number of combined heat and power (CHP) project profiles, which are available as Adobe Acrobat PDFs.

410

Pacific Region Combined Heat and Power Projects  

Broader source: Energy.gov [DOE]

DOE's Regional CHP Technical Assistance Partnerships (CHP TAPs) have compiled a select number of combined heat and power (CHP) project profiles, which are available as Adobe Acrobat PDFs.

411

Northeast Region Combined Heat and Power Projects  

Broader source: Energy.gov [DOE]

DOE's Regional CHP Technical Assistance Partnerships (CHP TAPs) have compiled a select number of combined heat and power (CHP) project profiles, which are available as Adobe Acrobat PDFs.

412

Regional Districts, Commissions, and Authorities (South Carolina)  

Broader source: Energy.gov [DOE]

This legislation establishes a number of regional districts, commissions, and authorities with the power to implement regulations and development plans for protected park and recreational areas.

413

Southeast Regional Clean Energy Policy Analysis  

Office of Energy Efficiency and Renewable Energy (EERE)

This report covers the states that largely fall into the Southeastern Reliability Corporation (SERC) region: Alabama, Arkansas, Georgia, Louisiana, Kentucky, Missouri, Mississippi, North Carolina, South Carolina, and Tennessee.

414

DOE Regional Partnership Successfully Demonstrates Terrestrial...  

Broader source: Energy.gov (indexed) [DOE]

successfully completed by one of the U.S. Department of Energy's (DOE) seven Regional Carbon Sequestration Partnerships (RCSPs). The Plains CO2 Reduction (PCOR) Partnership , a...

415

Unraveling the Timing of Fluid Migration and Trap Formation in the Brooks Range Foothills: A Key to Discovering Hydrocarbons  

SciTech Connect (OSTI)

Naturally occurring fractures can play a key role in the evolution and producibility of a hydrocarbon accumulation. Understanding the evolution of fractures in the Brooks Range/Colville basin system of northern Alaska is critical to developing a better working model of the hydrocarbon potential of the region. This study addressed this problem by collecting detailed and regional data on fracture distribution and character, structural geometry, temperature, the timing of deformation along the Brooks Range rangefront and adjacent parts of the Colville basin, and the in situ stress distribution within the Colville basin. This new and existing data then were used to develop a model of how fractures evolved in northern Alaska, both spatially and temporally. The results of the study indicate that fractures formed episodically throughout the evolution of northern Alaska, due to a variety of mechanisms. Four distinct fracture sets were observed. The earliest fractures formed in deep parts of the Colville basin and in the underlying Ellesmerian sequence rocks as these rocks experienced compression associated with the growing Brooks Range fold-and-thrust belt. The orientation of these deep basin fractures was controlled by the maximum in situ horizontal stress in the basin at the time of their formation, which was perpendicular to the active Brooks Range thrust front. This orientation stayed consistently NS-striking for most of the early history of the Brooks Range and Colville basin, but changed to NW-striking with the development of the northeastern Brooks Range during the early Tertiary. Subsequent incorporation of these rocks into the fold-and-thrust belt resulted in overprinting of these deep basin fractures by fractures caused by thrusting and related folding. The youngest fractures developed as rocks were uplifted and exposed. While this general order of fracturing remains consistent across the Brooks Range and adjacent Colville basin, the absolute age at any one location varies. Fracturing started in the southwest deep in the stratigraphic section during the Late Jurassic and Early Cretaceous, moving northeastward and upsection as the Colville basin filled from the west. Active fracturing is occurring today in the northeastern parts of the Colville basin, north of the northeastern Brooks thrust front. Across northern Alaska, the early deep basin fractures were probably synchronous with hydrocarbon generation. Initially, these early fractures would have been good migration pathways, but would have been destroyed where subsequently overridden by the advancing Brooks Range fold-and-thrust belt. However, at these locations younger fracture sets related to folding and thrusting could have enhanced reservoir permeability and/or served as vertical migration pathways to overlying structural traps.

Catherine L. Hanks

2008-12-31T23:59:59.000Z

416

ZooKeys, unlocking Earth’s incredible biodiversity and building a sustainable bridge into the public domain: From “print-based” to “web-based” taxonomy, systematics, and natural history. ZooKeys Editorial Opening Paper  

E-Print Network [OSTI]

and print journal in zoological taxonomy and systematics, which aims to quickly respond and adapt to the newest developments in taxonomic publishing. Open Access is accepted as mandatory for ZooKeys. Th e rationale for and concept of ZooKeys is discussed...

Penev, Lyubomir; Erwin, Terry; Thompson, F. Christian; Sues, Hans-Dieter; Engel, Michael S.; Agosti, Donat; Pyle, Richard; Ivie, Michael; Assmann, Thorsten; Henry, Thomas; Miller, Jeremy; Ananjeva, Natalia; Casale, Achille; Lourenco, Wilson; Golovatch, Sergei; Fagerholm, Hans-Peter; Taiti, Stefano; Alonso-Zarazaga, Miguel; Nieukerken, Erik van

2008-07-04T23:59:59.000Z

417

Cardiff School of City and Regional Planning  

E-Print Network [OSTI]

Cardiff School of City and Regional Planning Undergraduate Degree Programmes www School of City and Regional Planning 11 BSc Geography (Human) 13 BSc Geography (Human) and Planning 15 to Find Us #12;Welcome 1www.cardiff.ac.uk/cplan Thank you for your interest in the Cardiff School of City

Davies, Christopher

418

Roadmap: Associate of Science Regional College  

E-Print Network [OSTI]

Roadmap: Associate of Science [RE-AS-AS] Regional College Catalog Year: 2013-2014 Page 1 of 2 | Last Updated: 27-Feb-13/LNHD This roadmap is a recommended semester-by-semester plan of study.000 #12;Roadmap: Associate of Science [RE-AS-AS] Regional College Catalog Year: 2013-2014 Page 2 of 2

Sheridan, Scott

419

Roadmap: Associate of Arts Regional College  

E-Print Network [OSTI]

Roadmap: Associate of Arts [RE-AA-AA] Regional College Catalog Year: 2013-2014 Page 1 of 2 | Last Updated: 27-Feb-13/LNHD This roadmap is a recommended semester-by-semester plan of study for this major.000 #12;Roadmap: Associate of Arts [RE-AA-AA] Regional College Catalog Year: 2013-2014 Page 2 of 2 | Last

Sheridan, Scott

420

Roadmap: Associate of Arts Regional College  

E-Print Network [OSTI]

Roadmap: Associate of Arts [RE-AA-AA] Regional College Catalog Year: 2012-2013 Page 1 of 2 | Last Updated: 12-Mar-12/LNHD This roadmap is a recommended semester-by-semester plan of study for this major GPA Overall GPA 61 2.000 2.000 #12;Roadmap: Associate of Arts [RE-AA-AA] Regional College Catalog Year

Sheridan, Scott

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Roadmap: Associate of Science Regional College  

E-Print Network [OSTI]

Roadmap: Associate of Science [RE-AS-AS] Regional College Catalog Year: 2012-2013 Page 1 of 2 | Last Updated: 12-Mar-12/LNHD This roadmap is a recommended semester-by-semester plan of study GPA Overall GPA 61 2.000 2.000 #12;Roadmap: Associate of Science [RE-AS-AS] Regional College Catalog

Sheridan, Scott

422

WORK PROGRAMME 2010 REGIONS OF KNOWLEDGE  

E-Print Network [OSTI]

of regional players in enhancing science and technology based development. Its purpose is to enable regions to strengthen their capacity for investing in and conducting research and technological development activities components of the cluster; · business entities (large enterprises and SMEs as defined in the EC

Milano-Bicocca, UniversitĂ 

423

THE ECONOMIC SITUATION IN THE ECE REGION  

E-Print Network [OSTI]

THE ECONOMIC SITUATION IN THE ECE REGION DIETER HESSE ECONOMIC ANALYSIS DIVISION UNECE #12;Major trends in the global economy so far in 2003 Global economic activity picked up ­ but uneven regional growth forces United States remains main engine of global economic growth Japan and Asian emerging

424

Understanding Regional Economic Growth in India  

E-Print Network [OSTI]

Understanding Regional Economic Growth in India Jeffrey D. Sachs, Nirupam Bajpai and Ananthi Ramiah Papers #12;Understanding Regional Economic Growth in India Jeffrey D. Sachs Center for International Development (CID) Harvard University Ananthi_Ramiah@harvard.edu This paper was prepared for the Asian Economic

425

Predicting Functional Regions of Objects Chaitanya Desai  

E-Print Network [OSTI]

regions. We compare "blind" approaches that ig- nore image data, bottom-up approaches that reason about). We benchmark a wide variety of algo- rithms for producing such outputs, including blind baselines- fords little use to an observer. The central thesis of this work is that functional regions

Ramanan, Deva

426

Regional Water Management: Adapting to Uncertain Water  

E-Print Network [OSTI]

Regional Water Management: Adapting to Uncertain Water Supply and Demand Jim Schneider, Ph · How Nebraska manages water · Dealing with uncertain water supplies: adaptive management #12;Regional-wide, systematic approach · Flexible--Adaptive Management Adaptive Manageme nt #12;Integrated Water Management

Nebraska-Lincoln, University of

427

IN THIS ISSUE Regional Climate Change..............1  

E-Print Network [OSTI]

IN THIS ISSUE · Regional Climate Change..............1 · From the Executive Director...........2 release of new climate change scenarios from the Canadian Regional Climate Model (CRCM) heralds of the fundamental questions remaining with respect to understanding climate change and even climate variability. And

Hamann, Andreas

428

Alamo Area Regional Public Transportation Coordination Plan  

E-Print Network [OSTI]

KFH GROUP, INC. ALAMO AREA REGIONAL PUBLIC TRANSPORTATION COORDINATION PLAN Developed for: The Alamo Area Council of Governments and the San Antonio-Bexar County Metropolitan Planning Organization By: KFH Group..............................................................................................................................4 SUMMARY OF TRAVEL PATTERNS IN THE ALAMO REGION...............................................9 COORDINATION AND SERVICE ALTERNATIVES .................................................................16 COORDINATED TRANSPORTATION: PLANNED...

Alamo Area Council of Governments

2006-11-30T23:59:59.000Z

429

Design Lessons from State and Regional Programs  

E-Print Network [OSTI]

Minimal linkage with cap-and-trade regional regimes #12;Cap & Trade: Regional GHG Initiative (RGGI) #12;RGGI and Sustaining Political Support Narrow Focus: Utilities-only Energy-Environment Network Holds (budgets, staff, emission allocations) #12;RGGI: Challenges of Implementation Leakage: Where

430

MID-ATLANTIC REGIONAL OCEAN RESEARCH PLAN  

E-Print Network [OSTI]

................................................................................. 24 #12;v ASMFC Atlantic States Marine Fisheries Commission BOEM Bureau of Ocean Energy Management BMPMID-ATLANTIC REGIONAL OCEAN RESEARCH PLAN SEPTEMBER 2012 Sea Grant Mid-Atlantic Ocean Research #12;MID-ATLANTIC REGIONAL OCEAN RESEARCH PLAN SEPTEMBER 2012 Sea Grant Mid-Atlantic Ocean Research

431

anemia mga1 region: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Plants Websites Summary: 652013 1 Regional GHG Emissions O tlook Greenhouse Gas and the Regional Power System Symposium Regional GHG Emissions - Outlook June 4, 2013...

432

Shells of crabs like these may be the key to prolonging the life of microbial fuel cells that  

E-Print Network [OSTI]

Shells of crabs like these may be the key to prolonging the life of microbial fuel cells that power/06/ 070604123858.htm Marine Sediment Microbial Fuel Cells Get A Nutritional Boost ScienceDaily (June 11, 2007) -- Discarded crab and lobster shells may be the key to prolonging the life of microbial fuel cells that power

433

Public-Key Cryptography Standards: PKCS Yongge Wang, Ph.D., University of North Carolina at Charlotte  

E-Print Network [OSTI]

;· ISO/IEC. The International Organization for Standardization (ISO) and the International Electrotech. The major standards organizations that have been involved in public key cryptographic techniques are: 1 #12Public-Key Cryptography Standards: PKCS Yongge Wang, Ph.D., University of North Carolina

Wang, Yongge

434

Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky # William E. Skeith III  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky a public­key encryption scheme for Alice that allows PIR searching over encrypted documents. Our solution­trivially small communication complexity. The main technique of our solution also allows for Single­Database PIR

Ostrovsky, Rafail

435

Exploiting the randomness of the measurement basis in quantum cryptography: Secure Quantum Key Growing without Privacy Amplification  

E-Print Network [OSTI]

We suggest that the randomness of the choices of measurement basis by Alice and Bob provides an additional important resource for quantum cryptography. As a specific application, we present a novel protocol for quantum key distribution (QKD) which enhances the BB84 scheme by encrypting the information sent over the classical channel during key sifting. We show that, in the limit of long keys, this process prevents an eavesdropper from reproducing the sifting process carried out by the legitimate users. The inability of the eavesdropper to sift the information gathered by tapping the quantum channel reduces the amount of information that an eavesdropper can gain on the sifted key. We further show that the protocol proposed is self sustaining, and thus allows the growing of a secret key.

Hannes R. Böhm; Paul S. Böhm; Markus Aspelmeyer; ?aslav Brukner; Anton Zeilinger

2004-08-30T23:59:59.000Z

436

Science with the Square Kilometer Array: Motivation, Key Science Projects, Standards and Assumptions  

E-Print Network [OSTI]

The Square Kilometer Array (SKA) represents the next major, and natural, step in radio astronomical facilities, providing two orders of magnitude increase in collecting area over existing telescopes. In a series of meetings, starting in Groningen, the Netherlands (August 2002) and culminating in a `science retreat' in Leiden (November 2003), the SKA International Science Advisory Committee (ISAC), conceived of, and carried-out, a complete revision of the SKA science case (to appear in New Astronomy Reviews). This preface includes: (i) general introductory material, (ii) summaries of the key science programs, and (iii) a detailed listing of standards and assumptions used in the revised science case.

C. Carilli; S. Rawlings

2004-09-12T23:59:59.000Z

437

Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse  

E-Print Network [OSTI]

We prove the unconditional security of the original Bennett 1992 protocol with strong reference pulse. We show that we may place a projection onto suitably defined qubit spaces before the receiver, which makes the analysis as simple as qubit-based protocols. Unlike the single-photon-based qubits, the qubits identified in this scheme are almost surely detected by the receiver even after a lossy channel. This leads to the key generation rate that is proportional to the channel transmission rate for proper choices of experimental parameters.

Kiyoshi Tamaki; Norbert Lütkenhaus; Masato Koashi; Jamie Batuwantudawe

2009-09-03T23:59:59.000Z

438

Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols  

E-Print Network [OSTI]

In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

Horace P. Yuen

2014-05-07T23:59:59.000Z

439

KEY DESIGN REQUIREMENTS FOR THE HIGH TEMPERATURE GAS-COOLED REACTOR NUCLEAR HEAT SUPPLY SYSTEM  

SciTech Connect (OSTI)

Key requirements that affect the design of the high temperature gas-cooled reactor nuclear heat supply system (HTGR-NHSS) as the NGNP Project progresses through the design, licensing, construction and testing of the first of a kind HTGR based plant are summarized. These requirements derive from pre-conceptual design development completed to-date by HTGR Suppliers, collaboration with potential end users of the HTGR technology to identify energy needs, evaluation of integration of the HTGR technology with industrial processes and recommendations of the NGNP Project Senior Advisory Group.

L.E. Demick

2010-09-01T23:59:59.000Z

440

Quantum Key Ditribution Based on Quantum Intensity Correlation of Twin Beams  

E-Print Network [OSTI]

A new and simple quantum key distribution scheme based on the quantum intensity correlation of optical twin beams and the directly local measurements of intensity noise of single optical beam is presented and experimentally demonstrated. Using the twin beams with the quantum intensity correlation of 5dB the effective bit rate of $2\\times 10^7bits/s$ is completed. The noncloning of quantum systems and the sensitivity of the existing correlations to losses provide the physical mechamism for the security against eavesdropping. In the presented scheme the signal modulation and homodyne detection are not needed.

Xiaojun Jia; Xiaolong Su; Qing Pan; Kunchi Peng; Changde Xie

2005-04-08T23:59:59.000Z

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Photon counting for quantum key distribution with Peltier cooled InGaAs/InP APD's  

E-Print Network [OSTI]

The performance of three types of InGaAs/InP avalanche photodiodes is investigated for photon counting at 1550 nm in the temperature range of thermoelectric cooling. The best one yields a dark count probability of $% 2.8\\cdot 10^{-5}$ per gate (2.4 ns) at a detection efficiency of 10% and a temperature of -60C. The afterpulse probability and the timing jitter are also studied. The results obtained are compared with those of other papers and applied to the simulation of a quantum key distribution system. An error rate of 10% would be obtained after 54 kilometers.

Damien Stucki; Grégoire Ribordy; André Stefanov; Hugo Zbinden; John G. Rarity; Tom Wall

2001-06-01T23:59:59.000Z

442

Photon counting for quantum key distribution with Peltier cooled InGaAs/InP APD's  

E-Print Network [OSTI]

The performance of three types of InGaAs/InP avalanche photodiodes is investigated for photon counting at 1550 nm in the temperature range of thermoelectric cooling. The best one yields a dark count probability of $% 2.8\\cdot 10^{-5}$ per gate (2.4 ns) at a detection efficiency of 10% and a temperature of -60C. The afterpulse probability and the timing jitter are also studied. The results obtained are compared with those of other papers and applied to the simulation of a quantum key distribution system. An error rate of 10% would be obtained after 54 kilometers.

Stucki, D; Stefanov, A; Zbinden, H; Rarity, J G; Wall, T; Stucki, Damien; Ribordy, Gr\\'{e}goire; Stefanov, Andr\\'{e}; Zbinden, Hugo; Rarity, John G.; Wall, Tom

2001-01-01T23:59:59.000Z

443

NERSC Played Key Role in Nobel Laureates Discovery  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSC logos arePlayed Key Role in

444

TEC Working Group Topic Groups Tribal Key Documents | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve008 HighDepartment of4MembersKey

445

Turbulence may be key to "fast magnetic reconnection" mystery  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2TopoPortalBRDFTunableTurbulence may be key to

446

Key Challenges in the North American Power Grid | GE Global Research  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfraredJeffersonJonathan PershingrelocatesKaye D.Ken T.NA>Kevlar andKey5

447

A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE, AIKEN, SC  

SciTech Connect (OSTI)

This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on ''rapid'' and, because the available keys contained a large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained more genera than we would likely encounter and because this larger number of genera required both more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher) more time was required to process samples. In developing this set of keys I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.

Martin, D

2006-10-04T23:59:59.000Z

448

The CO2 Content of Consumption Across US Regions: A Multi-Regional  

E-Print Network [OSTI]

, when attributed on a consumption basis, California's per capita emissions are over 25 percent higherThe CO2 Content of Consumption Across US Regions: A Multi-Regional Input-Output (MRIO) Approach: globalchange@mit.edu Website: http://globalchange.mit.edu/ #12;The CO2 Content of Consumption Across US Regions

449

Arrowhead Center: Coal Production and Regional Economic Growth Report Title: Coal Production and Regional Economic Growth  

E-Print Network [OSTI]

Arrowhead Center: Coal Production and Regional Economic Growth Report Title: Coal Production@nmsu.edu #12;Arrowhead Center: Coal Production and Regional Economic Growth i Disclaimer This report States Government or any agency thereof. #12;Arrowhead Center: Coal Production and Regional Economic

Johnson, Eric E.

450

Regional Climate Modeling: Progress, Challenges, and Prospects  

SciTech Connect (OSTI)

Regional climate modeling with regional climate models (RCMs) has matured over the past decade and allows for meaningful utilization in a broad spectrum of applications. In this paper, latest progresses in regional climate modeling studies are reviewed, including RCM development, applications of RCMs to dynamical downscaling for climate change assessment, seasonal climate predictions and climate process studies, and the study of regional climate predictability. Challenges and potential directions of future research in this important area are discussed, with the focus on those to which less attention has been given previously, such as the importance of ensemble simulations, further development and improvement of regional climate modeling approach, modeling extreme climate events and sub-daily variation of clouds and precipitation, model evaluation and diagnostics, applications of RCMs to climate process studies and seasonal predictions, and development of regional earth system models. It is believed that with both the demonstrated credibility of RCMs’ capability in reproducing not only monthly to seasonal mean climate and interannual variability but also the extreme climate events when driven by good quality reanalysis and the continuous improvements in the skill of global general circulation models (GCMs) in simulating large-scale atmospheric circulation, regional climate modeling will remain an important dynamical downscaling tool for providing the needed information for assessing climate change impacts and seasonal climate predictions, and a powerful tool for improving our understanding of regional climate processes. An internationally coordinated effort can be developed with different focuses by different groups to advance regional climate modeling studies. It is also recognized that since the final quality of the results from nested RCMs depends in part on the realism of the large-scale forcing provided by GCMs, the reduction of errors and improvement in physics parameterizations in both GCMs and RCMs remain a priority for climate modeling community.

Wang, Yuqing; Leung, Lai R.; McGregor, John L.; Lee, Dong-Kyou; Wang, Wei-Chyung; Ding, Yihui; Kimura, Fujio

2004-12-01T23:59:59.000Z

451

A key factor to the spin parameter of uniformly rotating compact stars: crust structure  

E-Print Network [OSTI]

We study the key factor to determine the dimensionless spin parameter $j\\equiv cJ/(GM^2)$ of different kinds of uniformly rotating compact stars, including the traditional neutron stars, hyperonic neutron stars, and hybrid stars, and check the reliability of the results on various types of equations of state of dense matter. The equations of state from the relativistic mean field theory and the MIT bag model are adopted to simulate compact stars. Numerical calculations of rigidly rotating neutron stars are performed using the RNS code in the framework of general relativity by solving the Einstein equations for stationary axis-symmetric spacetime. The crust structure of compact stars is found to be a key factor to determine the maximum value of the spin parameter $j_{\\rm max}$. For the stars with inclusion of the crust, $j_{\\rm max}\\sim 0.7$ is sustained for various kinds of compact stars with $M>0.5 M_{\\odot}$, and is found to be insensitive to the mass of star and selected equations of state. For the traditi...

Qi, B; Sun, B Y; Wang, S Y; Gao, J H

2014-01-01T23:59:59.000Z

452

Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols  

E-Print Network [OSTI]

Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e. the dense-coding attack. It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice's encoding. The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed. Furthermore, this attack does not introduce any errors to the transmitted information and consequently will not be discovered by Alice and Bob. The attack strategy is described in detail and a proof for its correctness is given. At last, the root of this insecurity and a possible way to improve these protocols are discussed.

Fei Gao; Su-Juan Qin; Fen-Zhuo Guo; Qiao-Yan Wen

2011-04-20T23:59:59.000Z

453

Passive faraday mirror attack in practical two-way quantum key distribution system  

E-Print Network [OSTI]

The faraday mirror (FM) plays a very important role in maintaining the stability of two way plug-and-play quantum key distribution (QKD) system. However, the practical FM is imperfect, which will not only introduce additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper, we propose a passive faraday mirror attack in two way QKD system based on the imperfection of FM. Our analysis shows that, if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of POVM operators belonging to three dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that, the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes with the degree of the imperfection of FM slightly.

Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

2012-03-04T23:59:59.000Z

454

Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system  

SciTech Connect (OSTI)

The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes slightly with the degree of the FM imperfection.

Sun Shihai; Jiang Musheng; Liang Linmei [Department of Physics, National University of Defense Technology, Changsha 410073 (China)

2011-06-15T23:59:59.000Z

455

Distribution Statistics and Random Matrix Formalism of Multicarrier Continuous-Variable Quantum Key Distribution  

E-Print Network [OSTI]

We propose a combined mathematical framework of order statistics and random matrix theory for multicarrier continuous-variable (CV) quantum key distribution (QKD). In a multicarrier CVQKD scheme, the information is granulated into Gaussian subcarrier CVs, and the physical Gaussian link is divided into Gaussian sub-channels. The sub-channels are dedicated to the conveying of the subcarrier CVs. The distribution statistics analysis covers the study of the distribution of the sub-channel transmittance coefficients in the presence of a Gaussian noise and the utilization of the moment generation function (MGF) in the error analysis. We reveal the mathematical formalism of sub-channel selection and formulation of the transmittance coefficients, and show a reduced complexity progressive sub-channel scanning method. We define a random matrix formalism for multicarrier CVQKD to evaluate the statistical properties of the information flowing process. Using random matrix theory, we express the achievable secret key rates and study the efficiency of the AMQD-MQA (adaptive multicarrier quadrature division-multiuser quadrature allocation) multiple-access multicarrier CVQKD. The proposed combined framework is particularly convenient for the characterization of the physical processes of experimental multicarrier CVQKD.

Laszlo Gyongyosi

2014-10-30T23:59:59.000Z

456

PMI-based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme  

E-Print Network [OSTI]

In the literature, J.-P. Cheng et al. have proposed the MIMO-OFDM PHY integrated (MOPI) scheme for achieving physical-layer security in practice without using any cryptographic ciphers. The MOPI scheme uses channel sounding and physical-layer network coding (PNC) to prevent eavesdroppers from learning the channel state information (CSI). Nevertheless, due to the use of multiple antennas for PNC at transmitter and beamforming at receiver, it is not possible to have spatial multiplexing nor use space-time codes in our previous MOPI scheme. In this paper, we propose a variant of the MOPI scheme, called P-MOPI, that works with a cryptographic cipher and utilizes precoding matrix index (PMI) as an efficient key-exchange mechanism. With channel sounding, the PMI is only known between the transmitter and the legal receiver. The shared key can then be used, e.g., as the seed to generate pseudo random bit sequences for securing subsequent transmissions using a stream cipher. By applying the same techniques at independ...

Lan, Pang-Chang; Lee, Chia-Han; Yeh, Ping-Cheng; Cheng, Chen-Mou

2011-01-01T23:59:59.000Z

457

Club Convergence of House Prices: Evidence from China's Ten Key Cities  

E-Print Network [OSTI]

The latest global financial tsunami and its follow-up global economic recession has uncovered the crucial impact of housing markets on financial and economic systems. The Chinese stock market experienced a markedly fall during the global financial tsunami and China's economy has also slowed down by about 2\\%-3\\% when measured in GDP. Nevertheless, the housing markets in diverse Chinese cities seemed to continue the almost nonstop mania for more than ten years. However, the structure and dynamics of the Chinese housing market are less studied. Here we perform an extensive study of the Chinese housing market by analyzing ten representative key cities based on both linear and nonlinear econophysical and econometric methods. We identify a common collective driving force which accounts for 96.5\\% of the house price growth, indicating very high systemic risk in the Chinese housing market. The ten key cities can be categorized into clubs and the house prices of the cities in the same club exhibit an evident converge...

Meng, Hao; Zhou, Wei-Xing

2015-01-01T23:59:59.000Z

458

Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals  

E-Print Network [OSTI]

Most experimental realizations of quantum key distribution are based on the Bennett-Brassard 1984 (so-called BB84) protocol. In a typical optical implementation of this scheme, the sender uses an active source to produce the required BB84 signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental setups operating at high transmission rates. Passive schemes might also be more robust against side-channel attacks than active sources. Typical passive devices involve parametric down-conversion. In this paper, we show that both coherent light and practical single photon sources are also suitable for passive generation of BB84 signal states. Our method does not require any external-driven element, but only linear optical components and photodetectors. In the case of coherent light, the resulting key rate is similar to the one delivered by an active source. When the sender uses practical single photon sources, however, the distance covered by a passive transmitter might be longer than the one of an active configuration.

Marcos Curty; Xiongfeng Ma; Hoi-Kwong Lo; Norbert Lütkenhaus

2010-09-20T23:59:59.000Z

459

Generating the local oscillator "locally" in continuous-variable quantum key distribution based on coherent detection  

E-Print Network [OSTI]

Continuous-variable quantum key distribution (CV-QKD) protocols based on coherent detection have been studied extensively in both theory and experiment. In all the existing implementations of CV-QKD, both the quantum signal and the local oscillator (LO) are generated from the same laser and propagate through the insecure quantum channel. This arrangement may open security loopholes and also limit the potential applications of CV-QKD. In this paper, we propose and demonstrate a pilot-aided feedforward data recovery scheme which enables reliable coherent detection using a "locally" generated LO. Using two independent commercial laser sources and a spool of 25 km optical fiber, we construct a coherent communication system. The variance of the phase noise introduced by the proposed scheme is measured to be 0.04 (rad^2), which is small enough to enable secure key distribution. This technology also opens the door for other quantum communication protocols, such as the recently proposed measurement-device-independent (MDI) CV-QKD where independent light sources are employed by different users.

Bing Qi; Pavel Lougovski; Raphael Pooser; Warren Grice; Miljko Bobrek

2015-03-02T23:59:59.000Z

460

Bounds on entanglement distillation and secret key agreement for quantum broadcast channels  

E-Print Network [OSTI]

The squashed entanglement of a quantum channel is an additive function of quantum channels, which finds application as an upper bound on the rate at which secret key and entanglement can be generated when using a quantum channel a large number of times in addition to unlimited classical communication. This quantity has led to an upper bound of $\\log((1+\\eta )/(1-\\eta))$ on the capacity of an optical communication channel for such a task, where $\\eta$ is the average fraction of photons that make it from the input to the output of the channel. The purpose of the present paper is to extend these results beyond the single-sender single-receiver setting to the more general case of a single sender and multiple receivers (a quantum broadcast channel). We employ multipartite generalizations of the squashed entanglement to constrain the rates at which secret key and entanglement can be generated between any subset of the users of such a channel, along the way developing several new properties of these measures. We apply our results to the case of an optical broadcast channel with one sender and two receivers.

Kaushik P. Seshadreesan; Masahiro Takeoka; Mark M. Wilde

2015-03-27T23:59:59.000Z

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Blending Hydrogen into Natural Gas Pipeline Networks: A Review of Key Issues  

SciTech Connect (OSTI)

The United States has 11 distinct natural gas pipeline corridors: five originate in the Southwest, four deliver natural gas from Canada, and two extend from the Rocky Mountain region. This study assesses the potential to deliver hydrogen through the existing natural gas pipeline network as a hydrogen and natural gas mixture to defray the cost of building dedicated hydrogen pipelines.

Melaina, M. W.; Antonia, O.; Penev, M.

2013-03-01T23:59:59.000Z

462

CSCL@Work Chapter Regional Learning in Software Industries CSCL@Networking -Regional Learning in Software Industries  

E-Print Network [OSTI]

learning across organizational boundaries. Keywords Regional Learning, Software Industry, Networks learning across organizational boundaries. Keywords Regional Learning, Software Industry, Networks1 CSCL@Work ­ Chapter Regional Learning in Software Industries CSCL@Networking - Regional Learning

463

Public School Transportation National and Regional  

E-Print Network [OSTI]

Public School Transportation National and Regional Perspectives: An Update Presented to Education University #12;Table of Contents I. Current Transportation Funding Policies ..................................................................................................................................1 B. Transportation Funding Options Used by States

Mohaghegh, Shahab

464

REGIONAL TECHNICAL FORUM STATEMENT OF WORK  

E-Print Network [OSTI]

and distribution systems, Smart-Grid applications and other activities such as system operations that would benefit Program (ELCAP) and Regional End-use #12;2 Metering Program (REMP) in the 1980's and early 1990's

465

AWEA Wind Energy Regional Summit: Northeast  

Office of Energy Efficiency and Renewable Energy (EERE)

The AWEA Wind Energy Northeast Regional Summit will connect you with New England-area wind energy professionals and offers the opportunity to discuss significant issues related to land-based and...

466

Detection of amplified or deleted chromosomal regions  

DOE Patents [OSTI]

The present invention relates to in situ hybridization methods for the identification of new chromosomal abnormalities associated with various diseases. In particular, it provides probes which are specific to a region of amplification in chromosome 20. 3 figs.

Stokke, T.; Pinkel, D.; Gray, J.W.

1995-12-05T23:59:59.000Z

467

[working paper] Regional Economic Capacity, Economic Shocks,  

E-Print Network [OSTI]

1 [working paper] Regional Economic Capacity, Economic Shocks, and Economic that makes them more likely to resist economic shocks or to recover quickly from of resilience capacity developed by Foster (2012) is related to economic resilience

Sekhon, Jasjeet S.

468

What is the Broad Line Region?  

E-Print Network [OSTI]

What is the Broad Line Region (BLR) made of? What determines its location? Why is it sometimes missing? What controls its properties? Some recent results and new approaches which may shed light on these issues are briefly described.

Ari Laor

2003-12-16T23:59:59.000Z

469

Environmental Radioactivity in the North Atlantic Region.  

E-Print Network [OSTI]

, polonium« plutonium and americium. Finally technetium-99 data on seaweed samples col- lected in the North Atlantic region since the beginning of the sixties are presented. INIS Descriptors AMERICIUM 241; ANIMALS

470

Northwestern Indiana Regional Planning Commission (Indiana)  

Broader source: Energy.gov [DOE]

NIRPC is a regional council of local governments serving the citizens of Lake, Porter, and LaPorte counties in Northwest Indiana. NIRPC provides a forum that enables the citizens of Northwest...

471

Regional analysis of energy facility siting  

SciTech Connect (OSTI)

This paper has examined some of the regional environmental parameters of energy facility siting, with emphasis on air quality impacts. An example of a siting optimization study was presented, and it was shown how difficult it presently is to specify an environmental objective function that is universally applicable. The importance of regional background effects was discussed, and long-range transport models were used to analyze the relative importance of local and long-range impacts.

Lipfert, F W; Meier, P M; Kleinman, L I

1980-01-01T23:59:59.000Z

472

Soil Landscape Assessment atSoil Landscape Assessment at D I l d L A C d KD I l d L A C d KDog Island Lease Area, Cedar KeyDog Island Lease Area, Cedar Key  

E-Print Network [OSTI]

Soil Landscape Assessment atSoil Landscape Assessment at D I l d L A C d KD I l d L A C d KDog Island Lease Area, Cedar KeyDog Island Lease Area, Cedar Key #12;Soil SampleSoil Sample LocationsLocationsLocationsLocations #12;Soil ElevationSoil Elevation (Bathymetry)(Bathymetry)(Bathymetry)(Bathymetry) 1.5 ft NAD881.5 ft

Florida, University of

473

Key Elements of Robustness in Binary Black Hole Evolutions using Spectral Methods  

E-Print Network [OSTI]

As a network of advanced-era gravitational wave detectors is nearing its design sensitivity, efficient and accurate waveform modeling becomes more and more relevant. Understanding of the nature of the signal being sought can have an order unity effect on the event rates seen in these instruments. The paper provides a description of key elements of the Spectral Einstein Code ({\\tt SpEC}), with details of our spectral adaptive mesh refinement (AMR) algorithm that has been optimized for binary black hole (BBH) evolutions. We expect that the gravitational waveform catalog produced by our code will have a central importance in both the detection and parameter estimation of gravitational waves in these instruments.

Bela Szilagyi

2014-05-14T23:59:59.000Z

474

Key technological issues in LMFBR high-temperature structural design - the US perspective  

SciTech Connect (OSTI)

The purpose of this paper is: (1) to review the key technological issues in LMFBR high-temperature structural design, particularly as they relate to cost reduction; and (2) to provide an overview of activities sponsored by the US Department of Energy to resolve the issues and to establish stable, standardized, and defensible structural design methods and criteria. Specific areas of discussion include: weldments, structural validation tests, simplified design analysis procedures, design procedures for piping, validation of the methodology for notch-like geometries, improved life assessment procedures, thermal striping, extension of the methodology to new materials, and ASME high-temperature Code reform needs. The perceived problems and needs in each area are discussed, and the current status of related US activities is given.

Corum, J.M.

1984-01-01T23:59:59.000Z

475

Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol  

E-Print Network [OSTI]

In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the "discretized gaussian" intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100km reported by Diamanti et al. turns out to be insecure. Moreover it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95km.

Toyohiro Tsurumaru

2006-12-25T23:59:59.000Z

476

NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions  

SciTech Connect (OSTI)

This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

Phillip Mills

2012-02-01T23:59:59.000Z

477

Virtual gravitational dipoles: The key for the understanding of the Universe?  

E-Print Network [OSTI]

Before the end of this decade, three competing experiments (ALPHA, AEGIS and GBAR) will discover if atoms of antihydrogen fall up or down. We wonder what the major changes in astrophysics and cosmology would be if it is experimentally confirmed that antimatter falls upwards. The key point is: If antiparticles have negative gravitational charge, the quantum vacuum, well established in the Standard Model of Particles and Fields, contains virtual gravitational dipoles. The main conclusions are: (1) the physical vacuum enriched with gravitational dipoles is compatible with a cyclic universe alternatively dominated by matter and antimatter, without initial singularity and without need for cosmic inflation; (2) the virtual dipoles might explain the phenomena usually attributed to dark matter and dark energy. While what we have presented is still far from a complete theory, hopefully it can stimulate a radically different and potentially important way of thinking.

Dragan Slavkov Hajdukovic

2014-04-10T23:59:59.000Z

478

Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices  

SciTech Connect (OSTI)

Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: ? 4 wave energy generation technologies ? 3 tidal energy generation technologies ? 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal) ? 3 project sizes: pilot, small commercial, and large commercial The possible combinations total 24 wave technology scenarios and 9 tidal technology scenarios. We evaluated 3 of the 33 scenarios in detail: 1. A small commercial OPT Power Buoy project off the Humboldt County, California coast 2. A small commercial Pelamis Wave Power P-2 project off Makapu’u Point, Oahu, Hawaii 3. A pilot MCT SeaGen tidal project, sited in the Tacoma Narrows, Washington This framework document used information available from permitting documents that were written to support actual wave or tidal energy projects, but the results obtained here should not be confused with those of the permitting documents1. The main difference between this framework document and permitting documents of currently proposed pilot projects is that this framework identifies key environmental concerns and describes the next steps in addressing those concerns; permitting documents must identify effects, find or declare thresholds of significance, evaluate the effects against the thresholds, and find mitigation measures that will minimize or avoid the effects so they can be considered less-than-significant. Two methodologies, 1) an environmental effects analysis and 2) Raptools, were developed and tested to identify potential environmental effects associated with wave or tidal energy conversion projects. For the environmental effects analysis, we developed a framework based on standard risk assessment techniques. The framework was applied to the three scenarios listed above. The environmental effects analysis addressed questions such as: ? What is the temporal and spatial exposure of a species at a site? ? What are the specific potential project effects on that species? ? What measures could minimize, mitigate, or eliminate negative effects? ? Are there potential effects of the project, or species’ response to the effect, that are highly uncertain and warrant additional study? The second methodology, Raptools, is a collaborative approach useful for evaluating multiple characteristi

Sharon Kramer; Mirko Previsic; Peter Nelson; Sheri Woo

2010-06-17T23:59:59.000Z

479

Key components for nano-assembled plasmon-excited single molecule non-linear devices  

E-Print Network [OSTI]

Tremendous enhancement of light-matter interaction in plasmon-excited molecular hybrid devices allows for non-linearities on the level of single emitters and few photons. This promises a plethora of novel applications like single photon transistors. Nevertheless, building the components of such devices is technologically extremely challenging. We tackle this task by lithographically fabricating on-chip plasmonic waveguides, efficiently connected to far-field in- and out-coupling ports via low-loss dielectric waveguides. Furthermore, a nano-assembling technology is developed, enabling the controlled coupling of single organic emitters to the plasmonic waveguides. Dibenzoterrylene fluorescent molecules hosted in anthracene crystals are investigated for this purpose. Here we present all key-components and technologies for a plasmon-excited single molecule non-linear device.

Kewes, Günter; Mazzamuto, Giacomo; Neitzke, Oliver; Schönfeld, Rolf-Simon; Schell, Andreas W; Probst, Jürgen; Wolters, Janik; Löchel, Bernd; Toninelli, Costanza; Benson, Oliver

2015-01-01T23:59:59.000Z

480

Transportation Energy Futures: Key Opportunities and Tools for Decision Makers (Brochure)  

SciTech Connect (OSTI)

The Transportation Energy Futures (TEF) project examines underexplored greenhouse gas-abatement and oil-savings opportunities by consolidating transportation energy knowledge, conducting advanced analysis, and exploring additional opportunities for sound strategic action. Led by NREL, in collaboration with Argonne National Laboratory, the project's primary goal is to provide analysis to accompany DOE-EERE's long-term transportation energy planning by addressing high-priority questions, informing domestic decisions about transportation energy strategies, priorities, and investments. Research and analysis were conducted with an eye toward short-term actions that support long-term energy goals The project looks beyond technology to examine each key question in the context of the marketplace, consumer behavior, industry capabilities, and infrastructure. This updated fact sheet includes a new section on initial project findings.

Not Available

2012-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "key resource-rich regions" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Risk analysis of Trojan-horse attacks on practical quantum key distribution systems  

E-Print Network [OSTI]

An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

2014-12-19T23:59:59.000Z

482

Abstract--In models of imperfect competition of deregulated electricity markets, the key task is to find the Nash equilibrium  

E-Print Network [OSTI]

1 Abstract--In models of imperfect competition of deregulated electricity markets, the key task techniques are adopted in this paper. Two example application problems arising from electricity markets Terms-- Bimatrix Game, Complementarity Problem, Deregulation, Dominated Strategy, Electric Power Market

Baldick, Ross

483

Optimal individual attack on BB84 quantum key distribution using single-photon two-qubit quantum logic  

E-Print Network [OSTI]

We propose the use of single-photon two-qubit quantum logic to physically simulate the optimal individual attack on Bennett-Brassard 1984 quantum key distribution protocol.The experimental setup does not require a quantum ...

Garcia-Patron Sanchez, Raul

484

NIST ITL Participation in Voluntary Standards Developing Organizations (Key: Highlighted activities represent areas, which are international in scope.  

E-Print Network [OSTI]

1 NIST ITL Participation in Voluntary Standards Developing Organizations (Key: Highlighted Technical Standards Committee E. Simmon 775 IEC SC3D International Electrotechnical Commission Subcommittee International Electrotechnical Commission Technical Committee 111, Environmental standardization for electrical

485

Unternehmen und Social Media wie passt das zusammen? Dr. Alexander Stocker, Key Researcher, DIGITAL Institut fr Informations und  

E-Print Network [OSTI]

Unternehmen und Social Media ­ wie passt das zusammen? Dr. Alexander Stocker, Key Researcher, DIGITAL ­ Institut für Informations und Kommunikationstechnologien, JOANNEUM RESEARCH. DI Harald Mayer, Head of Intelligent Information Systems Group, DIGITAL Institut für Informations und

Hammerton, James

486

Mid-Atlantic Regional Wind Energy Institute  

SciTech Connect (OSTI)

As the Department of Energy stated in its 20% Wind Energy by 2030 report, there will need to be enhanced outreach efforts on a national, state, regional, and local level to communicate wind development opportunities, benefits and challenges to a diverse set of stakeholders. To help address this need, PennFuture was awarded funding to create the Mid-Atlantic Regional Wind Energy Institute to provide general education and outreach on wind energy development across Maryland, Virginia, Delaware, Pennsylvania and West Virginia. Over the course of the two-year grant period, PennFuture used its expertise on wind energy policy and development in Pennsylvania and expanded it to other states in the Mid-Atlantic region. PennFuture accomplished this through reaching out and establishing connections with policy makers, local environmental groups, health and economic development organizations, and educational institutions and wind energy developers throughout the Mid-Atlantic region. PennFuture conducted two regional wind educational forums that brought together wind industry representatives and public interest organizations from across the region to discuss and address wind development in the Mid-Atlantic region. PennFuture developed the agenda and speakers in collaboration with experts on the ground in each state to help determine the critical issue to wind energy in each location. The sessions focused on topics ranging from the basics of wind development; model ordinance and tax issues; anti-wind arguments and counter points; wildlife issues and coalition building. In addition to in-person events, PennFuture held three webinars on (1) Generating Jobs with Wind Energy; (2) Reviving American Manufacturing with Wind Power; and (3) Wind and Transmission. PennFuture also created a web page for the institute (http://www.midatlanticwind.org) that contains an online database of fact sheets, research reports, sample advocacy letters, top anti-wind claims and information on how to address them, wind and wildlife materials and sample model ordinances. Video and presentations from each in-person meeting and webinar recordings are also available on the site. At the end of the two-year period, PennFuture has accomplished its goal of giving a unified voice and presence to wind energy advocates in the Mid-Atlantic region. We educated a broad range of stakeholders on the benefits of wind energy and gave them the tools to help make a difference in their states. We grew a database of over 500 contacts and hope to continue the discussion and work around the importance of wind energy in the region.

Courtney Lane

2011-12-20T23:59:59.000Z

487

A Hierarchical Evaluation of Regional Climate Simulations  

SciTech Connect (OSTI)

Global climate models (GCMs) are the primary tools for predicting the evolution of the climate system. Through decades of development, GCMs have demonstrated useful skill in simulating climate at continental to global scales. However, large uncertainties remain in projecting climate change at regional scales, which limit our ability to inform decisions on climate change adaptation and mitigation. To bridge this gap, different modeling approaches including nested regional climate models (RCMs), global stretch-grid models, and global high-resolution atmospheric models have been used to provide regional climate simulations (Leung et al. 2003). In previous efforts to evaluate these approaches, isolating their relative merits was not possible because factors such as dynamical frameworks, physics parameterizations, and model resolutions were not systematically constrained. With advances in high performance computing, it is now feasible to run coupled atmosphere-ocean GCMs at horizontal resolution comparable to what RCMs use today. Global models with local refinement using unstructured grids have become available for modeling regional climate (e.g., Rauscher et al. 2012; Ringler et al. 2013). While they offer opportunities to improve climate simulations, significant efforts are needed to test their veracity for regional-scale climate simulations.

Leung, Lai-Yung R.; Ringler, Todd; Collins, William D.; Taylor, Mark; Ashfaq, Moetasim

2013-08-20T23:59:59.000Z

488

Multilateral, regional and bilateral energy trade governance  

SciTech Connect (OSTI)

The current international energy trade governance system is fragmented and multi-layered. Streamlining it for greater legal cohesiveness and international political and economic cooperation would promote global energy security. The current article explores three levels of energy trade governance: multilateral, regional and bilateral. Most energy-rich countries are part of the multilateral trading system, which is institutionalized by the World Trade Organization (WTO). The article analyzes the multilateral energy trade governance system by focusing on the WTO and energy transportation issues. Regionally, the article focuses on five major regional agreements and their energy-related aspects and examines the various causes that explain the proliferation of regional trade agreements, their compatibility with WTO law, and then provides several examples of regional energy trade governance throughout the world. When it comes to bilateral energy trade governance, this article only addresses the European Union’s (EU) bilateral energy trade relations. The article explores ways in which gaps could be filled and overlaps eliminated whilst remaining true to the high-level normative framework, concentrating on those measures that would enhance EU energy security.

Leal-Arcas, Rafael; Grasso, Costantino; Rios, Juan Alemany (Queen Mary Univ. of London (United Kingdom))

2014-12-01T23:59:59.000Z

489

IS ACTIVE REGION CORE VARIABILITY AGE DEPENDENT?  

SciTech Connect (OSTI)

The presence of both steady and transient loops in active region cores has been reported from soft X-ray and extreme-ultraviolet observations of the solar corona. The relationship between the different loop populations, however, remains an open question. We present an investigation of the short-term variability of loops in the core of two active regions in the context of their long-term evolution. We take advantage of the nearly full Sun observations of STEREO and Solar Dynamics Observatory spacecraft to track these active regions as they rotate around the Sun multiple times. We then diagnose the variability of the active region cores at several instances of their lifetime using EIS/Hinode spectral capabilities. We inspect a broad range of temperatures, including for the first time spatially and temporally resolved images of Ca XIV and Ca XV lines. We find that the active region cores become fainter and steadier with time. The significant emission measure at high temperatures that is not correlated with a comparable increase at low temperatures suggests that high-frequency heating is viable. The presence, however, during the early stages, of an enhanced emission measure in the ''hot'' (3.0-4.5 MK) and ''cool'' (0.6-0.9 MK) components suggests that low-frequency heating also plays a significant role. Our results explain why there have been recent studies supporting both heating scenarios.

Ugarte-Urra, Ignacio [College of Science, George Mason University, 4400 University Drive, Fairfax, VA 22030 (United States); Warren, Harry P. [Space Science Division, Naval Research Laboratory, Washington, DC 20375 (United States)

2012-12-10T23:59:59.000Z

490

Future regional climate change in the ten hydrologic regions of California: A climate modeling investigation  

E-Print Network [OSTI]

snow accumulation (mm snow water equivalent) by region.Bell, J.L. , Jour. American Water Resources Assoc. , 591-CO, 1993. Department of Water Resources (DWR), California

Sloan, Lisa C

2005-01-01T23:59:59.000Z

491

Light emitting device having peripheral emissive region  

DOE Patents [OSTI]

Light emitting devices are provided that include one or more OLEDs disposed only on a peripheral region of the substrate. An OLED may be disposed only on a peripheral region of a substantially transparent substrate and configured to emit light into the substrate. Another surface of the substrate may be roughened or include other features to outcouple light from the substrate. The edges of the substrate may be beveled and/or reflective. The area of the OLED(s) may be relatively small compared to the substrate surface area through which light is emitted from the device. One or more OLEDs also or alternatively may be disposed on an edge of the substrate about perpendicular to the surface of the substrate through which light is emitted, such that they emit light into the substrate. A mode expanding region may be included between each such OLED and the substrate.

Forrest, Stephen R

2013-05-28T23:59:59.000Z

492

Extended emission associated with young HII regions  

E-Print Network [OSTI]

We have used the Australia Telescope Compact Array (ATCA) to make observations of a sample of eight young ultra-compact HII regions, selected on the basis that they have associated class II methanol maser emission. We have made observations sensitive to both compact and extended structures and find both to be present in most sources. The scale of the extended emission in our sample is in general less than that observed towards samples based on IRAS properties, or large single-dish flux densities. Our observations are consistent with a scenario where extended and compact radio continuum emission coexists within HII regions for a significant period of time. We suggest that these observations are consistent with a model where HII evolution takes place within hierarchically structured molecular clouds. This model is the subject of a companion paper (Shabala et al. 2005) and addresses both the association between compact and extended emission and UCHII region lifetime problem.

S. P. Ellingsen; S. S. Shabala; S. E. Kurtz

2004-12-06T23:59:59.000Z

493

SOUTHWEST REGIONAL PARTNERSHIP ON CARBON SEQUESTRATION  

SciTech Connect (OSTI)

The Southwest Partnership Region includes six whole states, including Arizona, Colorado, Kansas, New Mexico, Oklahoma, and Utah, roughly one-third of Texas, and significant portions of adjacent states. The Partnership comprises a large, diverse group of expert organizations and individuals specializing in carbon sequestration science and engineering, as well as public policy and outreach. The main objective of the Southwest Partnership project is to achieve an 18% reduction in carbon intensity by 2012. The Partnership made great progress in this first year. Action plans for possible Phase II carbon sequestration pilot tests in the region are almost finished, including both technical and non-technical aspects necessary for developing and carrying out these pilot tests. All partners in the Partnership are taking an active role in evaluating and ranking optimum sites and technologies for capture and storage of CO{sub 2} in the Southwest Region. We are identifying potential gaps in all aspects of potential sequestration deployment issues.

Brian McPherson; Rick Allis; Barry Biediger; Joel Brown; Jim Cappa; George Guthrie; Richard Hughes; Eugene Kim; Robert Lee; Dennis Leppin; Charles Mankin; Orman Paananen; Rajesh Pawar; Tarla Peterson; Steve Rauzi; Jerry Stuth; Genevieve Young

2004-11-01T23:59:59.000Z

494

WRF Test on IBM BG/L:Toward High Performance Application to Regional Climate Research  

SciTech Connect (OSTI)

The effects of climate change will mostly be felt on local to regional scales (Solomon et al., 2007). To develop better forecast skill in regional climate change, an integrated multi-scale modeling capability (i.e., a pair of global and regional climate models) becomes crucially important in understanding and preparing for the impacts of climate change on the temporal and spatial scales that are critical to California's and nation's future environmental quality and economical prosperity. Accurate knowledge of detailed local impact on the water management system from climate change requires a resolution of 1km or so. To this end, a high performance computing platform at the petascale appears to be an essential tool in providing such local scale information to formulate high quality adaptation strategies for local and regional climate change. As a key component of this modeling system at LLNL, the Weather Research and Forecast (WRF) model is implemented and tested on the IBM BG/L machine. The objective of this study is to examine the scaling feature of WRF on BG/L for the optimal performance, and to assess the numerical accuracy of WRF solution on BG/L.

Chin, H S

2008-09-25T23:59:59.000Z

495

Ultra-Compact H II Regions and the Early Lives of Massive Stars  

E-Print Network [OSTI]

We review the phenomenon of ultra-compact H II regions (UCHIIs) as a key phase in the early lives of massive stars. This most visible manifestation of massive star formation begins when the Lyman continuum output from the massive young stellar object becomes sufficient to ionize the surroundings from which it was born. Knowledge of this environment is gained through an understanding of the morphologies of UCHII regions and we examine the latest developments in deep radio and mid-IR imaging. SPITZER data from the GLIMPSE survey are an important new resource in which PAH emission and the ionizing stars can be seen. We review the role played by strong stellar winds from the central stars in sweeping out central cavities and causing the limb-brightened appearance. A range of evidence from velocity structure, proper motions, the molecular environment and recent hydrodynamical modeling indicates that cometary UCHII regions require a combination of champagne flow and bow shock motion. Finally, we discuss the class of hyper-compact H II regions or broad recombination line objects. They are likely to mark the transition soon after the breakout of the Lyman continuum radiation from the young star. Models for these objects are presented, including photo-evaporating disks and ionized accretion flows that are gravitationally trapped. Evolutionary scenarios tracing young massive stars passage through these ionized phases are discussed.

M. G. Hoare; S. E. Kurtz; S. Lizano; E. Keto; P. Hofner

2006-03-21T23:59:59.000Z

496

FY08 LDRD Final Report Regional Climate  

SciTech Connect (OSTI)

An integrated, multi-model capability for regional climate change simulation is needed to perform original analyses to understand and prepare for the impacts of climate change on the time and space scales that are critical to California's future environmental quality and economic prosperity. Our intent was to develop a very high resolution regional simulation capability to address consequences of climate change in California to complement the global modeling capability that is supported by DOE at LLNL and other institutions to inform national and international energy policies. The California state government, through the California Energy Commission (CEC), institutionalized the State's climate change assessment process through its biennial climate change reports. The bases for these reports, however, are global climate change simulations for future scenarios designed to inform international policy negotiations, and are primarily focused on the global to continental scale impacts of increasing emissions of greenhouse gases. These simulations do not meet the needs of California public and private officials who will make major decisions in the next decade that require an understanding of climate change in California for the next thirty to fifty years and its effects on energy use, water utilization, air quality, agriculture and natural ecosystems. With the additional development of regional dynamical climate modeling capability, LLNL will be able to design and execute global simulations specifically for scenarios important to the state, then use those results to drive regional simulations of the impacts of the simulated climate change for regions as small as individual cities or watersheds. Through this project, we systematically studied the strengths and weaknesses of downscaling global model results with a regional mesoscale model to guide others, particularly university researchers, who are using the technique based on models with less complete parameterizations or coarser spatial resolution. Further, LLNL has now built a capability in state-of-the-science mesoscale climate modeling that complements that which it has in global climate simulation, providing potential sponsors with an end-to-end simulation and analysis program.

Bader, D C; Chin, H; Caldwell, P M

2009-05-19T23:59:59.000Z

497

Southwest Regional Partnership on Carbon Sequestration  

SciTech Connect (OSTI)

The Southwest Partnership on Carbon Sequestration completed its Phase I program in December 2005. The main objective of the Southwest Partnership Phase I project was to evaluate and demonstrate the means for achieving an 18% reduction in carbon intensity by 2012. Many other goals were accomplished on the way to this objective, including (1) analysis of CO{sub 2} storage options in the region, including characterization of storage capacities and transportation options, (2) analysis and summary of CO{sub 2} sources, (3) analysis and summary of CO{sub 2} separation and capture technologies employed in the region, (4) evaluation and ranking of the most appropriate sequestration technologies for capture and storage of CO{sub 2} in the Southwest Region, (5) dissemination of existing regulatory/permitting requirements, and (6) assessing and initiating public knowledge and acceptance of possible sequestration approaches. Results of the Southwest Partnership's Phase I evaluation suggested that the most convenient and practical ''first opportunities'' for sequestration would lie along existing CO{sub 2} pipelines in the region. Action plans for six Phase II validation tests in the region were developed, with a portfolio that includes four geologic pilot tests distributed among Utah, New Mexico, and Texas. The Partnership will also conduct a regional terrestrial sequestration pilot program focusing on improved terrestrial MMV methods and reporting approaches specific for the Southwest region. The sixth and final validation test consists of a local-scale terrestrial pilot involving restoration of riparian lands for sequestration purposes. The validation test will use desalinated waters produced from one of the geologic pilot tests. The Southwest Regional Partnership comprises a large, diverse group of expert organizations and individuals specializing in carbon sequestration science and engineering, as well as public policy and outreach. These partners include 21 state government agencies and universities, five major electric utility companies, seven oil, gas and coal companies, three federal agencies, the Navajo Nation, several NGOs, and the Western Governors Association. This group is continuing its work in the Phase II Validation Program, slated to conclude in 2009.

Brian McPherson

2006-03-31T23:59:59.000Z

498

SPEER: Building a Regional Energy Efficiency Partnership  

E-Print Network [OSTI]

SPEER: Building a Regional Energy Efficiency Partnership Clean Air Through Energy Efficiency Conference – San Antonio, TX Doug Lewin December 18, 2013 ESL-KT-13-12-52 CATEE 2013: Clean Air Through Energy Efficiency Conference, San Antonio, Texas... Dec. 16-18 SPEER • Member-based, non-profit organization • The Newest Regional Energy Efficiency Organization (REEO) • Founded in 2011 • 38 members from wide cross section of E.E. industries ESL-KT-13-12-52 CATEE 2013: Clean Air Through Energy...

Lewin, D.

2013-01-01T23:59:59.000Z

499

Silicon on insulator with active buried regions  

DOE Patents [OSTI]

A method for forming patterned buried components, such as collectors, sources and drains, in silicon-on-insulator (SOI) devices. The method is carried out by epitaxially growing a suitable sequence of single or multiple etch stop layers ending with a thin silicon layer on a silicon substrate, masking the silicon such that the desired pattern is exposed, introducing dopant and activating in the thin silicon layer to form doped regions. Then, bonding the silicon layer to an insulator substrate, and removing the silicon substrate. The method additionally involves forming electrical contact regions in the thin silicon layer for the buried collectors.

McCarthy, Anthony M. (Menlo Park, CA)

1998-06-02T23:59:59.000Z

500

Silicon on insulator with active buried regions  

DOE Patents [OSTI]

A method is disclosed for forming patterned buried components, such as collectors, sources and drains, in silicon-on-insulator (SOI) devices. The method is carried out by epitaxially growing a suitable sequence of single or multiple etch stop layers ending with a thin silicon layer on a silicon substrate, masking the silicon such that the desired pattern is exposed, introducing dopant and activating in the thin silicon layer to form doped regions. Then, bonding the silicon layer to an insulator substrate, and removing the silicon substrate. The method additionally involves forming electrical contact regions in the thin silicon layer for the buried collectors. 10 figs.

McCarthy, A.M.

1996-01-30T23:59:59.000Z