Sample records for key terminology continued

  1. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  2. Security bound of continuous-variable quantum key distribution with noisy coherent states and channel

    E-Print Network [OSTI]

    Yong Shen; Jian Yang; Hong Guo

    2009-06-29T23:59:59.000Z

    Security of a continuous-variable quantum key distribution protocol based on noisy coherent states and channel is analyzed. Assuming the noise of coherent states is induced by Fred, a neutral party relative to others, we prove that the prepare and measurement scheme and entanglement-based scheme are equivalent. Then, we show that this protocol is secure against Gaussian collective attacks even if the channel is lossy and noisy, and further, a lower bound to the secure key rate is derived.

  3. A 24 km fiber-based discretely signaled continuous variable quantum key distribution system

    E-Print Network [OSTI]

    Quyen Dinh Xuan; Zheshen Zhang; Paul L. Voss

    2009-10-06T23:59:59.000Z

    We report a continuous variable key distribution system that achieves a final secure key rate of 3.45 kb/sec over a distance of 24.2 km of optical fiber. The protocol uses discrete signaling and post-selection to improve reconciliation speed and quantifies security by means of quantum state tomography. Polarization multiplexing and a frequency translation scheme permit transmission of a continuous wave local oscillator and suppression of noise from guided acoustic wave Brillouin scattering by more than 27 dB.

  4. Quantum key distribution over 25 km with an all-fiber continuous-variable system

    E-Print Network [OSTI]

    Jerome Lodewyck; Matthieu Bloch; Raul Garcia-Patron; Simon Fossier; Evgueni Karpov; Eleni Diamanti; Thierry Debuisschert; Nicolas J. Cerf; Rosa Tualle-Brouri; Steven W. McLaughlin; Philippe Grangier

    2007-09-04T23:59:59.000Z

    We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient LDPC error correcting codes.

  5. Quantum key distribution over 25 km with an all-fiber continuous-variable system

    SciTech Connect (OSTI)

    Lodewyck, Jerome; Fossier, Simon [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France); Laboratoire Charles Fabry de l'Institut d'Optique-CNRS-Universite Paris-Sud, Campus Polytechnique, RD 128, 91127 Palaiseau Cedex (France); Bloch, Matthieu; McLaughlin, Steven W. [GeorgiaTech-CNRS UMI 2958, 2-3 rue Marconi, 57070 Metz (France); Garcia-Patron, Raul; Karpov, Evgueni; Cerf, Nicolas J. [Centre for Quantum Information and Communication, Ecole Polytechnique, CP 165/59, Universite libre de Bruxelles, 50 av. F. D. Roosevelt, B-1050 Brussels (Belgium); Diamanti, Eleni; Tualle-Brouri, Rosa; Grangier, Philippe [Laboratoire Charles Fabry de l'Institut d'Optique-CNRS-Universite Paris-Sud, Campus Polytechnique, RD 128, 91127 Palaiseau Cedex (France); Debuisschert, Thierry [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France)

    2007-10-15T23:59:59.000Z

    We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient low-density parity check error correcting codes.

  6. STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14

    E-Print Network [OSTI]

    Dixon, Peter

    STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

  7. STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13

    E-Print Network [OSTI]

    Oakley, Jeremy

    STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

  8. Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol

    E-Print Network [OSTI]

    Xiang-Chun Ma; Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

    2014-03-04T23:59:59.000Z

    We present the wavelength attack on a practical continuous-variable quantum-key-distribution system with a heterodyne protocol, in which the transmittance of beam splitters at Bob's station is wavelength-dependent. Our strategy is proposed independent of but analogous to that of Huang et al. [arXiv: 1206.6550v1 [quant-ph

  9. Finite-size analysis of a continuous-variable quantum key distribution

    SciTech Connect (OSTI)

    Leverrier, Anthony [Institut Telecom / Telecom ParisTech, CNRS LTCI, 46 rue Barrault, 75634 Paris Cedex 13, France and ICFO-Institut de Ciences Fotoniques, E-08860 Castelldefels (Barcelona) (Spain); Grosshans, Frederic [Laboratoire de Photonique Quantique et Moleculaire, ENS de Cachan, UMR CNRS 8735, F-94235 Cachan Cedex (France); Grangier, Philippe [Laboratoire Charles Fabry, Institut d'Optique, CNRS, Universite Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex (France)

    2010-06-15T23:59:59.000Z

    The goal of this paper is to extend the framework of finite-size analysis recently developed for quantum key distribution to continuous-variable protocols. We do not solve this problem completely here, and we mainly consider the finite-size effects on the parameter estimation procedure. Despite the fact that some questions are left open, we are able to give an estimation of the secret key rate for protocols which do not contain a postselection procedure. As expected, these results are significantly more pessimistic than those obtained in the asymptotic regime. However, we show that recent continuous-variable protocols are able to provide fully secure secret keys in the finite-size scenario, over distances larger than 50 km.

  10. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-06-09T23:59:59.000Z

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  11. Dense-coding quantum key distribution based on continuous-variable entanglement

    SciTech Connect (OSTI)

    Su Xiaolong; Jing Jietai; Pan Qing; Xie Changde [State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan, 030006 (China)

    2006-12-15T23:59:59.000Z

    We proposed a scheme of continuous-variable quantum key distribution, in which the bright Einstein-Podolsky-Rosen entangled optical beams are utilized. The source of the entangled beams is placed inside the receiving station, where half of the entangled beams are transmitted with round trip and the other half are retained by the receiver. The amplitude and phase signals modulated on the signal beam by the sender are simultaneously extracted by the authorized receiver with the scheme of the dense-coding correlation measurement for continuous quantum variables, thus the channel capacity is significantly improved. Two kinds of possible eavesdropping are discussed. The mutual information and the secret key rates are calculated and compared with those of unidirectional transmission schemes.

  12. Long-distance continuous-variable quantum key distribution with a Gaussian modulation

    SciTech Connect (OSTI)

    Jouguet, Paul [Institut Telecom / Telecom ParisTech, CNRS LTCI, 46, rue Barrault, F-75634 Paris Cedex 13 (France); SeQureNet, 23 avenue d'Italie, F-75013 Paris (France); Kunz-Jacques, Sebastien [SeQureNet, 23 avenue d'Italie, F-75013 Paris (France); Leverrier, Anthony [ICFO-Institut de Ciencies Fotoniques, E-08860 Castelldefels (Barcelona) (Spain)

    2011-12-15T23:59:59.000Z

    We designed high-efficiency error correcting codes allowing us to extract an errorless secret key in a continuous-variable quantum key distribution (CVQKD) protocol using a Gaussian modulation of coherent states and a homodyne detection. These codes are available for a wide range of signal-to-noise ratios on an additive white Gaussian noise channel with a binary modulation and can be combined with a multidimensional reconciliation method proven secure against arbitrary collective attacks. This improved reconciliation procedure considerably extends the secure range of a CVQKD with a Gaussian modulation, giving a secret key rate of about 10{sup -3} bit per pulse at a distance of 120 km for reasonable physical parameters.

  13. Experimental study on discretely modulated continuous-variable quantum key distribution

    SciTech Connect (OSTI)

    Shen Yong; Zou Hongxin; Chen Pingxing; Yuan Jianmin [Department of Physics, National University of Defense Technology, Changsha 410073 (China); Tian Liang [Department of Physics, National University of Defense Technology, Changsha 410073 (China); College of Optoelectronic Science and Engineering, National University of Defense Technology, Changsha 410073 (China)

    2010-08-15T23:59:59.000Z

    We present a discretely modulated continuous-variable quantum key distribution system in free space by using strong coherent states. The amplitude noise in the laser source is suppressed to the shot-noise limit by using a mode cleaner combined with a frequency shift technique. Also, it is proven that the phase noise in the source has no impact on the final secret key rate. In order to increase the encoding rate, we use broadband homodyne detectors and the no-switching protocol. In a realistic model, we establish a secret key rate of 46.8 kbits/s against collective attacks at an encoding rate of 10 MHz for a 90% channel loss when the modulation variance is optimal.

  14. LIGHTING 101 1. Common terminology

    E-Print Network [OSTI]

    California at Davis, University of

    SECTION 3 LIGHTING 101 1. Common terminology 2. Sources & luminaires 3. Controls #12;SECTION 3SECTION 3 DISCUSSION: COMMON LIGHTING TERMINOLOGY 1. What are the definitions of the following lighting terms? 2. Do you use these terms in professional practice? 3. What other lighting terminology do you use

  15. LIGHTING 101 1. Common terminology

    E-Print Network [OSTI]

    California at Davis, University of

    LIGHTING 101 1. Common terminology 2. Sources and luminaires 3. Controls #12;SECTION 2 DISCUSSION: COMMON LIGHTING TERMINOLOGY 1. What are the definitions of the following lighting terms? 2. Do you use these terms in professional practice? 3. What other lighting terminology do you use on the job? SLIDE 14

  16. Controlling excess noise in fiber optics continuous variables quantum key distribution

    E-Print Network [OSTI]

    Jérôme Lodewyck; Thierry Debuisschert; Rosa Tualle-Brouri; Philippe Grangier

    2005-12-01T23:59:59.000Z

    We describe a continuous variables coherent states quantum key distribution system working at 1550 nm, and entirely made of standard fiber optics and telecom components, such as integrated-optics modulators, couplers and fast InGaAs photodiodes. The setup is composed of an emitter randomly modulating a coherent state in the complex plane with a doubly Gaussian distribution, and a receiver based on a shot noise limited time-resolved homodyne detector. By using a reverse reconciliation protocol, the device can transfer a raw key rate up to 1 Mb/s, with a proven security against Gaussian or non-Gaussian attacks. The dependence of the secret information rate of the present fiber set-up is studied as a function of the line transmission and excess noise.

  17. Controlling excess noise in fiber-optics continuous-variable quantum key distribution

    SciTech Connect (OSTI)

    Lodewyck, Jerome [Thales Research and Technologies, RD 128 91767 Palaiseau CEDEX (France); Laboratoire Charles Fabry de l'Institut d'Optique, Campus Universitaire, Batiment 503 91403 Orsay CEDEX (France); Debuisschert, Thierry [Thales Research and Technologies, RD 128 91767 Palaiseau CEDEX (France); Tualle-Brouri, Rosa; Grangier, Philippe [Laboratoire Charles Fabry de l'Institut d'Optique, Campus Universitaire, Batiment 503 91403 Orsay CEDEX (France)

    2005-11-15T23:59:59.000Z

    We describe a continuous-variable coherent-states quantum-key distribution system working at 1550 nm, and entirely made of standard fiber optics and telecommunications components, such as integrated-optics modulators, couplers and fast InGaAs photodiodes. The setup is composed of an emitter randomly modulating a coherent state in the complex plane with a doubly Gaussian distribution, and a receiver based on a shot-noise limited time-resolved homodyne detector. By using a reverse reconciliation protocol, the device can transfer a raw key rate up to 1 Mbit/s, with a proven security against Gaussian or non-Gaussian attacks. The dependence of the secret information rate of the present fiber setup is studied as a function of the line transmission and excess noise.

  18. Distribution Statistics and Random Matrix Formalism of Multicarrier Continuous-Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Laszlo Gyongyosi

    2014-10-30T23:59:59.000Z

    We propose a combined mathematical framework of order statistics and random matrix theory for multicarrier continuous-variable (CV) quantum key distribution (QKD). In a multicarrier CVQKD scheme, the information is granulated into Gaussian subcarrier CVs, and the physical Gaussian link is divided into Gaussian sub-channels. The sub-channels are dedicated to the conveying of the subcarrier CVs. The distribution statistics analysis covers the study of the distribution of the sub-channel transmittance coefficients in the presence of a Gaussian noise and the utilization of the moment generation function (MGF) in the error analysis. We reveal the mathematical formalism of sub-channel selection and formulation of the transmittance coefficients, and show a reduced complexity progressive sub-channel scanning method. We define a random matrix formalism for multicarrier CVQKD to evaluate the statistical properties of the information flowing process. Using random matrix theory, we express the achievable secret key rates and study the efficiency of the AMQD-MQA (adaptive multicarrier quadrature division-multiuser quadrature allocation) multiple-access multicarrier CVQKD. The proposed combined framework is particularly convenient for the characterization of the physical processes of experimental multicarrier CVQKD.

  19. Generating the local oscillator "locally" in continuous-variable quantum key distribution based on coherent detection

    E-Print Network [OSTI]

    Bing Qi; Pavel Lougovski; Raphael Pooser; Warren Grice; Miljko Bobrek

    2015-03-02T23:59:59.000Z

    Continuous-variable quantum key distribution (CV-QKD) protocols based on coherent detection have been studied extensively in both theory and experiment. In all the existing implementations of CV-QKD, both the quantum signal and the local oscillator (LO) are generated from the same laser and propagate through the insecure quantum channel. This arrangement may open security loopholes and also limit the potential applications of CV-QKD. In this paper, we propose and demonstrate a pilot-aided feedforward data recovery scheme which enables reliable coherent detection using a "locally" generated LO. Using two independent commercial laser sources and a spool of 25 km optical fiber, we construct a coherent communication system. The variance of the phase noise introduced by the proposed scheme is measured to be 0.04 (rad^2), which is small enough to enable secure key distribution. This technology also opens the door for other quantum communication protocols, such as the recently proposed measurement-device-independent (MDI) CV-QKD where independent light sources are employed by different users.

  20. Project Development and Finance Course Curriculum Terminology...

    Broader source: Energy.gov (indexed) [DOE]

    document provides definitions for terminology and acronyms used in the DOE Office of Indian Energy Education Program professional courses. DOE-IECourseTerminologyGuide.pdf More...

  1. Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise

    SciTech Connect (OSTI)

    Symul, Thomas; Alton, Daniel J.; Lance, Andrew M.; Lam, Ping Koy [Quantum Optics Group, Department of Physics, Faculty of Science, Australian National University, ACT 0200 (Australia); Assad, Syed M. [Quantum Optics Group, Department of Physics, Faculty of Science, Australian National University, ACT 0200 (Australia); Department of Physics, National University of Singapore (Singapore); Weedbrook, Christian [Quantum Optics Group, Department of Physics, Faculty of Science, Australian National University, ACT 0200 (Australia); Department of Physics, University of Queensland, St Lucia, Queensland 4072 (Australia); Ralph, Timothy C. [Department of Physics, University of Queensland, St Lucia, Queensland 4072 (Australia)

    2007-09-15T23:59:59.000Z

    In realistic continuous-variable quantum key distribution protocols, an eavesdropper may exploit the additional Gaussian noise generated during transmission to mask her presence. We present a theoretical framework for a post-selection-based protocol which explicitly takes into account excess Gaussian noise. We derive a quantitative expression of the secret key rates based on the Levitin and Holevo bounds. We experimentally demonstrate that the post-selection-based scheme is still secure against both individual and collective Gaussian attacks in the presence of this excess noise.

  2. Entanglement-based continuous-variable quantum key distribution with multimode states and detectors

    E-Print Network [OSTI]

    Vladyslav C. Usenko; Laszlo Ruppert; Radim Filip

    2014-12-18T23:59:59.000Z

    Secure quantum key distribution with multimode Gaussian entangled states and multimode homodyne detectors is proposed. In general the multimode character of both the sources of entanglement and the homodyne detectors can cause a security break even for a perfect channel when trusted parties are unaware of the detection structure. Taking into account the multimode structure and potential leakage of information from a homodyne detector reduces the loss of security to some extent. We suggest the symmetrization of the multimode sources of entanglement as an efficient method allowing us to fully recover the security irrespectively to multimode structure of the homodyne detectors. Further, we demonstrate that by increasing the number of the fluctuating but similar source modes the multimode protocol stabilizes the security of the quantum key distribution. The result opens the pathway towards quantum key distribution with multimode sources and detectors.

  3. Plants are necessary for the continuation of life on Earth: they form a key link in the food chain, supply energy, and enrich the air with

    E-Print Network [OSTI]

    Maoz, Shahar

    23 Plants Plants are necessary for the continuation of life on Earth: they form a key link helps protect the planet's plant life from potentially detrimental changes in the environ- ment. Another line of plant research at the Institute is aimed at making farming more environmentally safe. Farming

  4. Electric Market and Utility Operation Terminology (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2011-05-01T23:59:59.000Z

    This fact sheet is a list of electric market and utility operation terminology for a series of three electricity fact sheets.

  5. 1 Introduction 1 1.1 Music Terminology . . . . . . . . . . . . . . . . . . . . . . . 3

    E-Print Network [OSTI]

    Lemström, Kjell

    Contents 1 Introduction 1 1.1 Music Terminology . . . . . . . . . . . . . . . . . . . . . . . 3 1.2 Music Information Retrieval . . . . . . . . . . . . . . . . . . 4 1.3 Music Encodings . . . . . . . . . . . . . . . . . . . . . . . . 7 1.3.1 MIDI . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.3.2 Inner Representation

  6. Electric Market and Utility Operation Terminology (Fact Sheet), Solar Energy Technologies Program (SETP)

    Broader source: Energy.gov [DOE]

    This fact sheet is a list of electric market and utility operation terminology for a series of three electricity fact sheets.

  7. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  8. 1Revised 9/30/11 Time Recording and Terminology in PeopleSoft

    E-Print Network [OSTI]

    Wu, Shin-Tson

    . Terminology Employee ID Number ­ A unique seven-digit number assigned to each employee by People. Group ID ­ The Group ID is the first four digits of the current Home Department number, (in some instances may be followed by an alpha character). The Group ID is located at the top of the timesheets

  9. Characteristics of the Technical Terminology in Vodnik’s German-Slovene Dictionary (1804–1806)

    E-Print Network [OSTI]

    Ravnikar, Andreja Legan

    2011-01-01T23:59:59.000Z

    such as F. Wiesthaler, I. Prijatelj, F. Vidic, I. Grafenauer, F. Kidri?, A. Gspan, than from the linguists, e.g., I. Modic, F. Levstik (SBL 1986: 527–528). 2 Christian terminology had been developing since Christianisation (cf. Legan Ravnikar 2008: 15...

  10. Continual Learning

    Broader source: Energy.gov [DOE]

    Continual Learning is a change initiative which is used to help develop and grow a learning culture within DOE.

  11. Electric-utility DSM programs: Terminology and reporting formats

    SciTech Connect (OSTI)

    Hirst, E. [Oak Ridge National Lab., TN (United States); Sabo, C. [Barakat and Chamberlin, Inc., Washington, DC (United States)

    1991-10-01T23:59:59.000Z

    The number, scope, effects, and costs of electric-utility demand-site management programs are growing rapidly in the United States. Utilities, their regulators, and energy policy makers need reliable information on the costs of, participation in, and energy and load effects of these programs to make informed decisions. In particular, information is needed on the ability of these programs to cost-effectively provide energy and capacity resources that are alternatives to power plants. This handbook addresses the need for additional and better information in two ways. First, it discusses the key concepts associated with DSM-program types, participation, energy and load effects, and costs. Second, the handbook offers definitions and a sample reporting form for utility DSM programs. The primary purpose in developing these definitions and this form is to encourage consistency in the collection and reporting of data on DSM programs. To ensure that the discussions, reporting formats, and definitions will be useful and used, development of this handbook was managed by a committee, with membership from electric utilities, state regulatory commissions, and the US Department of Energy. Also, this data-collection form was pretested by seven people from six utilities, who completed the form for nine DSM programs.

  12. CLOSED MEANS CONTINUOUS IFF POLYHEDRAL: A CONVERSE ...

    E-Print Network [OSTI]

    2011-12-07T23:59:59.000Z

    2000 Mathematics Subject Classification. Primary 52A20; Secondary 52A41, 52B99. Key words and phrases. continuity of convex functions, closed convex ...

  13. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  14. Cancer Therapy Evaluation Program, Common Terminology Criteria for Adverse Events, Version 3.0, DCTD, NCI, NIH, DHHS March 31, 2003 (http://ctep.cancer.gov), Publish Date: December 12, 2003

    E-Print Network [OSTI]

    Oliver, Douglas L.

    Cancer Therapy Evaluation Program, Common Terminology Criteria for Adverse Events, Version 3.0 Terminology Criteria for Adverse Events v3.0 (CTCAE) Publish Date: December 12, 2003 Quick Reference The NCI Common Terminology Criteria for Adverse Events v3.0 is a descriptive terminology which can be utilized

  15. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  16. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  17. Continuity Programs

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-05-08T23:59:59.000Z

    The order provides requirements and responsibilities to ensure that the Department is ready to respond promptly, efficiently, and effectively to a continuity event involving facilities, activities, or operations. No cancellation. Canceled by DOE O 150.1A.

  18. Continuity Programs

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-03-31T23:59:59.000Z

    The order provides requirements and responsibilities to ensure that the Department is ready to respond promptly, efficiently, and effectively to a continuity event involving facilities, activities, or operations. Cancels DOE O 150.1.

  19. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  20. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  1. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  2. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  3. continuity program

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby Dietrich5 |0/%2A en6/%2A en Continuity

  4. CONTINUATION, O DOCUMENT BEING CONTINUED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWPSuccess StoriesFebruary 26, 2014,Lab SeptemberCONTINUATION

  5. Production of an English/Russian glossary of terminology for nuclear materials control and accounting

    SciTech Connect (OSTI)

    Schachowskoj, S.; Smith, H.A. Jr.

    1995-05-01T23:59:59.000Z

    The program plans for Former Soviet Union National Nuclear Materials Control and Accounting (MC and A) Systems Enhancements call for the development of an English/Russian Glossary of MC and A terminology. This glossary was envisioned as an outgrowth of the many interactions, training sessions, and other talking and writing exercises that would transpire in the course of carrying out these programs. This report summarizes the status of the production of this glossary, the most recent copy of which is attached to this report. The glossary contains over 950 terms and acronyms associated with nuclear material control and accounting for safeguards and nonproliferation. This document is organized as follows: English/Russian glossary of terms and acronyms; Russian/English glossary of terms and acronyms; English/Russian glossary of acronyms; and Russian/English glossary of acronyms.

  6. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  7. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  8. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  9. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  10. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  11. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  12. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  13. IN VITRO GAS PRODUCTION OF CALIFORNIA FEEDSTUFFS Nov-03 (terminology explained at the bottom) (new samples in italics )

    E-Print Network [OSTI]

    Delany, Mary E.

    IN VITRO GAS PRODUCTION OF CALIFORNIA FEEDSTUFFS Nov-03 (terminology explained at the bottom) (new.6 226.0 114.4 11.34 Mean 109.3 199.4 90.2 215.6 106.3 11.90 Alfalfa Pellets 87.0 189.6 102.5 217.9 130.41 Cottonseed (fuzzy pellet) 37.9 54.6 16.7 85.0 47.1 8.53 Cottonseed (pima) 23.5 54.4 30.9 65.8 42.3 7.42 #12

  14. Design and Implementation of a Real-time Spray Cooling Control System for Continuous Casting of Thin Steel Slabs

    E-Print Network [OSTI]

    Thomas, Brian G.

    @uiuc.edu Key words: Continuous casting, Secondary spray cooling, Real-time control, Heat Transfer Model

  15. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  16. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  17. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  18. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  19. Continuity of Operations

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-01-14T23:59:59.000Z

    The notice defines requirements and responsibilities for continuity of operations planning within the DOE to ensure the capability to continue essential Departmental functions across a wide range of all hazard emergencies. Does not cancel other directives.

  20. What's in a name? Noncovalent ArCl?(HAr9)n interactions and terminology based on structure and nature of the bonding{

    E-Print Network [OSTI]

    Glaser, Rainer

    by four ether molecules and there are four lithium cation­ether bonds. The overall interaction of Li+ What's in a name? Noncovalent Ar­Cl?(H­Ar9)n interactions and terminology based on structure Interactions are named based on the interacting moieties and on the mechanism of their interaction

  1. The development of a thin-film rollforming process for pharmaceutical continuous manufacturing

    E-Print Network [OSTI]

    Slaughter, Ryan (Ryan R.)

    2013-01-01T23:59:59.000Z

    In this thesis, a continuous rollforming process for the folding of thin-films was proposed and studied as a key step in the continuous manufacturing of pharmaceutical tablets. HPMC and PEG based polymeric thin-films were ...

  2. Continuous Commissioning Measures

    E-Print Network [OSTI]

    Yugua, C.

    2014-01-01T23:59:59.000Z

    ESL-KT-14-11-38 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Agenda 1. Introduction and Agenda 2. Definitions: Types of Commissioning 3. Introduction to Continuous Commissioning® 4. Tools and Measurements Coffee Break... 5. Continuous Commissioning Measures 6. Measurement and Verification 2 ESL-KT-14-11-38 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Continuous Commissioning® Measures Joseph T. Martinez, PCC Carlos Yagua, PE Hiroko...

  3. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  4. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  5. Continuous-variable private quantum channel

    SciTech Connect (OSTI)

    Bradler, Kamil [Instituto de Fisica, UNAM, Apdo. Postal 20-364, Mexico DF 01000 (Mexico); Department of Optics, Palacky University, 17. listopadu 50, 77200 Olomouc (Czech Republic)

    2005-10-15T23:59:59.000Z

    In this paper we introduce the concept of quantum private channel within the continuous variables framework (CVPQC) and investigate its properties. In terms of CVPQC we naturally define a 'maximally' mixed state in phase space together with its explicit construction and show that for increasing number of encryption operations (which sets the length of a shared key between Alice and Bob) the encrypted state is arbitrarily close to the maximally mixed state in the sense of the Hilbert-Schmidt distance. We bring the exact solution for the distance dependence and give also a rough estimate of the necessary number of bits of the shared secret key (i.e., how much classical resources are needed for an approximate encryption of a generally unknown continuous-variable state). The definition of the CVPQC is analyzed from the Holevo bound point of view which determines an upper bound of information about an incoming state an eavesdropper is able to get from his optimal measurement.

  6. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  7. The continuous knapsack set

    E-Print Network [OSTI]

    2014-08-29T23:59:59.000Z

    that when n = 3, the non-zero coefficients of the continuous variables can take ... Vachani [6] studied the single arc design problem as a subproblem of the net-.

  8. Continuous sulfur removal process

    DOE Patents [OSTI]

    Jalan, V.; Ryu, J.

    1994-04-26T23:59:59.000Z

    A continuous process for the removal of hydrogen sulfide from a gas stream using a membrane comprising a metal oxide deposited on a porous support is disclosed. 4 figures.

  9. Nuclear testing continues

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    week we noted that many of the Special Engineer Detachment stayed at the sites when the war was over and continued working, however, most of them who had been drafted out of...

  10. What is Continual Learning?

    Broader source: Energy.gov [DOE]

    Continual Learning is a change initiative which is used to help develop and grow a learning culture within DOE. Employee development in any organization and at any level is never ending.

  11. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

    2008-01-01T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  12. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

    2008-12-10T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  13. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  14. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  15. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  16. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  17. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  18. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  19. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  20. PROGRESS REPORT CONTINUATION REQUEST

    E-Print Network [OSTI]

    Jones, William D.

    PROGRESS REPORT and CONTINUATION REQUEST SUBMITTED TO THE U.S. DEPARTMENT OF ENERGY BY Prof (year 2): $135,000 Unexpended Balance from Previous Year: $0 #12;2 Abstract of FY 2005 Research City. Prof. Odile Eisenstein and Dr. Eric Clot at the University of Montpellier, France Overview

  1. Continuous steel production and apparatus

    DOE Patents [OSTI]

    Peaslee, Kent D. (Rolla, MO); Peter, Jorg J. (McMinnville, OR); Robertson, David G. C. (Rolla, MO); Thomas, Brian G. (Champaign, IL); Zhang, Lifeng (Trondheim, NO)

    2009-11-17T23:59:59.000Z

    A process for continuous refining of steel via multiple distinct reaction vessels for melting, oxidation, reduction, and refining for delivery of steel continuously to, for example, a tundish of a continuous caster system, and associated apparatus.

  2. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  3. Continuous Fiber Ceramic Composites

    SciTech Connect (OSTI)

    None

    2002-09-01T23:59:59.000Z

    Fiber-reinforced ceramic composites demonstrate the high-temperature stability of ceramics--with an increased fracture toughness resulting from the fiber reinforcement of the composite. The material optimization performed under the continuous fiber ceramic composites (CFCC) included a series of systematic optimizations. The overall goals were to define the processing window, to increase the robustinous of the process, to increase process yield while reducing costs, and to define the complexity of parts that could be fabricated.

  4. Continuous variable entanglement on a chip

    E-Print Network [OSTI]

    Genta Masada; Kazunori Miyata; Alberto Politi; Toshikazu Hashimoto; Jeremy L. O'Brien; Akira Furusawa

    2015-05-29T23:59:59.000Z

    Encoding quantum information in continuous variables (CV)---as the quadrature of electromagnetic fields---is a powerful approach to quantum information science and technology. CV entanglement---light beams in Einstein-Podolsky-Rosen (EPR) states---is a key resource for quantum information protocols; and enables hybridisation between CV and single photon discrete variable (DV) qubit systems. However, CV systems are currently limited by their implementation in free-space optical networks: increased complexity, low loss, high-precision alignment and stability, as well as hybridisation, demand an alternative approach. Here we show an integrated photonic implementation of the key capabilities for CV quantum technologies---generation and characterisation of EPR beams in a photonic chip. Combined with integrated squeezing and non-Gaussian operation, these results open the way to universal quantum information processing with light.

  5. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  6. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  7. Liming Terminology and Analysis

    E-Print Network [OSTI]

    Balser, Teri C.

    Neutralizing power per weight of material relative to pure CaCO3 CaCO3 + 2H+ Ca2+ + CO2 + H2O Ca(OH)2 + 2H+ Ca2 Recommendation in IA 6 inch incorporation depth Buffer pH Target pH 6.5 Target pH 6.9 ----- CaCO3 to apply (lb

  8. Basic Ideas and Terminology

    E-Print Network [OSTI]

    PRETEX (Halifax NS) #1 1054 1999 Mar 05 10:59:16

    2010-01-20T23:59:59.000Z

    Feb 16, 2007 ... If we look back at the examples from the previous section, we see that problems formu- lated using Newton's second law of motion will always ...

  9. NERSC Account Terminology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1 SECTIONES2008-54174MoreMuseum|NEESReadingAccounts »

  10. Development of ASTM standards in support of advanced ceramics -- continuing efforts

    SciTech Connect (OSTI)

    Brinkman, C.R.

    1998-02-01T23:59:59.000Z

    An update is presented of the activities of the American Society for Testing and Materials (ASTM) Committee C-28 on Advanced Ceramics. Since its inception in 1986, this committee, which has five standard producing subcommittees, has written and published over 32 consensus standards. These standards are concerned with mechanical testing of monolithic and composite ceramics, nondestructive examination, statistical analysis and design, powder characterization, quantitative microscopy, fractography, and terminology. These standards ensure optimum material behavior with physical and mechanical property reproducibility, component reliability, and well-defined methods of data treatment and material analysis for both monolithic and composite materials. Committee C-28 continues to sponsor technical symposia and to cooperate in the development of international standards. An update of recent and current activities as well as possible new areas of standardization work will be presented.

  11. Personal continuous air monitor

    DOE Patents [OSTI]

    Morgan, Ronald G. (Los Alamos, NM); Salazar, Samuel A. (Albuquerque, NM)

    2000-01-01T23:59:59.000Z

    A personal continuous air monitor capable of giving immediate warning of the presence of radioactivity has a filter/detector head to be worn in the breathing zone of a user, containing a filter mounted adjacent to radiation detectors, and a preamplifier. The filter/detector head is connected to a belt pack to be worn at the waist or on the back of a user. The belt pack contains a signal processor, batteries, a multichannel analyzer, a logic circuit, and an alarm. An air pump also is provided in the belt pack for pulling air through the filter/detector head by way of an air tube.

  12. Continuous pressure letdown system

    DOE Patents [OSTI]

    Sprouse, Kenneth M.; Matthews, David R.; Langowski, Terry

    2010-06-08T23:59:59.000Z

    A continuous pressure letdown system connected to a hopper decreases a pressure of a 2-phase (gas and solid) dusty gas stream flowing through the system. The system includes a discharge line for receiving the dusty gas from the hopper, a valve, a cascade nozzle assembly positioned downstream of the discharge line, a purge ring, an inert gas supply connected to the purge ring, an inert gas throttle, and a filter. The valve connects the hopper to the discharge line and controls introduction of the dusty gas stream into the discharge line. The purge ring is connected between the discharge line and the cascade nozzle assembly. The inert gas throttle controls a flow rate of an inert gas into the cascade nozzle assembly. The filter is connected downstream of the cascade nozzle assembly.

  13. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  14. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  15. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  16. Continuous production of conducting polymer

    E-Print Network [OSTI]

    Gaige, Terry A. (Terry Alden), 1981-

    2004-01-01T23:59:59.000Z

    A device to continuously produce polypyrrole was designed, manufactured, and tested. Polypyrrole is a conducting polymer which has potential artificial muscle applications. The objective of continuous production was to ...

  17. ANNUAL REPORT 2012 CONTINUING EDUCATION

    E-Print Network [OSTI]

    -13 tuition rates IMAGINING POSSIBILITIES CONNECTING COMMUNITIES2012 SAw TwO BIG UPdATES fOr CONTINUING EdUCATIONANNUAL REPORT 2012 CONTINUING EDUCATION AT THE UNIVERSITY OF UTAH #12;As one of the top knowledge the U) becomes. For well over 100 years, Continuing Education at the University of Utah has been opening

  18. Continuous Commissioning of the Reynolds Army Community Hospital, Fort Sill, Oklahoma

    E-Print Network [OSTI]

    Turner, W. D.; Baltazar-Cervantes, J. C.; Martinez, J. T.

    2007-01-01T23:59:59.000Z

    Continuous Commissioning® (CC®) of the Reynolds Army Community Hospital facility was a two phase project. The first phase consisted of a point-to-point verification of a newly upgraded Energy Management Control System (EMCS) and calibration of key...

  19. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  20. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  1. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  2. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  3. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  4. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  5. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  6. Electrical Engineer- OPEN CONTINUOUS ANNOUNCEMENT

    Broader source: Energy.gov [DOE]

    This recruitment is an OPEN CONTINUOUS ANNOUNCEMENT (OCA) being utilized to fill current and future Electrical Engineer vacancies within BPA's Transmission Field Services organization. Positions...

  7. Electronics Engineer- OPEN CONTINUOUS ANNOUNCEMENT

    Broader source: Energy.gov [DOE]

    This recruitment is an OPEN CONTINUOUS ANNOUNCEMENT (OCA) being utilized to fill current and future Electrical Engineer vacancies within BPA's Transmission Field Services organization. Positions...

  8. Continuous Profiling of Magnetotelluric Fields

    E-Print Network [OSTI]

    Verdin, C.T.

    2009-01-01T23:59:59.000Z

    those employed in seismic data interpretation under the nameseismic nature, these techniques power implicit in the at least two decades of continued field and interpretation

  9. Microscale controlled continuous cell culture

    E-Print Network [OSTI]

    Lee, Kevin Shao-Kwan

    2011-01-01T23:59:59.000Z

    Measurements of metabolic and cellular activity through substrate and product interactions are highly dependent on environmental conditions and cellular metabolic state. For such experiments to be feasible, continuous ...

  10. Continuous Forcing Data, Darwin, Australia

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Jakob, Christian

    Long term, large scale continuous forcing data set for three complete wet seasons (2004-2005, 2005-2006 and 2006-2007) in Darwin, Australia.

  11. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  12. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  13. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  14. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  15. Business Continuity Planning Resources for Small- and Medium-Sized Businesses

    SciTech Connect (OSTI)

    Judd, Kathleen S.; Lesperance, Ann M.

    2010-05-14T23:59:59.000Z

    This document/memo summarizes existing resources and guidance on business continuity planning for small- to medium-sized businesses. DTRA will share this information with large commercial businesses who identified the need to help their suppliers and other key collaborators prepare business continuity plans in order to speed recovery from a wide-area bioterrorism incident.

  16. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  17. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  18. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  19. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  20. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  1. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  2. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  3. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  4. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  5. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23T23:59:59.000Z

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  6. Anyonic statistics with continuous variables

    E-Print Network [OSTI]

    Jing Zhang; Changde Xie; Kunchi Peng; Peter van Loock

    2008-10-30T23:59:59.000Z

    We describe a continuous-variable scheme for simulating the Kitaev lattice model and for detecting statistics of abelian anyons. The corresponding quantum optical implementation is solely based upon Gaussian resource states and Gaussian operations, hence allowing for a highly efficient creation, manipulation, and detection of anyons. This approach extends our understanding of the control and application of anyons and it leads to the possibility for experimental proof-of-principle demonstrations of anyonic statistics using continuous-variable systems.

  7. LANL continuity of operations plan

    SciTech Connect (OSTI)

    Senutovitch, Diane M [Los Alamos National Laboratory

    2010-12-22T23:59:59.000Z

    The Los Alamos National Laboratory (LANL) is a premier national security research institution, delivering scientific and engineering solutions for the nation's most crucial and complex problems. Our primary responsibility is to ensure the safety, security, and reliability of the nation's nuclear stockpile. LANL emphasizes worker safety, effective operational safeguards and security, and environmental stewardship, outstanding science remains the foundation of work at the Laboratory. In addition to supporting the Laboratory's core national security mission, our work advances bioscience, chemistry, computer science, earth and environmental sciences, materials science, and physics disciplines. To accomplish LANL's mission, we must ensure that the Laboratory EFs continue to be performed during a continuity event, including localized acts of nature, accidents, technological or attack-related emergencies, and pandemic or epidemic events. The LANL Continuity of Operations (COOP) Plan documents the overall LANL COOP Program and provides the operational framework to implement continuity policies, requirements, and responsibilities at LANL, as required by DOE 0 150.1, Continuity Programs, May 2008. LANL must maintain its ability to perform the nation's PMEFs, which are: (1) maintain the safety and security of nuclear materials in the DOE Complex at fixed sites and in transit; (2) respond to a nuclear incident, both domestically and internationally, caused by terrorist activity, natural disaster, or accident, including mobilizing the resources to support these efforts; and (3) support the nation's energy infrastructure. This plan supports Continuity of Operations for Los Alamos National Laboratory (LANL). This plan issues LANL policy as directed by the DOE 0 150.1, Continuity Programs, and provides direction for the orderly continuation of LANL EFs for 30 days of closure or 60 days for a pandemic/epidemic event. Initiation of COOP operations may be required to support an allhazards event, including a national security emergency, major fire, catastrophic natural disaster, man-made disaster, terrorism event, or technological disaster by rendering LANL buildings, infrastructure, or Technical Areas unsafe, temporarily unusable, or inaccessible.

  8. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  9. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  10. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  11. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  12. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  13. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  14. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  15. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  16. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  17. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  18. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  19. Linking Continuous Energy Management and Open Automated Demand Response

    E-Print Network [OSTI]

    Piette, Mary Ann

    2009-01-01T23:59:59.000Z

    Linking Continuous Energy Management and Open AutomatedKeywords: Continuous Energy Management, Automated Demandlinking continuous energy management and continuous

  20. Atomizing, continuous, water monitoring module

    DOE Patents [OSTI]

    Thompson, Cyril V. (Knoxville, TN); Wise, Marcus B. (Kingston, TN)

    1997-01-01T23:59:59.000Z

    A system for continuously analyzing volatile constituents of a liquid is described. The system contains a pump for continuously pumping the liquid to be tested at a predetermined flow rate into an extracting container through a liquid directing tube having an orifice at one end and positioned to direct the liquid into the extracting container at a flow rate sufficient to atomize the liquid within the extracting container. A continuous supply of helium carrier gas at a predetermined flow rate is directed through a tube into the extracting container and co-mingled with the atomized liquid to extract the volatile constituents contained within the atomized liquid. The helium containing the extracted volatile constituents flows out of the extracting container into a mass spectrometer for an analysis of the volatile constituents of the liquid.

  1. Atomizing, continuous, water monitoring module

    DOE Patents [OSTI]

    Thompson, C.V.; Wise, M.B.

    1997-07-08T23:59:59.000Z

    A system for continuously analyzing volatile constituents of a liquid is described. The system contains a pump for continuously pumping the liquid to be tested at a predetermined flow rate into an extracting container through a liquid directing tube having an orifice at one end and positioned to direct the liquid into the extracting container at a flow rate sufficient to atomize the liquid within the extracting container. A continuous supply of helium carrier gas at a predetermined flow rate is directed through a tube into the extracting container and co-mingled with the atomized liquid to extract the volatile constituents contained within the atomized liquid. The helium containing the extracted volatile constituents flows out of the extracting container into a mass spectrometer for an analysis of the volatile constituents of the liquid. 3 figs.

  2. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  3. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  4. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  5. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  6. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  7. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  8. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  9. Continuous lengths of oxide superconductors

    DOE Patents [OSTI]

    Kroeger, Donald M. (Knoxville, TN); List, III, Frederick A. (Andersonville, TN)

    2000-01-01T23:59:59.000Z

    A layered oxide superconductor prepared by depositing a superconductor precursor powder on a continuous length of a first substrate ribbon. A continuous length of a second substrate ribbon is overlaid on the first substrate ribbon. Sufficient pressure is applied to form a bound layered superconductor precursor powder between the first substrate ribbon and the second substrate ribbon. The layered superconductor precursor is then heat treated to establish the oxide superconducting phase. The layered oxide superconductor has a smooth interface between the substrate and the oxide superconductor.

  10. Continuous production of polymethylpentene membranes

    DOE Patents [OSTI]

    Epperson, Bonnie J. (San Diego, CA); Burnett, Lowell J. (San Diego, CA); Helm, Verne D. (Plains, MT)

    1983-11-15T23:59:59.000Z

    Gas separation membranes may be prepared in a continuous manner by passing a porous support which may, if so desired, be backed by a fabric through a solution of polymethylpentene dissolved in an organic solvent such as hexane. The support member is passed through the solution while one side thereof is in contact with a roller, thereby permitting only one side of the support member to be coated with the polymer. After continuously withdrawing the support member from the bath, the solvent is allowed to evaporate and the resulting membrane is recovered.

  11. continued next page... Medical Education

    E-Print Network [OSTI]

    Chaudhuri, Sanjay

    in the healthcare scene. With the explosion of medical information and advances in medical technology, medical In this digital era of information explosion and rapid advances in medical sciences and medical technologyinside continued next page... Medical Education: Enhancing Learning in the Affective (Feeling

  12. (continued on back) SPRCChildhood Obesity

    E-Print Network [OSTI]

    Ford, James

    (continued on back) SPRCChildhood Obesity: A Growing Problem Stanford's Approach 0% 2% 4% 6% 8% 10. The cause of these conditions? Obesity. An alarming number of American children--perhaps as many as 1 in 5 increases among children from lower-income and ethnic minority families. This epidemic of obesity

  13. Main Riff (continue pattern) E-|-----------------------------------------------------------|

    E-Print Network [OSTI]

    Reiners, Peter W.

    Main Riff (continue pattern) E-|-----------------------------------------------------------| B-|-----------------------------------------------------------| A-|-2--2----2--4--5----5--5--4--2--2--------------------------| E-|-----------------------------------------------------------| CHORUS (guitar chords are weak/intermittent): E A E A I can't get no satisfaction I can't get

  14. CONTROVERSIES in Continuous Glucose Monitoring

    E-Print Network [OSTI]

    Science and Technology Volume 2, Issue 3, May 2008 © Diabetes Technology Society Abstract Continuous Sci Technol 2008;2(3):490-494 CGM: An Enabling Technology In Need of a Killer App In the jargon may not sell. On the other hand, the application is useless without the sophisticated device to run it

  15. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  16. An Attentional Theory of Continuity Editing 

    E-Print Network [OSTI]

    Smith, Tim J

    The intention of most film editing is to create the impression of continuous action (“continuity”) by presenting discontinuous visual information. The techniques used to achieve this, the continuity editing rules, are ...

  17. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  18. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  19. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  20. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  1. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  2. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  3. CRAD, Feedback and Continuous Improvement - DOE Headquarters...

    Office of Environmental Management (EM)

    CRAD, Feedback and Continuous Improvement - DOE Headquarters - December 4, 2007 CRAD, Feedback and Continuous Improvement - DOE Headquarters - December 4, 2007 December 4, 2007...

  4. DOE Continues Aggressive Energy Efficiency Enforcement Effort...

    Energy Savers [EERE]

    Continues Aggressive Energy Efficiency Enforcement Effort with Nearly 30 New Proposed Penalties DOE Continues Aggressive Energy Efficiency Enforcement Effort with Nearly 30 New...

  5. Process systems engineering of continuous pharmaceutical manufacturing

    E-Print Network [OSTI]

    Abel, Matthew J

    2010-01-01T23:59:59.000Z

    Continuous manufacturing offers a number of operational and financial benefits to pharmaceutical companies. This research examines the critical blending step for continuous pharmaceutical manufacturing and the characteristics ...

  6. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  7. Continuous scanning mode for ptychography

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Clark, Jesse N.; Huang, Xiaojing; Harder, Ross J.; Robinson, Ian K.

    2014-01-01T23:59:59.000Z

    We outline how ptychographic imaging can be performed without the need for discrete scan positions. Through an idealized experiment, we demonstrate how a discrete-position scan regime can be replaced with a continuously scanned one with suitable modification of the reconstruction scheme based on coherent modes. The impact of this is that acquisition times can be reduced, significantly aiding ptychographic imaging with x rays, electrons, or visible light.

  8. CONTINUATION S EFIIERENCE NO OF DOCUMENT BEING CONTINUED AEO

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWPSuccess StoriesFebruary 26, 2014,Lab SeptemberCONTINUATION S

  9. CONTINUATION SHEET REFERENCE NO. OF DOCUMENT BEING CONTINUED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWPSuccess StoriesFebruary 26, 2014,Lab SeptemberCONTINUATION SNSN

  10. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  11. JOB DESCRIPTION Title: Continuous Improvement Specialist

    E-Print Network [OSTI]

    Heller, Barbara

    or Six Sigma-based continuous improvement methods. Certification: Six Sigma Black Belt or Green Belt

  12. Device-Independent Quantum Cryptography for Continuous Variables

    E-Print Network [OSTI]

    Kevin Marshall; Christian Weedbrook

    2014-05-27T23:59:59.000Z

    We present the first device-independent quantum cryptography protocol for continuous variables. Our scheme is based on the Gottesman-Kitaev-Preskill encoding scheme whereby a qubit is embedded in the infinite-dimensional space of a quantum harmonic oscillator. The novel application of discrete-variable device-independent quantum key distribution to this encoding enables a continuous-variable analogue. Since the security of this protocol is based on discrete-variables we inherit by default security against collective attacks and, under certain memoryless assumptions, coherent attacks. We find that our protocol is valid over the same distances as its discrete-variable counterpart, except that we are able to take advantage of high efficiency commercially available detectors where, for the most part, only homodyne detection is required. This offers the potential of removing the difficulty in closing the loopholes associated with Bell inequalities.

  13. Diesel prices continue to decrease

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management FermiDavid TurnerExperimentalDiesel prices continue to

  14. Diesel prices continue to decrease

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management FermiDavid TurnerExperimentalDiesel prices continue

  15. Diesel prices continue to decrease

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management FermiDavid TurnerExperimentalDiesel prices continueDiesel

  16. Diesel prices continue to increase

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management FermiDavidDiesel prices continue to increase The U.S.

  17. Diesel prices continue to increase

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management FermiDavidDiesel prices continue to increase The

  18. Diesel prices continue to increase

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management FermiDavidDiesel prices continue to increase TheDiesel

  19. Diesel prices continue to rise

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management FermiDavidDiesel prices continue to increaseDiesel prices

  20. A Problem in Kinship Terminology

    E-Print Network [OSTI]

    Gifford, Edward W.

    1940-01-01T23:59:59.000Z

    Hill Patwin), Coast Miwok, Lake Miwok, Northern Porno,Central Porno,Eastern Porno, Southeastern Porno. 3 Leslie Spier, The

  1. Continuous Precipitation of Ceria Nanoparticles from a Continuous Flow Micromixer

    SciTech Connect (OSTI)

    Tseng, Chih Heng; Paul, Brian; Chang, Chih-hung; Engelhard, Mark H.

    2013-01-01T23:59:59.000Z

    Cerium oxide nanoparticles were continuously precipitated from a solution of cerium(III) nitrate and ammonium hydroxide using a micro-scale T-mixer. Findings show that the method of mixing is important in the ceria precipitation process. In batch mixing and deposition, disintegration and agglomeration dominates the deposited film. In T-mixing and deposition, more uniform nanorod particles are attainable. In addition, it was found that the micromixing approach reduced the exposure of the Ce(OH)3 precipates to oxygen, yielding hydroxide precipates in place of CeO2 precipitates. Advantages of the micro-scale T-mixing approach include shorter mixing times, better control of nanoparticle shape and less agglomeration.

  2. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  3. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  4. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  5. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  6. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  7. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  8. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  9. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  10. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  11. Continuous kinematic wave models of merging traffic Wen-Long Jin

    E-Print Network [OSTI]

    Mease, Kenneth D.

    Continuous kinematic wave models of merging traffic flow Wen-Long Jin February 12, 2010 Abstract to admissible conditions such that there are no positive and negative kinematic waves on the upstream waves. Discussions and future studies are presented in the conclusion section. Key words: Kinematic wave

  12. Sharp asymptotics for the partition function of some continuous-time directed polymers

    E-Print Network [OSTI]

    Tindel, Samy - Institut de Mathématiques �lie Cartan, Université Henri Poincaré

    Sharp asymptotics for the partition function of some continuous-time directed polymers Agnese Cadel This paper is concerned with two related types of directed polymers in a random medium. The first one is a d under consideration. Key words and phrases: Polymer model, Random medium, Gaussian field, Free energy

  13. Sharp asymptotics for the partition function of some continuous-time directed polymers

    E-Print Network [OSTI]

    Viens, Frederi G.

    Sharp asymptotics for the partition function of some continuous-time directed polymers Agnese Cadel This paper is concerned with two related types of directed polymers in a random medium. The rst one is a d regime of the objects under consideration. Key words and phrases: Polymer model, Random medium, Gaussian

  14. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  15. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  16. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  17. Production expansion continues to accelerate

    SciTech Connect (OSTI)

    Not Available

    1992-08-01T23:59:59.000Z

    This paper reports that Saudi Arabian Oil Co. (Saudi Aramco) is continuing its accelerated Crude Oil Expansion Program initiated in 1989 that aims at achieving a 10 million bpd productive capacity by 1995. In addition to major engineering, construction and renovation work related to production expansion, Saudi Aramco drilling and workover operations have been markedly expanded. Since January 1991, rig activity has doubled. As an indication of aging of Saudi production, projects include modernizing current injection water treatment facilities, installing a new seawater injection plant on the Persian Gulf, installing dewatering facilities in a number of locations and installing a pilot gas lift project. In addition, equipment orders indicate the new discoveries south of Riyadh may also need the assistance of water injection from inception of production.

  18. Continuously variable focal length lens

    DOE Patents [OSTI]

    Adams, Bernhard W; Chollet, Matthieu C

    2013-12-17T23:59:59.000Z

    A material preferably in crystal form having a low atomic number such as beryllium (Z=4) provides for the focusing of x-rays in a continuously variable manner. The material is provided with plural spaced curvilinear, optically matched slots and/or recesses through which an x-ray beam is directed. The focal length of the material may be decreased or increased by increasing or decreasing, respectively, the number of slots (or recesses) through which the x-ray beam is directed, while fine tuning of the focal length is accomplished by rotation of the material so as to change the path length of the x-ray beam through the aligned cylindrical slows. X-ray analysis of a fixed point in a solid material may be performed by scanning the energy of the x-ray beam while rotating the material to maintain the beam's focal point at a fixed point in the specimen undergoing analysis.

  19. Continuous magnetic separator and process

    DOE Patents [OSTI]

    Oder, Robin R. (Export, PA); Jamison, Russell E. (Lower Burrell, PA)

    2008-04-22T23:59:59.000Z

    A continuous magnetic separator and process for separating a slurry comprising magnetic particles into a clarified stream and a thickened stream. The separator has a container with a slurry inlet, an overflow outlet for the discharge of the clarified slurry stream, and an underflow outlet for the discharge of a thickened slurry stream. Magnetic particles in the slurry are attracted to, and slide down, magnetic rods within the container. The slurry is thus separated into magnetic concentrate and clarified slurry. Flow control means can be used to control the ratio of the rate of magnetic concentrate to the rate of clarified slurry. Feed control means can be used to control the rate of slurry feed to the slurry inlet.

  20. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  1. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  2. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  3. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  4. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  5. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  6. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  7. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  8. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  9. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  10. Building commissioning: The key to quality assurance

    SciTech Connect (OSTI)

    NONE

    1998-05-01T23:59:59.000Z

    This Guide is written to aid building owners and retrofit project managers currently participating in the Rebuild America program. The Guide provides information on implementing building commissioning projects that will optimize the results of existing building equipment improvements and retrofits projects. It should be used in coordination with Rebuild America`s Community Partnership Handbook. The Handbook describes, in detail, eight important steps necessary for planning and carrying out a community-wide energy-efficiency program. In step number 7 of the Handbook, commissioning is shown to be an integral aspect of implementing a building retrofit. The commissioning process ensures that a facility is safe, efficient, comfortable, and conducive to the presumed activities for which it was constructed. Rebuild America strongly encourages its partners to incorporate commissioning into their retrofit projects. By verifying the correct installation, functioning, operation, and maintenance of equipment, the commissioning process ensures that efficiency measures will continue to deliver benefits over the long term. Although commissioning can take place after the equipment has been installed, it is more effective when it takes place over the entire equipment installation process.

  11. Catalyst immobilization techniques for continuous flow synthesis

    E-Print Network [OSTI]

    Nagy, Kevin David

    2012-01-01T23:59:59.000Z

    Catalytic processes are ubiquitous in both research and industrial settings. As continuous flow processes continue to gain traction in research labs and fine and pharmaceutical chemical processes, new opportunities exist ...

  12. Continuous Fiber Ceramic Composites (CFCC)

    SciTech Connect (OSTI)

    R. A. Wagner

    2002-12-18T23:59:59.000Z

    This report summarizes work to develop CFCC's for various applications in the Industries of the Future (IOF) and power generation areas. Performance requirements range from relatively modest for hot gas filters to severe for turbine combustor liners and infrared burners. The McDermott Technology Inc. (MTI) CFCC program focused on oxide/oxide composite systems because they are known to be stable in the application environments of interest. The work is broadly focused on dense and porous composite systems depending on the specific application. Dense composites were targeted at corrosion resistant components, molten aluminum handling components and gas turbine combustor liners. The development work on dense composites led to significant advances in fiber coatings for oxide fibers and matrix densification. Additionally, a one-step fabrication process was developed to produce low cost composite components. The program also supported key developments in advanced oxide fibers that resulted in an improved version of Nextel 610 fiber (commercially available as Nextel 650) and significant progress in the development of a YAG/alumina fiber. Porous composite development focused on the vacuum winding process used to produce hot gas filters and infrared burner components.

  13. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  14. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  15. In-situ continuous water monitoring system

    DOE Patents [OSTI]

    Thompson, C.V.; Wise, M.B.

    1998-03-31T23:59:59.000Z

    An in-situ continuous liquid monitoring system for continuously analyzing volatile components contained in a water source comprises: a carrier gas supply, an extraction container and a mass spectrometer. The carrier gas supply continuously supplies the carrier gas to the extraction container and is mixed with a water sample that is continuously drawn into the extraction container by the flow of carrier gas into the liquid directing device. The carrier gas continuously extracts the volatile components out of the water sample. The water sample is returned to the water source after the volatile components are extracted from it. The extracted volatile components and the carrier gas are delivered continuously to the mass spectrometer and the volatile components are continuously analyzed by the mass spectrometer. 2 figs.

  16. In-situ continuous water analyzing module

    DOE Patents [OSTI]

    Thompson, Cyril V. (Knoxville, TN); Wise, Marcus B. (Kingston, TN)

    1998-01-01T23:59:59.000Z

    An in-situ continuous liquid analyzing system for continuously analyzing volatile components contained in a water source comprises: a carrier gas supply, an extraction container and a mass spectrometer. The carrier gas supply continuously supplies the carrier gas to the extraction container and is mixed with a water sample that is continuously drawn into the extraction container. The carrier gas continuously extracts the volatile components out of the water sample. The water sample is returned to the water source after the volatile components are extracted from it. The extracted volatile components and the carrier gas are delivered continuously to the mass spectometer and the volatile components are continuously analyzed by the mass spectrometer.

  17. In-situ continuous water monitoring system

    DOE Patents [OSTI]

    Thompson, Cyril V. (Knoxville, TN); Wise, Marcus B. (Kingston, TN)

    1998-01-01T23:59:59.000Z

    An in-situ continuous liquid monitoring system for continuously analyzing volatile components contained in a water source comprises: a carrier gas supply, an extraction container and a mass spectrometer. The carrier gas supply continuously supplies the carrier gas to the extraction container and is mixed with a water sample that is continuously drawn into the extraction container by the flow of carrier gas into the liquid directing device. The carrier gas continuously extracts the volatile components out of the water sample. The water sample is returned to the water source after the volatile components are extracted from it. The extracted volatile components and the carrier gas are delivered continuously to the mass spectrometer and the volatile components are continuously analyzed by the mass spectrometer.

  18. Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Horace P. Yuen

    2014-05-07T23:59:59.000Z

    In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

  19. Continuous profiling of magnetotelluric fields

    SciTech Connect (OSTI)

    Verdin, C.T.

    1991-05-01T23:59:59.000Z

    The magnetotelluric (MT) method of mapping ground electrical conductivity is traditionally based on measurement of the surface impedance at widely spaced stations to infer models of the subsurface through a suitable pseudo 1-D inverse or with linearized least-squares inversion for 2- or 3-D geoelectric media. It is well known that small near-surface inhomogeneities can produce spatial discontinuities in the measured electric fields over a wide frequency range and may consequently bias the impedance on a very local scale. Inadequate station spacing effectively aliases the electric field measurements and results in distortions that cannot be removed in subsequent processing or modelling. In order to fully exploit the benefits of magnetotellurics in complex geological environments, closely spaced measurements must be used routinely. This thesis entertains an analysis of MT data taken along continuous profiles and is a first step that will allow more encompassing 2-D sampling techniques to become viable in the years to come. The developments presented here are to a large extent motivated by the physical insight gained from low-contrast solutions to the forward MT problem. These solutions describe the relationship between a perturbation in the electrical conductivity of the subsurface and the ensuing perturbation of the MT response as the output of a linear system. Albeit strictly accurate in a limited subset of practical exploration problems, the linearized solutions allow one to pursue a model independent study of the response characteristics of MT data. In fact, these solutions yield simple expressions for 1-,2-, and 3-D resistivity models which are here examined in progressive sequence.

  20. Measurements of Carbonaceous Aerosols using Semi-Continuous Thermal-Optical Method

    SciTech Connect (OSTI)

    Yu, Xiao-Ying

    2011-08-01T23:59:59.000Z

    Carbonaceous aerosols are major components in air pollution as a result of energy consumption, thus measurement of them is important to waste management. Increasing interest has been drawn to the identification, measurement, analysis, and modeling of carbon aerosols in the past decade. This book chapter will provide a review of current state-of-art techniques to determine carbonaceous aerosols in relation to air pollution and waste management. The chapter will be composed of four parts. The introduction will discuss why carbon aerosols including elemental carbon (EC), organic carbon (OC), and total carbon (TC=EC+OC) are important to energy consumption, air pollution, waste management, and global climate change. Key definitions will be introduced. Relevant terminologies will be provided. The second part will be a review of the current state-of the art measurement techniques that are used to determine carbon aerosols. Both on-line and off-line methods will be described. Comparisons of different techniques that provide the same physical quantity will be provided based on recent literature findings. Differences among the physical parameters determined by various techniques will be discussed. The third part will focus on data analysis and products obtained from carbon aerosol measurements. In addition to EC, OC, and TC, primary organic carbon (POC) and secondary organic carbon (SOC) are of interest to researchers to understand the source and sink of carbonaceous aerosols. Techniques used to determine POC and SOC, such as the EC tracer method and positive matrix factorization, will be described and their differences discussed. Examples will be provided showing field data comparison between the Sunset organic carbon and elemental carbon field analyzer and the Aerodyne aerosol mass spectrometer, both of which are widely used for on-line aerosol measurements. The last part will report new trends and summarize future research needs in carbon aerosol measurement. Emerging problems will be identified and research priorities will be recommended.

  1. Practical quantum key distribution over 60 hours at an optical fiber distance of 20km using weak and vacuum decoy pulses for enhanced security

    E-Print Network [OSTI]

    J. F. Dynes; Z. L. Yuan; A. W. Sharpe; A. J. Shields

    2011-04-15T23:59:59.000Z

    Experimental one-way decoy pulse quantum key distribution running continuously for 60 hours is demonstrated over a fiber distance of 20km. We employ a decoy protocol which involves one weak decoy pulse and a vacuum pulse. The obtained secret key rate is on average over 10kbps. This is the highest rate reported using this decoy protocol over this fiber distance and duration.

  2. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  3. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  4. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  5. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  6. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  7. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  8. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  9. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  10. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  11. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  12. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  13. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  14. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  15. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  16. Parallel Interval Continuous Global Optimization Algorithms

    E-Print Network [OSTI]

    abdeljalil benyoub

    2002-07-19T23:59:59.000Z

    Jul 19, 2002 ... Abstract: We theorically study, on a distributed memory architecture, the parallelization of Hansen's algorithm for the continuous global ...

  17. Optimization Online - Enter Your Password to Continue

    E-Print Network [OSTI]

    Update Entry. On the Coupled Continuous Knapsack Problems: Projection Onto the Volume Constrained Gibbs N-Simplex. Enter the Article Password:.

  18. Hanford year 2000 Business Continuity Plan

    SciTech Connect (OSTI)

    ROGGENKAMP, S.L.

    1999-11-01T23:59:59.000Z

    The goal of Department of Energy Richland Operations (DOE-RL) Year 2000 (Y2K) effort is to ensure that the Hanford site successfully continues its mission as we approach and enter the 21th century. The Y2K Business Continuity Planning process provides a structured approach to identify Y2K risks to the site and to mitigate these risks through Y2K Contingency Planning, ''Zero-Day'' Transition Planning and Emergency Preparedness. This document defines the responsibilities, processes and plans for Hanford's Y2K Business Continuity. It identifies proposed business continuity drills, tentative schedule and milestones.

  19. Microsoft Word - Environmental Document for Continued Operation...

    National Nuclear Security Administration (NNSA)

    John Belluardo August 11, 2011 (925) 422-2567 DETERMINATION ISSUED REGARDING ENVIRONMENTAL DOCUMENT FOR CONTINUED OPERATION OF LAWRENCE LIVERMORE NATIONAL LABORATORY:...

  20. Stationary distributions of continuous time Markov chains

    E-Print Network [OSTI]

    2012-04-13T23:59:59.000Z

    Apr 13, 2012 ... stationary distribution as the limiting fraction of time spent in states. 1 Stationary measures in continuous time. The following theorem is an ...

  1. Automated Continuous Commissioning of Commercial Buildings

    E-Print Network [OSTI]

    Bailey, Trevor

    2013-01-01T23:59:59.000Z

    Conference on Building Commissioning. San Francisco, CA. 17.Commercial Buildings Commissioning, LBNL- 56637, Nov. 2004.Automated Continuous Commissioning Tool GUI Screenshots from

  2. Semi-continuous network flow problems

    E-Print Network [OSTI]

    2012-04-26T23:59:59.000Z

    Apr 26, 2012 ... Semi-continuous variables are also common when modeling petrochemical processes as described in [8] and [9]. Furthermore, as [9] and [13] ...

  3. Theoretical Ecology: Continued growth and success

    E-Print Network [OSTI]

    Hastings, Alan

    2010-01-01T23:59:59.000Z

    EDITORIAL Theoretical Ecology: Continued growth and successof areas in theoretical ecology. Among the highlights areyear represent theoretical ecology from around the world: 20

  4. Sandia Energy - Continuous Reliability Enhancement for Wind ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Enhancement for Wind (CREW): Project Update Home Renewable Energy Energy News Wind Energy News & Events Systems Analysis Continuous Reliability Enhancement for Wind (CREW):...

  5. ONE-PARAMETER CONTINUOUS FIELDS OF KIRCHBERG ...

    E-Print Network [OSTI]

    2008-09-05T23:59:59.000Z

    One-parameter separable unital continuous fields of Kirchberg algebras (nuclear purely infinite simple C*-algebras) with torsion free Ki-groups and trivial ...

  6. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  7. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  8. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  9. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  10. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  11. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  12. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  13. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  14. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  15. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  16. Inference in Probabilistic Logic Programs with Continuous Random Variables

    E-Print Network [OSTI]

    Islam, Muhammad Asiful; Ramakrishnan, I V

    2011-01-01T23:59:59.000Z

    Probabilistic Logic Programming (PLP), exemplified by Sato and Kameya's PRISM, Poole's ICL, Raedt et al's ProbLog and Vennekens et al's LPAD, is aimed at combining statistical and logical knowledge representation and inference. A key characteristic of PLP frameworks is that they are conservative extensions to non-probabilistic logic programs which have been widely used for knowledge representation. PLP frameworks extend traditional logic programming semantics to a distribution semantics, where the semantics of a probabilistic logic program is given in terms of a distribution over possible models of the program. However, the inference techniques used in these works rely on enumerating sets of explanations for a query answer. Consequently, these languages permit very limited use of random variables with continuous distributions. In this paper, we present a symbolic inference procedure that uses constraints and represents sets of explanations without enumeration. This permits us to reason over PLPs with Gaussian...

  17. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  18. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  19. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  20. Continuous Cooling Transformation (CCT) Assistant Professor

    E-Print Network [OSTI]

    Cambridge, University of

    Continuous Cooling Transformation (CCT) Diagrams R. Manna Assistant Professor Centre of Advanced.ac.uk #12;Continuous cooling transformation (CCT) diagram There are two types of CCT diagrams I) Plot and transformation finish temperature against transformation time on each cooling curve II) Plot of (for each type

  1. CONTINUITY IN SOFTWARE SYSTEMS Dick Hamlet

    E-Print Network [OSTI]

    Hamlet, Richard

    the role of continuity in engineering, particu- larly in testing and certifying artifacts, then considers testing. It is shown how `continuity' can be established in practice, and the consequences for testing by inserting a wooden han- dle into a tubular socket in a metal blade. The resulting tool is very versatile

  2. Energy Harvesting Communications with Continuous Energy Arrivals

    E-Print Network [OSTI]

    Yener, Aylin

    Energy Harvesting Communications with Continuous Energy Arrivals Burak Varan Kaya Tutuncuoglu Aylin--This work considers an energy harvesting transmit- ter that gathers a continuous flow of energy from intermittent sources, thus relaxing the modeling assumption of discrete amounts of harvested energy present

  3. A Transmission Control Framework Continuous Media

    E-Print Network [OSTI]

    Whitton, Mary C.

    Rights Reserved #12;ABSTRACT A Transmission Control Framework for Continuous Media (Under the directionA Transmission Control Framework for Continuous Media by Terry Michael Talley A dissertation by integrating real-time two-way audio and video with the computer system. Unfortunately, the quality of video

  4. CALENDAR 2009-2010 Continuing Education

    E-Print Network [OSTI]

    Barthelat, Francois

    . Legal deposit 2009, National Library of Canada and Bibliothèque nationale du Québec ISSN 1718UNIVERSITY CALENDAR 2009-2010 Continuing Education #12;Moving into the role of Dean of Continuing of this Calendar. McGill enjoys a remarkable local, national and international reputation as a centre of excellence

  5. LBL CONTINUOUS BIOMASS LIQUEFACTION PROCESS ENGINEERING UNIT (PEU)

    E-Print Network [OSTI]

    Figueroa, Carlos

    2012-01-01T23:59:59.000Z

    0092 UC-61 ORNIA LBL CONTINUOUS BIOMASS LIQUEFACTION PROCESSLBL~l0092 LBL CONTINUOUS BIOMASS LIQUEFACTION PROCESSof Energy LBL CONTINUOUS BIOMASS LIQUEFACTION PROCESS

  6. Business Continuity Project Project Summary: Develop Business Continuity Plans for all critical functional areas of

    E-Print Network [OSTI]

    and methods to "invoke" individual plans, · Identify critical materials, parts, equipment needed, · Identify resources for obtaining critical materials, parts, equipment, · Identify resources for critical servicesBusiness Continuity Project Project Summary: Develop Business Continuity Plans for all critical

  7. Methods for Automated and Continuous Commissioning of Building Systems

    SciTech Connect (OSTI)

    Larry Luskay; Michael Brambley; Srinivas Katipamula

    2003-04-30T23:59:59.000Z

    Avoidance of poorly installed HVAC systems is best accomplished at the close of construction by having a building and its systems put ''through their paces'' with a well conducted commissioning process. This research project focused on developing key components to enable the development of tools that will automatically detect and correct equipment operating problems, thus providing continuous and automatic commissioning of the HVAC systems throughout the life of a facility. A study of pervasive operating problems reveled the following would most benefit from an automated and continuous commissioning process: (1) faulty economizer operation; (2) malfunctioning sensors; (3) malfunctioning valves and dampers, and (4) access to project design data. Methodologies for detecting system operation faults in these areas were developed and validated in ''bare-bones'' forms within standard software such as spreadsheets, databases, statistical or mathematical packages. Demonstrations included flow diagrams and simplified mock-up applications. Techniques to manage data were demonstrated by illustrating how test forms could be populated with original design information and the recommended sequence of operation for equipment systems. Proposed tools would use measured data, design data, and equipment operating parameters to diagnosis system problems. Steps for future research are suggested to help more toward practical application of automated commissioning and its high potential to improve equipment availability, increase occupant comfort, and extend the life of system equipment.

  8. Development of Continuous Solvent Extraction Processes for Coal Derived Carbon Products

    SciTech Connect (OSTI)

    Elliot B. Kennel

    2006-12-31T23:59:59.000Z

    This DOE NETL-sponsored effort seeks to develop continuous processes for producing carbon products from solvent-extracted coal. A key process step is removal of solids from liquefied coal. Three different processes were compared: gravity separation, centrifugation using a decanter-type Sharples Pennwalt centrifuge, and a Spinner-II centrifuge. The data suggest that extracts can be cleaned to as low as 0.5% ash level and probably lower using a combination of these techniques.

  9. Managing the Business Continuity of Information Technology

    E-Print Network [OSTI]

    Kissell, Jeremy

    2008-12-19T23:59:59.000Z

    the Public's Business: Continuity Planning & NYS Government As the title describes, this work deals with continuity planning for the New York State government, and it goes through its evolution over a twenty year period of continuity planning until after... to be purchased anyway after a disaster. If the building where an organization’s digital data is destroyed, even after retrieving an off-site backup of that data, they would need the hardware to retrieve the data from the backup and to use it effectively in a...

  10. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  11. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  12. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  13. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  14. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  15. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  16. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  17. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  18. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  19. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  20. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  1. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  2. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  3. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  4. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  5. Both construction and operations continue to increase

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Both construction and operations continue to increase As mentioned earlier, Building 9731 was the first building completed at Y-12, having been completed in just a few weeks in...

  6. Method for the continuous production of hydrogen

    DOE Patents [OSTI]

    Getty, John Paul (Knoxville, TN); Orr, Mark T. (Kingsport, TN); Woodward, Jonathan (Kingston, TN)

    2002-01-01T23:59:59.000Z

    The present invention is a method for the continuous production of hydrogen. The present method comprises reacting a metal catalyst with a degassed aqueous organic acid solution within a reaction vessel under anaerobic conditions at a constant temperature of .ltoreq.80.degree. C. and at a pH ranging from about 4 to about 9. The reaction forms a metal oxide when the metal catalyst reacts with the water component of the organic acid solution while generating hydrogen, then the organic acid solution reduces the metal oxide thereby regenerating the metal catalyst and producing water, thus permitting the oxidation and reduction to reoccur in a continual reaction cycle. The present method also allows the continuous production of hydrogen to be sustained by feeding the reaction with a continuous supply of degassed aqueous organic acid solution.

  7. Alpha-environmental continuous air monitor inlet

    DOE Patents [OSTI]

    Rodgers, John C. (Santa Fe, NM)

    2003-01-01T23:59:59.000Z

    A wind deceleration and protective shroud that provides representative samples of ambient aerosols to an environmental continuous air monitor (ECAM) has a cylindrical enclosure mounted to an input on the continuous air monitor, the cylindrical enclosure having shrouded nozzles located radially about its periphery. Ambient air flows, often along with rainwater flows into the nozzles in a sampling flow generated by a pump in the continuous air monitor. The sampling flow of air creates a cyclonic flow in the enclosure that flows up through the cylindrical enclosure until the flow of air reaches the top of the cylindrical enclosure and then is directed downward to the continuous air monitor. A sloped platform located inside the cylindrical enclosure supports the nozzles and causes any moisture entering through the nozzle to drain out through the nozzles.

  8. Continuous flow separation techniques for microchemical synthesis

    E-Print Network [OSTI]

    Kralj, Jason G

    2006-01-01T23:59:59.000Z

    Performing multistep microchemical synthesis requires many techniques from combining micromixers in series to the development of continuous microfluidic separation tools. Safety, high heat and mass transfer rates, and cost ...

  9. QuarterlyCouncil Continued on page 2

    E-Print Network [OSTI]

    QuarterlyCouncil Continued on page 2 98 > In this issue Council Decisions > Updates on Council ­ or mishandled, in his opinion ­ important issues such as education funding. He's concerned about

  10. Geothermal Energy Growth Continues, Industry Survey Reports

    Broader source: Energy.gov [DOE]

    A survey released by the Geothermal Energy Association (GEA) shows continued growth in the number of new geothermal power projects under development in the United States, a 20% increase since January of this year.

  11. Evaluation of continuous glucose monitoring systems

    E-Print Network [OSTI]

    Li, Guang, M. Eng. Massachusetts Institute of Technology

    2008-01-01T23:59:59.000Z

    There has been much hype in the research and development of continuous glucose monitoring technologies, driven by the enormous and rapidly expanding glucose monitoring market and the large and growing base of diabetes ...

  12. Magnetically enhanced centrifugation for continuous biopharmaceutical processing

    E-Print Network [OSTI]

    Chen, Fei, Ph. D. Massachusetts Institute of Technology

    2009-01-01T23:59:59.000Z

    Effective separation and purification of biopharmaceutical products from the media in which they are produced continues to be a challenging task. Such processes usually involve multiple steps and the overall product loss ...

  13. Continuously-Variable Series-Elastic Actuator

    E-Print Network [OSTI]

    Mooney, Luke M.

    Actuator efficiency is an important factor in the design of powered leg prostheses, orthoses, exoskeletons, and legged robots. A continuously-variable series-elastic actuator (CV-SEA) is presented as an efficient actuator ...

  14. Back Cover Front Cover Office of Continuing

    E-Print Network [OSTI]

    Goodman, Robert M.

    Back Cover Front Cover Office of Continuing Professional Education 2012­2013 Professional Landscape of Golf Course Irrigation Systems (p. 13) · Basics of Turf Management (p. 21) · Turfgrass Establishment (p

  15. Automatic tuning of continuous-time filters 

    E-Print Network [OSTI]

    Sumesaglam, Taner

    2004-11-15T23:59:59.000Z

    Integrated high-Q continuous-time filters require adaptive tuning circuits that will correct the filter parameters such as center frequency and quality factor (Q). Three different automatic tuning techniques are introduced. In all of the proposed...

  16. Partnerships to continue moving toward zero emissions

    E-Print Network [OSTI]

    California at Davis, University of

    Partnerships to continue moving toward zero emissions Zero Emission transportation goals Zero Emission MAP makes available technical assistance to states and cities to support the growth of zero emission mobility markets. 1 Research shows

  17. Automatic tuning of continuous-time filters

    E-Print Network [OSTI]

    Sumesaglam, Taner

    2004-11-15T23:59:59.000Z

    Integrated high-Q continuous-time filters require adaptive tuning circuits that will correct the filter parameters such as center frequency and quality factor (Q). Three different automatic tuning techniques are introduced. In all of the proposed...

  18. Continuous Improvement Energy Projects Reduce Energy Consumption

    E-Print Network [OSTI]

    Niemeyer, E.

    2014-01-01T23:59:59.000Z

    Continuous Improvement Energy Projects Reduce Energy Consumption Eric Niemeyer, Operations Superintendent Drilling Specialties Company A division of Chevron Phillips Chemical Company LP ESL-IE-14-05-31 Proceedings of the Thrity..., LA. May 20-23, 2014 A presentation of the paper “Continuous Improvement Energy Projects Reduce Energy Consumption” by Bruce Murray and Allison Myers ESL-IE-14-05-31 Proceedings of the Thrity-Sixth Industrial Energy Technology Conference New Orleans...

  19. Solar hot water system installed at Quality Inn, Key West, Florida. Final report

    SciTech Connect (OSTI)

    Not Available

    1980-04-01T23:59:59.000Z

    The solar energy hot water system installed in the Quality Inn, Key West, Florida, which consists of four buildings, is described. Three buildings are low-rise, two-story buildings containing 100 rooms. The fourth is a four-story building with 48 rooms. The solar system was designed to provide approximately 50% of the energy required for the domestic hot water system. The solar system consists of approximately 1400 ft/sup 2/ of flat plate collector, two 500 gal storage tanks, a circulating pump, and a controller. Operation of the system was begun in April 1978, and has continued to date with only three minor interruptions for pump repair. In the first year of operation, it was determined that the use of the solar facility resulted in 40% fuel savings.

  20. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  1. Applications of a fast, continuous wavelet transform

    SciTech Connect (OSTI)

    Dress, W.B.

    1997-02-01T23:59:59.000Z

    A fast, continuous, wavelet transform, based on Shannon`s sampling theorem in frequency space, has been developed for use with continuous mother wavelets and sampled data sets. The method differs from the usual discrete-wavelet approach and the continuous-wavelet transform in that, here, the wavelet is sampled in the frequency domain. Since Shannon`s sampling theorem lets us view the Fourier transform of the data set as a continuous function in frequency space, the continuous nature of the functions is kept up to the point of sampling the scale-translation lattice, so the scale-translation grid used to represent the wavelet transform is independent of the time- domain sampling of the signal under analysis. Computational cost and nonorthogonality aside, the inherent flexibility and shift invariance of the frequency-space wavelets has advantages. The method has been applied to forensic audio reconstruction speaker recognition/identification, and the detection of micromotions of heavy vehicles associated with ballistocardiac impulses originating from occupants` heart beats. Audio reconstruction is aided by selection of desired regions in the 2-D representation of the magnitude of the transformed signal. The inverse transform is applied to ridges and selected regions to reconstruct areas of interest, unencumbered by noise interference lying outside these regions. To separate micromotions imparted to a mass-spring system (e.g., a vehicle) by an occupants beating heart from gross mechanical motions due to wind and traffic vibrations, a continuous frequency-space wavelet, modeled on the frequency content of a canonical ballistocardiogram, was used to analyze time series taken from geophone measurements of vehicle micromotions. By using a family of mother wavelets, such as a set of Gaussian derivatives of various orders, features such as the glottal closing rate and word and phrase segmentation may be extracted from voice data.

  2. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  3. Apparatus for fabricating continuous lengths of superconductor

    DOE Patents [OSTI]

    Kroeger, Donald M. (Knoxville, TN); List, III, Frederick A. (Andersonville, TN)

    2002-01-01T23:59:59.000Z

    A process and apparatus for manufacturing a superconductor. The process is accomplished by depositing a superconductor precursor powder on a continuous length of a first substrate ribbon, overlaying a continuous length of a second substrate ribbon on said first substrate ribbon, and applying sufficient pressure to form a bound layered superconductor comprising a layer of said superconducting precursor powder between said first substrate ribbon and said second substrates ribbon. The layered superconductor is then heat treated to establish the superconducting phase of said superconductor precursor powder.

  4. Apparatus for fabricating continuous lengths of superconductor

    DOE Patents [OSTI]

    Kroeger, Donald M. (Knoxville, TN); List, III, Frederick A. (Andersonville, TN)

    2001-01-01T23:59:59.000Z

    A process and apparatus for manufacturing a superconductor. The process is accomplished by depositing a superconductor precursor powder on a continuous length of a first substrate ribbon, overlaying a continuous length of a second substrate ribbon on said first substrate ribbon, and applying sufficient pressure to form a bound layered superconductor comprising a layer of said superconducting precursor powder between said first substrate ribbon and said second substrates ribbon. The layered superconductor is then heat treated to establish the superconducting phase of said superconductor precursor powder.

  5. Continuous Energy Improvement in Motor Driven Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof"Wave theJuly 30, 2013 Sanyo: NoticeContinuing ProgressContinuous Energy

  6. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  7. Club Convergence of House Prices: Evidence from China's Ten Key Cities

    E-Print Network [OSTI]

    Meng, Hao; Zhou, Wei-Xing

    2015-01-01T23:59:59.000Z

    The latest global financial tsunami and its follow-up global economic recession has uncovered the crucial impact of housing markets on financial and economic systems. The Chinese stock market experienced a markedly fall during the global financial tsunami and China's economy has also slowed down by about 2\\%-3\\% when measured in GDP. Nevertheless, the housing markets in diverse Chinese cities seemed to continue the almost nonstop mania for more than ten years. However, the structure and dynamics of the Chinese housing market are less studied. Here we perform an extensive study of the Chinese housing market by analyzing ten representative key cities based on both linear and nonlinear econophysical and econometric methods. We identify a common collective driving force which accounts for 96.5\\% of the house price growth, indicating very high systemic risk in the Chinese housing market. The ten key cities can be categorized into clubs and the house prices of the cities in the same club exhibit an evident converge...

  8. Adaptive Training for Large Vocabulary Continuous

    E-Print Network [OSTI]

    Hain, Thomas

    Adaptive Training for Large Vocabulary Continuous Speech Recognition Kai Yu Hughes Hall College for the degree of Doctor of Philosophy #12;ii Summary In recent years, there has been a trend towards training is to train hidden Markov models (HMMs) on the whole data set as if all data comes from a single acoustic

  9. Louisiana Tech University Continuing Education & Distance Learning

    E-Print Network [OSTI]

    Selmic, Sandra

    1 Louisiana Tech University Continuing Education & Distance Learning 720 West Railroad Avenue, PO training. ENERGY CONSERVATION - BASIC ELECTRICAL CONCEPTS - 8 Hours - $119 The purpose of this course is to acquaint you with the basic concepts of electricity and how to use those concepts to maximize efficiency

  10. Markovian feedback to control continuous variable entanglement

    E-Print Network [OSTI]

    Stefano Mancini

    2005-04-18T23:59:59.000Z

    We present a model to realize quantum feedback control of continuous variable entanglement. It consists of two interacting bosonic modes subject to amplitude damping and achieving entangled Gaussian steady state. The possibility to greatly improve the degree of entanglement by means of Markovian (direct) feedback is then shown.

  11. Interaction Sheaves on Continuous Hans Keiding

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Interaction Sheaves on Continuous Domains J. Abdou Hans Keiding Revised version March 2009 of game forms obtained in the finite case in Abdou and Keiding (2003). Keywords: Nash equilibrium, strong'H^opital 75647 Paris Cedex 13; email: abdou@univ-paris1.fr University of Copenhagen, Department of Economics

  12. Continuing Education presents Rembrandt and His Legacy

    E-Print Network [OSTI]

    Atkinson, Katie

    CRN 15168 Continuing Education presents Rembrandt and His Legacy With Dr Aimee Blackledge Rembrandt the career of Rembrandt van Rijn and the wider impact of his legacy. Over ten weeks, we will explore both the paintings and the controversies surrounding the attribution and interpretation of works by Rembrandt and his

  13. Continuous injection method controls downhole corrosion - 2

    SciTech Connect (OSTI)

    Bradburn, J.B.; Todd, R.B.

    1981-08-01T23:59:59.000Z

    In designing a continuous downhole corrosion inhibitor injection system, many interrelated factors must be considered: bottomhole pressure, inhibitor viscosity, injection rate, friction loss, hole geometry, cost, delivery time, annulus environment, elastomers, and corrosivity of well fluids. In view of the many variables associated with the design of a downhole injection system, the following design outline is presented. 8 refs.

  14. Continuous representation for shell models of turbulence

    E-Print Network [OSTI]

    Alexei A. Mailybaev

    2014-09-16T23:59:59.000Z

    In this work we construct and analyze continuous hydrodynamic models in one space dimension, which are induced by shell models of turbulence. After Fourier transformation, such continuous models split into an infinite number of uncoupled subsystems, which are all identical to the same shell model. The two shell models, which allow such a construction, are considered: the dyadic (Desnyansky--Novikov) model with the intershell ratio $\\lambda = 2^{3/2}$ and the Sabra model of turbulence with $\\lambda = \\sqrt{2+\\sqrt{5}} \\approx 2.058$. The continuous models allow understanding various properties of shell model solutions and provide their interpretation in physical space. We show that the asymptotic solutions of the dyadic model with Kolmogorov scaling correspond to the shocks (discontinuities) for the induced continuous solutions in physical space, and the finite-time blowup together with its viscous regularization follow the scenario similar to the Burgers equation. For the Sabra model, we provide the physical space representation for blowup solutions and intermittent turbulent dynamics.

  15. Japan's Triple Disaster The Continuing News Story

    E-Print Network [OSTI]

    Napp, Nils

    Japan's Triple Disaster The Continuing News Story Dennis Normile Japan News Bureau Chief November not pragmatic." -Fumihiko Imamura #12;18 News Of The Week Does Japan Need Nuclear Power? #12;19 News & Analysis "People lost trust in TEPCO and the energy policy itself." -Shunsuke Managi #12;20 News Of The Week Japan

  16. Analysis of the BATSE Continuous MER data

    E-Print Network [OSTI]

    P. Veres; I. Horvath; L. G. Balazs

    2005-10-11T23:59:59.000Z

    The CGRO/BATSE database includes many types of data such as the 16-channel continuous background or medium energy resolution burst data (CONT and MER data types). We have calculated some four hundred burst's medium energy resolution spectra and Principal Component Analysis has been applied. We found five components can describe GRBs' spectra.

  17. continued on page 2 Computer Systems Support

    E-Print Network [OSTI]

    Stanier, Charlie

    continued on page 2 Computer Systems Support College of Engineering University of Iowa Volume 13, and many hours of hands on test- ing, we will complete our $1.3M (list) networking upgrade over the Winter from up to ten self-contained switches where each physical, 48-port switch becomes a blade

  18. Continued on back UNIVERSITY OF OREGON

    E-Print Network [OSTI]

    Oregon, University of

    Continued on back UNIVERSITY OF OREGON MOBILE TECHNOLOGY ACCESS AND PAYMENT OPTION REQUEST Please complete this form to apply for access to mobile technology (e.g., cell phones, smart phones, etc device use. Information on the UO policies regarding access to mobile technology and payment options can

  19. Facult de Sant Publique Formation continue

    E-Print Network [OSTI]

    Nesterov, Yurii

    Faculté de Santé Publique Formation continue en management des institutions de soins Programme 2011, management stratégique (UCL, ULB) CIPS p.16 > Certificat interuniversitaire en management de la qualité dans) p.19 > Certificat interuniversitaire en management médical (ULB, UCL) CIMM p.19 > Certificat

  20. Continuous Casting Consortium Report to POSCO

    E-Print Network [OSTI]

    Thomas, Brian G.

    in Fig. 2, the gas fuel (such as propane C3H8) and oxygen leaving the torch combust into a high of the heat is transported away through radiation and advection with the combustion gas and the rest- 1 - Continuous Casting Consortium Report to POSCO Modeling Steel Slab Heat Transfer During

  1. Methodologies for Continuous Cellular Tower Data Analysis

    E-Print Network [OSTI]

    Clauset, Aaron

    Methodologies for Continuous Cellular Tower Data Analysis Nathan Eagle1,2 , John A. Quinn3 cellular tower data from 215 randomly sampled subjects in a major urban city. We demonstrate the potential by tower transitions. The tower groupings from these unsupervised clustering techniques are subsequently

  2. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  3. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  4. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  5. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  6. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  7. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  8. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  9. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  10. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  11. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  12. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  13. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  14. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  15. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  16. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  17. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  18. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  19. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  20. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  1. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  2. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  3. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  4. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  5. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  6. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  7. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  8. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  9. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  10. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  11. Implementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement

    E-Print Network [OSTI]

    Tobias Gehring; Vitus Händchen; Jörg Duhme; Fabian Furrer; Torsten Franz; Christoph Pacher; Reinhard F. Werner; Roman Schnabel

    2015-02-10T23:59:59.000Z

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution (QKD) this is achieved without relying on the hardness of mathematical problems which might be compromised by improved algorithms or by future quantum computers. State-of-the-art QKD requires composable security against coherent attacks for a finite number of samples. Here, we present the first implementation of QKD satisfying this requirement and additionally achieving security which is independent of any possible flaws in the implementation of the receiver. By distributing strongly Einstein-Podolsky-Rosen entangled continuous variable (CV) light in a table-top arrangement, we generated secret keys using a highly efficient error reconciliation algorithm. Since CV encoding is compatible with conventional optical communication technology, we consider our work to be a major promotion for commercialized QKD providing composable security against the most general channel attacks.

  12. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  13. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  14. Policy Flash 2014-05 Continuing Appropriations Act, 2014 -- Implementa...

    Energy Savers [EERE]

    G, Consolidated and Further Continuing Appropriations Act, 2013, Pub. L. No. 113-6 Policy Flash 2014-05 Continuing Appropriations Act, 2014 -- Implementation of Division F,...

  15. Effects of Continuous Triiodothyronine Infusion on Citric Acid...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Continuous Triiodothyronine Infusion on Citric Acid Cycle in the Normal Immature Swine Heart under Extracorporeal Effects of Continuous Triiodothyronine Infusion on Citric Acid...

  16. Virginia Tech Selected to Continue Development of Innovative...

    Office of Environmental Management (EM)

    Virginia Tech Selected to Continue Development of Innovative Building Automation System Virginia Tech Selected to Continue Development of Innovative Building Automation System...

  17. Solar Decathlon house continues to yield data | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Decathlon house continues to yield data ORNL, University of Tennessee to continue lessons learned in DOE solar energy competition Courtesy of: UT College of Architecture and...

  18. Dedicated to The Continued Education, Training and Demonstration...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Dedicated to The Continued Education, Training and Demonstration of PEM Fuel Cell Powered Lift Trucks In Real-World Applications Dedicated to The Continued Education, Training and...

  19. DEVELOPMENT OF AN INTRA-FACILITY CONTINUING EDUCATION PLANNING TOOL

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    DEVELOPMENT OF AN INTRA-FACILITY CONTINUING EDUCATION PLANNING TOOL by Lori Anne Chovanak EDUCATION PLANNING TOOL............................................................................... 1..................................................................................... 8 Value of the Intra-facility Continuing Education Tool

  20. Fault Tolerant Evaluation of Continuous Selection Queries over Sensor Data

    E-Print Network [OSTI]

    Lazaridis, Iosif; Han, Qi; Mehrotra, Sharad; Venkatasubramanian, Nalini

    2009-01-01T23:59:59.000Z

    Evaluation of Continuous Selection Queries over Sensor Dataevaluation of continuous selection queries (CSQs) over sensor-sensor suffices and there is no Fault Tolerant Evaluation of

  1. Federal Energy Management Program Training Offers IACET Continuing Education Units

    Broader source: Energy.gov [DOE]

    Video explains how the Federal Energy Management Program offers International Association for Continuing Education and Training (IACET) continuing education units for eTraining core courses.

  2. Continuous Energy Improvement in Motor Driven Systems - A Guidebook...

    Energy Savers [EERE]

    Continuous Energy Improvement in Motor Driven Systems - A Guidebook for Industry Continuous Energy Improvement in Motor Driven Systems - A Guidebook for Industry This guidebook...

  3. ORISE: Agents of Opportunity for Terrorism Continuing Medical...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the Accreditation Council for Continuing Medical Education to provide continuing medical education for physicians. ORISE takes responsibility for the content, quality, and...

  4. Continuous, real time microwave plasma element sensor

    DOE Patents [OSTI]

    Woskov, Paul P. (4 Ledgewood Dr., Bedford, MA 01730); Smatlak, Donna L. (10 Village Hill Rd., Belmont, MA 02178); Cohn, Daniel R. (26 Walnut Hill Rd., Chestnut Hill, MA 02167); Wittle, J. Kenneth (1740 Conestoga Rd., Chester Springs, PA 19425); Titus, Charles H. (323 Echo Valley La., Newton Square, PA 19072); Surma, Jeffrey E. (806 Brian La., Kennewick, WA 99337)

    1995-01-01T23:59:59.000Z

    Microwave-induced plasma for continuous, real time trace element monitoring under harsh and variable conditions. The sensor includes a source of high power microwave energy and a shorted waveguide made of a microwave conductive, refractory material communicating with the source of the microwave energy to generate a plasma. The high power waveguide is constructed to be robust in a hot, hostile environment. It includes an aperture for the passage of gases to be analyzed and a spectrometer is connected to receive light from the plasma. Provision is made for real time in situ calibration. The spectrometer disperses the light, which is then analyzed by a computer. The sensor is capable of making continuous, real time quantitative measurements of desired elements, such as the heavy metals lead and mercury.

  5. Continuous, real time microwave plasma element sensor

    DOE Patents [OSTI]

    Woskov, P.P.; Smatlak, D.L.; Cohn, D.R.; Wittle, J.K.; Titus, C.H.; Surma, J.E.

    1995-12-26T23:59:59.000Z

    Microwave-induced plasma is described for continuous, real time trace element monitoring under harsh and variable conditions. The sensor includes a source of high power microwave energy and a shorted waveguide made of a microwave conductive, refractory material communicating with the source of the microwave energy to generate a plasma. The high power waveguide is constructed to be robust in a hot, hostile environment. It includes an aperture for the passage of gases to be analyzed and a spectrometer is connected to receive light from the plasma. Provision is made for real time in situ calibration. The spectrometer disperses the light, which is then analyzed by a computer. The sensor is capable of making continuous, real time quantitative measurements of desired elements, such as the heavy metals lead and mercury. 3 figs.

  6. Continuous microwave regeneration apparatus for absorption media

    DOE Patents [OSTI]

    Smith, Douglas D. (Knoxville, TN)

    1999-01-01T23:59:59.000Z

    A method and apparatus for continuously drying and regenerating ceramic beads for use in process gas moisture drying operations such as glove boxes. A microwave energy source is coupled to a process chamber to internally heat the ceramic beads and vaporize moisture contained therein. In a preferred embodiment, the moisture laden ceramic beads are conveyed toward the microwave source by a screw mechanism. The regenerated beads flow down outside of the screw mechanism and are available to absorb additional moisture.

  7. Variability in continuous traffic monitoring data

    SciTech Connect (OSTI)

    Wright, T.; Hu, P.S. [Oak Ridge National Lab., TN (United States); Young, J. [Tennessee Univ., Knoxville, TN (United States)

    1996-07-01T23:59:59.000Z

    Each state in the United States can be viewed as a universe of road segments. For each road segment in each state, it is desired to know various traffic characteristics based on count data, classification count data, and weigh-in-motion data. These data are absolutely essential for highway design, maintenance, safety, and planning. Given no cost constraints, each road segment would be continuously monitored every day of the year. However, in practice, a few road segments are monitored continuously every day of the year to produce annual characteristics of traffic flow. The remaining road segments are monitored for one or two days each year, and this resulting data are `adjusted` (using factors based on data collected from the continuously monitored road segments) to produce estimates of annual characteristics. With this general approach, each state strives to provide estimates of annual characteristics for each road segment within its jurisdiction. In 1985, the Federal Highway Administration (FHWA) published the Traffic Monitoring Guide to assist states in achieving this end. As with almost any data collection effort, the monitoring data suffers from errors from many sources. In this paper, we report some empirical findings in a research project sponsored by the FHWA. This research project studied the variability in the traffic data from the continuously monitored road segments from state(s) and, the extent to which this variability is transferred to and affects the precision of the data produced from the road segments which are monitored only one or two days each year. The ultimate hope is that states will eventually be able to not only publish an estimate of a characteristic such as Average Annual Daily Traffic (AADT) for each road segment, but also that each estimate will be accompanied by a statement expressing how good the estimate is in terms of its estimated variability or precision, which will likely be expressed as a coefficient of variation.

  8. Continuous Commisssioning of a Multipurpose Facility

    E-Print Network [OSTI]

    Yagua, C.; Wei, G.; Napper, G.; Turner, D.; Effinger, M.; Shahsavary, F.

    cycle. The actual program reference point was the supply air temperature instead of the outside air temperature. ? AHU-2 supply fan motor was extremely noisy. The VFD for this unit had been taken out of auto mode and placed in hand mode causing... was contracted by Austin Independent School District (AISD), to perform Continuous Commissioning?1 (CC?) of the Delco Activity Center. The CC implementation process began in March 2008 for the Delco Activity Center and was substantially completed by June...

  9. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  10. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  11. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  12. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  13. Pharmacokinetics and toxicology of continuously infused nitroimidazoles

    SciTech Connect (OSTI)

    Eifel, P.J.; Brown, J.M.

    1984-08-01T23:59:59.000Z

    The pharmacokinetics and toxicology of misonidazole (MISO) and SR-2508 given by continuous intraperitoneal infusion were studied in female C/sub 3/H mice. The survival (time to death) of animals receiving continuous infusions of SR-2508 and MISO was compared and related to plasma concentration, rate of infusion and total amount of drug delivered. Brain and plasma concentrations were determined by HPLC. For SR-2508, plasma concentration was directly proportional to the infusion rate. However, as the infusion rate of MISO was doubled, the plasma concentration of MISO increased approximately 6-fold, reflecting a substantial increase in the apparent half-life. The brain/plasma concentration ratio in animals infused for up to 6 days with SR-2508 remained constant, at approximately 0.09. At plasma concentrations of 0.08-1.5 mM, animals receiving SR-2508 survived approximately 3 times as long as animals exposed to a comparable plasma concentration of MISO. Even at the lowest infusion rates employed in this study, the survival of mice receiving SR-2508 was much shorter than would have been predicted if the toxicity of these two drugs were solely related to the integral brain exposure. The low brain/plasma concentration ratio of SR-2508 was maintained throughout long continuous exposures.

  14. Scalar-tensor gravity and conformal continuations

    E-Print Network [OSTI]

    Kirill A. Bronnikov

    2002-03-30T23:59:59.000Z

    Global properties of vacuum static, spherically symmetric configurations are studied in a general class of scalar-tensor theories (STT) of gravity in various dimensions. The conformal mapping between the Jordan and Einstein frames is used as a tool. Necessary and sufficient conditions are found for the existence of solutions admitting a conformal continuation (CC). The latter means that a singularity in the Einstein-frame manifold maps to a regular surface S_(trans) in the Jordan frame, and the solution is then continued beyond this surface. S_(trans) can be an ordinary regular sphere or a horizon. In the second case, S_(trans) proves to connect two epochs of a Kantowski-Sachs type cosmology. It is shown that, in an arbitrary STT, with arbitrary potential functions $U(\\phi)$, the list of possible types of causal structures of vacuum space-times is the same as in general relativity with a cosmological constant. This is true even for conformally continued solutions. It is found that when S_(trans) is an ordinary sphere, one of the generic structures appearing as a result of CC is a traversable wormhole. Two explicit examples are presented: a known solution illustrating the emergence of singularities and wormholes, and a nonsingular 3-dimensional model with an infinite sequence of CCs.

  15. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  16. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  17. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  18. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  19. PCA, Continuous, & Epidural Narcotic Infusion Documentation (07.2013) Documentation

    E-Print Network [OSTI]

    Oliver, Douglas L.

    PCA, Continuous, & Epidural Narcotic Infusion Documentation (07.2013) Documentation Required Continuous Narcotic Infusions PCA Only PCA + Basal (Continuous) Infusion Epidural and Epidural PCA Continuous Verification AND Documentation of Dose / Rate of Infusion of · Every 4 hours (may be done as part of change

  20. Modal Analysis of Continuous Structrual System with Tapered Cantilevered Members

    E-Print Network [OSTI]

    Kim, Yoon Mo

    2012-02-14T23:59:59.000Z

    OF CONVENTIONAL CONTINUOUS SYSTEM ............ 9 2.1. Transverse Vibration in Conventional Continuous System Model .................... 9 2.2. Equation of Motion for Flexural Member .......................................................... 9 2.3 Boundary.......................................... 19 2.6 Conclusion ........................................................................................................ 20 3. MODAL ANALYSIS OF DISCRETIZED CONTINUOUS SYSTEM ............... 21 3.1. Transverse Vibration in Discretized Continuous...

  1. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  2. Continuous air monitor filter changeout apparatus

    DOE Patents [OSTI]

    Rodgers, John C. (Santa Fe, NM)

    2008-07-15T23:59:59.000Z

    An apparatus and corresponding method for automatically changing out a filter cartridge in a continuous air monitor. The apparatus includes: a first container sized to hold filter cartridge replacements; a second container sized to hold used filter cartridges; a transport insert connectively attached to the first and second containers; a shuttle block, sized to hold the filter cartridges that is located within the transport insert; a transport driver mechanism means used to supply a motive force to move the shuttle block within the transport insert; and, a control means for operating the transport driver mechanism.

  3. Continuing engineering education for software engineering professionals

    SciTech Connect (OSTI)

    Davis, P.I.

    1992-02-19T23:59:59.000Z

    Designers of software for safety-critical applications are impelled to supplement their education through continuing engineering studies in the areas of requirements analysis, hazard identification, risk analysis, fault tolerance, failure modes, and psychology. Today's complex level of design is contributing to opportunities for catastrophic design errors in computer functions where failure of such functions is capable of causing injury and death. A syllabus of post-graduate, core studies within the curricula of five engineering specialties is suggested. Software Engineers are exhorted to undertake a professional, responsible role in safety-critical software design.

  4. Continuing engineering education for software engineering professionals

    SciTech Connect (OSTI)

    Davis, P.I.

    1992-02-19T23:59:59.000Z

    Designers of software for safety-critical applications are impelled to supplement their education through continuing engineering studies in the areas of requirements analysis, hazard identification, risk analysis, fault tolerance, failure modes, and psychology. Today`s complex level of design is contributing to opportunities for catastrophic design errors in computer functions where failure of such functions is capable of causing injury and death. A syllabus of post-graduate, core studies within the curricula of five engineering specialties is suggested. Software Engineers are exhorted to undertake a professional, responsible role in safety-critical software design.

  5. Continuation of Crosscutting Technology Development at Cast

    SciTech Connect (OSTI)

    Yoon, Roe-Hoan

    2012-03-31T23:59:59.000Z

    This Final Technical Report describes progress made on the sub-projects awarded in the Cooperative Agreement DE-FC26-05NT42457: Continuation of Crosscutting Technology Development at Center for Advanced Separation Technologies (CAST). The final reports for each sub-project are attached in the appendix. Much of the research to be conducted with Cooperative Agreement funds will be longer-term, high-risk, basic research and will be carried out in five broad areas: a) Solid-solid separation b) Solid-liquid separation c) Chemical/Biological Extraction d) Modeling and Control, and e) Environmental Control.

  6. Continuously pumping and reactivating gas pump

    DOE Patents [OSTI]

    Batzer, Thomas H. (Livermore, CA); Call, Wayne R. (Tracy, CA)

    1984-01-01T23:59:59.000Z

    Apparatus for continuous pumping using cycling cyropumping panels. A plurality of liquid helium cooled panels are surrounded by movable nitrogen cooled panels the alternatively expose or shield the helium cooled panels from the space being pumped. Gases condense on exposed helium cooled panels until the nitrogen cooled panels are positioned to isolate the helium cooled panels. The helium cooled panels are incrementally warmed, causing captured gases to accumulate at the base of the panels, where an independent pump removes the gases. After the helium cooled panels are substantially cleaned of condensate, the nitrogen cooled panels are positioned to expose the helium cooled panels to the space being pumped.

  7. A continuous automatic hydroponic cultivation system

    E-Print Network [OSTI]

    Reachi Gonzalez, Santiago

    1974-01-01T23:59:59.000Z

    . C. H. Samson, JW. Head of Department Dr. D. McDonald Member r. A. H. Laym n Member. August 1974 ABSTRACT A Continuous Automatic Hydroponic Cultivation Syst. m. (August 1974) Santiago Reachi Gonzalez, B. S. , Texas ARM University Co...-Chairmen of Advisory Committee: Dr. A. W Northam Dr. W. B. X, edbetter The main objective of this study is to develop a system that will provide a household with a high quality balanced vegetable mix at a cost less than existing retail pr' ces. Other objectives...

  8. Continuous Commissioning® of an Office Building

    E-Print Network [OSTI]

    Zheng, B.; Liu, M.; Pang, X.; Wang, J.; Hansen, K.

    2005-01-01T23:59:59.000Z

    Continuous Commissioning ® of an Office Building Bin Zheng Mingsheng Liu, Ph.D., P.E. Xiufeng Pang Jinrong Wang P.E. Ken Hansen P.E. Energy Systems Laboratory University of Nebraska-Lincoln Omaha Public Power District Abstract... Control in VAV Systems,” Proceedings of ISEC 2003. [3] Liu, M, G. Liu, Joo, I, Song, L. and Wang, G. 2004, “Development of In-situ Fan Curve Measurement for VAV AHU System,” Proceedings of ISEC 2004. [4] Zheng, B., Pang, X. and Liu, M., 2005, “Using...

  9. Continuity Program | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting theCommercializationValidationEnterprise ArchitectureContactsContinuity

  10. Diesel prices continue to decrease nationally

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management FermiDavid TurnerExperimentalDieselDiesel prices continue

  11. Continuous Digester Control Technology | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof"Wave theJuly 30, 2013 Sanyo: NoticeContinuing Progress

  12. Gasoline prices continue to increase (long version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014 Gasoline prices continue to

  13. Gasoline prices continue to increase (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014 Gasoline prices continue

  14. Gasoline prices continue to increase (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014 Gasoline prices continueGasoline

  15. Continuous Diagnostics Advisor | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia:PowerCER.png ElColumbia,2005)ConservationLSC HydrodynamicContinuous

  16. Device calibration impacts security of quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16T23:59:59.000Z

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  17. An experimental study of a six key handprint chord keyboard

    E-Print Network [OSTI]

    Wolstein, Sheldon Aaron

    1986-01-01T23:59:59.000Z

    er Dr. R. Quinn Brackett Head o Department Dr. Leland T. Blank May 1986 ABSTRACT An Exper1mental Study of a Six Key Handprlnt Chord Keyboard (May 1986) Sheldon Aaron Wolstein, B. S. , Texas ASM University Cha1r of Advisory Committee: Dr... PRACTICE ARTICLE UITA 7Z 7B IUU IUB 1U7 11U 111 LIST OF TABLES Page TABLE I Results of Typing Test: Means and Standard Deviations 25 TABLE 2 Means and Variances for Letter Sequence Times 28 TABLE 3 Analysis of Variance for Letter Sequence...

  18. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  19. Effects of color coding on keying time and errors

    E-Print Network [OSTI]

    Wooldridge, Brenda Gail

    1983-01-01T23:59:59.000Z

    were to determine the effects if any oi' color coding upon the error rate and location time of special func- tion keys on a computer keyboard. An ACT-YA CRT keyboard interfaced with a Kromemco microcomputer was used. There were 84 high schoool... to comnunicate with more and more computer-like devices. The most common computer/human interface is the terminal, consisting of a display screen, and keyboard. The format and layout on the display screen of computer-generated information is generally...

  20. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  1. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  2. DOE Announces More Key Administration Posts | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartmentConsumersDevelopmentDepartmentofKey

  3. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues

  4. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey

  5. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy- FORTechnology Key to

  6. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKey

  7. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,KeyTex

  8. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  9. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA Key

  10. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyA

  11. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAA

  12. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAAA

  13. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  14. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteriesmetal-organic frameworks |A photo ofMay 2015andKEY

  15. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to Preserving

  16. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to PreservingIron

  17. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental AssessmentsGeoffrey Campbell isOklahoma City, USA OklahomaTiratIs Key

  18. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) MappingOctober 12,U.S.U.S. DOEJoanKaye D. Lathrop,KevinKey

  19. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Nobel Laureate's

  20. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  1. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  2. Encryption Key Search using Java-based ALiCE Grid

    E-Print Network [OSTI]

    Virkar, Ameya

    Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

  3. $?$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Jameel-Un Nabi; Irgaziev Bakhadir

    2011-08-04T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model results. This study can prove useful for the core-collapse simulators.

  4. USF College of Marine Science Awarded $11M for Gulf Spill Research Selected as one of eight centers nationwide for continued studies of BP spill

    E-Print Network [OSTI]

    Meyers, Steven D.

    nationwide for continued studies of BP spill ST. PETERSBURG, Fla. (Aug. 25, 2011) ­ A research consortium led Horizon oil spill on the Gulf of Mexico's ocean and coastal ecosystems and to build a better ways Horizon spill on key marine ecosystem processes and species. The goals of the research project include

  5. Continuous austempering fluidized bed furnace. Final report

    SciTech Connect (OSTI)

    Srinivasan, M.N. [Lamar Univ., Beaumont, TX (United States). Dept. of Mechanical Engineering] [Lamar Univ., Beaumont, TX (United States). Dept. of Mechanical Engineering

    1997-09-23T23:59:59.000Z

    The intended objective of this project was to show the benefits of using a fluidized bed furnace for austenitizing and austempering of steel castings in a continuous manner. The division of responsibilities was as follows: (1) design of the fluidized bed furnace--Kemp Development Corporation; (2) fabrication of the fluidized bed furnace--Quality Electric Steel, Inc.; (3) procedure for austempering of steel castings, analysis of the results after austempering--Texas A and M University (Texas Engineering Experiment Station). The Department of Energy provided funding to Texas A and M University and Kemp Development Corporation. The responsibility of Quality Electric Steel was to fabricate the fluidized bed, make test castings and perform austempering of the steel castings in the fluidized bed, at their own expense. The project goals had to be reviewed several times due to financial constraints and technical difficulties encountered during the course of the project. The modifications made and the associated events are listed in chronological order.

  6. Rotary adsorbers for continuous bulk separations

    DOE Patents [OSTI]

    Baker, Frederick S. (Oak Ridge, TN)

    2011-11-08T23:59:59.000Z

    A rotary adsorber for continuous bulk separations is disclosed. The rotary adsorber includes an adsorption zone in fluid communication with an influent adsorption fluid stream, and a desorption zone in fluid communication with a desorption fluid stream. The fluid streams may be gas streams or liquid streams. The rotary adsorber includes one or more adsorption blocks including adsorbent structure(s). The adsorbent structure adsorbs the target species that is to be separated from the influent fluid stream. The apparatus includes a rotary wheel for moving each adsorption block through the adsorption zone and the desorption zone. A desorption circuit passes an electrical current through the adsorbent structure in the desorption zone to desorb the species from the adsorbent structure. The adsorbent structure may include porous activated carbon fibers aligned with their longitudinal axis essentially parallel to the flow direction of the desorption fluid stream. The adsorbent structure may be an inherently electrically-conductive honeycomb structure.

  7. Continuous Axion Photon Duality and its Consequences

    E-Print Network [OSTI]

    E. I. Guendelman

    2007-11-23T23:59:59.000Z

    The axion photon system in an external magnetic field, when for example considered with the geometry of the experiments exploring axion photon mixing, displays a continuous axion-photon duality symmetry in the limit the axion mass is neglected. The conservation law that follows from this symmetry is obtained. The magnetic field interaction is seen to be equivalent to first order to the interaction of a complex charged field with an external electric potential, where this ficticious "electric potential" is proportional to the external magnetic field. This allows to solve for the scattering amplitudes using already known scalar QED results. It is argued that in more generic conditions (not just related to these experiments) axion-photon condensation could be obtained for high magnetic fields. Finally an exact constraint originating fromthe current conservation on the amplitudes of reflected and transmited waves is obtained.

  8. Nuclear winter: the continuing debate. Student essay

    SciTech Connect (OSTI)

    Nida, A.V.

    1987-03-23T23:59:59.000Z

    This essay examines the debate over the climatic consequences of global nuclear war as related in the so-called Nuclear Winter hypothesis. This review examines the major components of the theory and traces development of the scientific knowledge leading to a second phase of the controversy two years after the first hypothesis. The conclusions of the essay are that the original nuclear winter findings have been altered by later scientific study and, therefore, the political conclusions drawn by Carl Sagan in 1983 can no longer be supported by theory or facts. Continued use of the Crutzen-Birks (Ambio, 1982) and TTAPS (Science, December 1983) studies worst-case evidence from NCAR (Foreign Affairs, Summer 86) represents selective science. Arguing for strategic policy changes based on nuclear winter risks constitutes anti-nuclear rhetoric and not scientific reasoning.

  9. Continuous variable entanglement dynamics in structured reservoirs

    E-Print Network [OSTI]

    R. Vasile; S. Olivares; M. G. A. Paris; S. Maniscalco

    2009-10-13T23:59:59.000Z

    We address the evolution of entanglement in bimodal continuous variable quantum systems interacting with two independent structured reservoirs. We derive an analytic expression for the entanglement of formation without performing the Markov and the secular approximations and study in details the entanglement dynamics for various types of structured reservoirs and for different reservoir temperatures, assuming the two modes initially excited in a twin-beam state. Our analytic solution allows us to identify three dynamical regimes characterized by different behaviors of the entanglement: the entanglement sudden death, the non-Markovian revival and the non-secular revival regimes. Remarkably, we find that, contrarily to the Markovian case, the short-time system-reservoir correlations in some cases destroy quickly the initial entanglement even at zero temperature.

  10. Prekmurje Agricultural Terminology in the Dolinsko Region

    E-Print Network [OSTI]

    Koletnik, Mihaela

    2010-01-01T23:59:59.000Z

    is used for binding the cart wheels. [ ? MHG. lanne] lesen || li?säni? -a -u adj. the attribute of wood, wooden ? razsohe lucerna || lu?cärna -ä f lucerne/alfalfa (Medicago sati- va): Lu?cärna jä ?r?di:??a pa ?ma: ?du:u?gä c?ve:i?tä. – Lucerne is red...

  11. Buildings Performance Metrics Terminology | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof Energy FutureDepartment of EnergyRolandBuilding

  12. Glossary of water terminology | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, search OpenEI Reference LibraryAddInformationEnergyEnergyGWECC

  13. NEPA Terminology | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTubahq.na.govSecurityMaintaining theSan Jose-San|

  14. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  15. The key to minimizing minesite versus utility laboratory analyses on Powder River Basin coals

    SciTech Connect (OSTI)

    Rexin, M.G.

    1995-08-01T23:59:59.000Z

    Powder River Basin (PRB) coals are continuing to expand their areas of use into regions previously reserved for higher ranked coals. PRB coals are subbituminous by rank. Inherent moisture values of 25 to 30 percent are the norm. PRB coals, being lower rank in nature, also tend to oxidize very easily. These factors combined produce a coal which can cause analysis problems for laboratories unaccustomed to PRB coals. In fact, even laboratories that deal with this type of coal on a daily basis can experience analytical difficulties. Special care needs to be taken by both minesite laboratory and the utility laboratory to ensure accurate analyses. Cooperation between both parties is the key to reproducible analyses. Only by working together can parties fully analyze the situation and develop analytical methods acceptable to both. This paper will describe the methods employed by the Caballo Rojo Mine (CRM) and the Georgia Power Company (GPC) to resolve laboratory analysis differences found during shipments by CRM to GPC beginning in 1994. The following topics are discussed: initial comparative results, analytical investigations, the cooperative process, recent comparative results, and conclusions.

  16. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19T23:59:59.000Z

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  17. Key Science Observations of AGNs with KaVA Array

    E-Print Network [OSTI]

    Kino, Motoki; Zhao, Guang-Yao; Sohn, Bong Won

    2015-01-01T23:59:59.000Z

    KaVA (KVN and VERA Array) is a new combined VLBI array with KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). First, we briefly review the imaging capabilities of KaVA array which actually achieves more than three times better dynamic range than that achieved by VERA alone. The KaVA images clearly show detailed structures of extended radio jets in AGNs. Next, we represent the key science program to be led by KaVA AGN sub working group. We will conduct the monitoring observations of Sgr A* and M87 because of the largeness of their central super-massive black hole angular sizes. The main science goals of the program are (i) testing magnetically-driven-jet paradigm by mapping velocity fields of the M87 jet, and (ii) obtaining tight constraints on physical properties of radio emitting region in Sgr A*.

  18. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  19. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  20. Y-12 and the National Nuclear Security Administration make continuing...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Y-12 and the National Nuclear Security Administration make continuing progress As we continue to look at Y-12's vision for a bright and diverse future, a closer look at the joint...

  1. An artists' community in the Back Bay : continuity and change

    E-Print Network [OSTI]

    Duckham, Kenton Leland

    1988-01-01T23:59:59.000Z

    This thesis is a study of the relationship between continuity and change. It's premise is the idea that architecture can be receptive to the need for growth and change while still being rooted to the continuity of its ...

  2. DOE Issues Request for Information on Fuel Cells for Continuous...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fuel Cells for Continuous On-Board Recharging for Battery Electric Light-Duty Vehicles DOE Issues Request for Information on Fuel Cells for Continuous On-Board Recharging for...

  3. Planning in partially-observable switching-mode continuous domains

    E-Print Network [OSTI]

    Brunskill, Emma

    Continuous-state POMDPs provide a natural representation for a variety of tasks, including many in robotics. However, most existing parametric continuous-state POMDP approaches are limited by their reliance on a single ...

  4. MODELING AND CONTROL OF A CONTINUOUS BIOREACTOR WITH CROSSFLOW FILTRATION

    E-Print Network [OSTI]

    Skogestad, Sigurd

    MODELING AND CONTROL OF A CONTINUOUS BIOREACTOR WITH CROSS­FLOW FILTRATION Ying Zhao and Sigurd on an industrial application of a continuous bioreactor with cross­flow filtration. In this paper the general study the possibility of partial control of this bioreactor. keywords: Continuous bioreactor

  5. BUSINESS CONTINUITY The University of Texas at Austiniv

    E-Print Network [OSTI]

    Johnston, Daniel

    Plan Annex 2014 BUSINESS CONTINUITY VIII #12;#12;#12;The University of Texas at Austiniv #12;Business Continuity Plan Annex v Acknowledgement The University of Texas at Austin Business Continuity Plan Annex has been developed from the Federal Financial Institutions Examination Council (FFIEC) Business

  6. Analyzing Business Continuity through a Multi-Layers Model

    E-Print Network [OSTI]

    Analyzing Business Continuity through a Multi-Layers Model Yudistira Asnar and Paolo Giorgini.asnar,paolo.giorgini}@disi.unitn.it Abstract. Business Continuity Management (BCM) is a process to manage risks, emergencies, and recovery plans of an organization during a crisis. It results in a document called Business Continuity Plans (BCP

  7. Continuous Non-Invasive Blood-Pressure Measurements

    E-Print Network [OSTI]

    Campbell, Sarah J.

    Continuous Non-Invasive Blood-Pressure Measurements Tony Birch Chris Breward Sarah Campbell Igor, September 2007 Tony Birch et. al. Continuous Non-Invasive Blood-Pressure Measurements #12;Overview: Finapres. al. Continuous Non-Invasive Blood-Pressure Measurements #12;The Problem Under normal resting

  8. Continuous Time Group Discovery in Dynamic Graphs

    SciTech Connect (OSTI)

    Miller, K; Eliassi-Rad, T

    2010-11-04T23:59:59.000Z

    With the rise in availability and importance of graphs and networks, it has become increasingly important to have good models to describe their behavior. While much work has focused on modeling static graphs, we focus on group discovery in dynamic graphs. We adapt a dynamic extension of Latent Dirichlet Allocation to this task and demonstrate good performance on two datasets. Modeling relational data has become increasingly important in recent years. Much work has focused on static graphs - that is fixed graphs at a single point in time. Here we focus on the problem of modeling dynamic (i.e. time-evolving) graphs. We propose a scalable Bayesian approach for community discovery in dynamic graphs. Our approach is based on extensions of Latent Dirichlet Allocation (LDA). LDA is a latent variable model for topic modeling in text corpora. It was extended to deal with topic changes in discrete time and later in continuous time. These models were referred to as the discrete Dynamic Topic Model (dDTM) and the continuous Dynamic Topic Model (cDTM), respectively. When adapting these models to graphs, we take our inspiration from LDA-G and SSN-LDA, applications of LDA to static graphs that have been shown to effectively factor out community structure to explain link patterns in graphs. In this paper, we demonstrate how to adapt and apply the cDTM to the task of finding communities in dynamic networks. We use link prediction to measure the quality of the discovered community structure and apply it to two different relational datasets - DBLP author-keyword and CAIDA autonomous systems relationships. We also discuss a parallel implementation of this approach using Hadoop. In Section 2, we review LDA and LDA-G. In Section 3, we review the cDTM and introduce cDTMG, its adaptation to modeling dynamic graphs. We discuss inference for the cDTM-G and details of our parallel implementation in Section 4 and present its performance on two datasets in Section 5 before concluding in Section 6.

  9. Continuous chain bit with downhole cycling capability

    DOE Patents [OSTI]

    Ritter, Don F. (Albuquerque, NM); St. Clair, Jack A. (Albuquerque, NM); Togami, Henry K. (Albuquerque, NM)

    1983-01-01T23:59:59.000Z

    A continuous chain bit for hard rock drilling is capable of downhole cycling. A drill head assembly moves axially relative to a support body while the chain on the head assembly is held in position so that the bodily movement of the chain cycles the chain to present new composite links for drilling. A pair of spring fingers on opposite sides of the chain hold the chain against movement. The chain is held in tension by a spring-biased tensioning bar. A head at the working end of the chain supports the working links. The chain is centered by a reversing pawl and piston actuated by the pressure of the drilling mud. Detent pins lock the head assembly with respect to the support body and are also operated by the drilling mud pressure. A restricted nozzle with a divergent outlet sprays drilling mud into the cavity to remove debris. Indication of the centered position of the chain is provided by noting a low pressure reading indicating proper alignment of drilling mud slots on the links with the corresponding feed branches.

  10. Protective sheath for a continuous measurement thermocouple

    DOE Patents [OSTI]

    Phillippi, R.M.

    1991-12-03T23:59:59.000Z

    Disclosed is a protective thermocouple sheath of a magnesia graphite refractory material for use in continuous temperature measurements of molten metal in a metallurgical ladle and having a basic slag layer thereon. The sheath includes an elongated torpedo-shaped sheath body formed of a refractory composition and having an interior borehole extending axially therethrough and adapted to receive a thermocouple. The sheath body includes a lower end which is closed about the borehole and forms a narrow, tapered tip. The sheath body also includes a first body portion integral with the tapered tip and having a relatively constant cross section and providing a thin wall around the borehole. The sheath body also includes a second body portion having a relatively constant cross section larger than the cross section of the first body portion and providing a thicker wall around the borehole. The borehole terminates in an open end at the second body portion. The tapered tip is adapted to penetrate the slag layer and the thicker second body portion and its magnesia constituent material are adapted to withstand chemical attack thereon from the slag layer. The graphite constituent improves thermal conductivity of the refractory material and, thus, enhances the thermal responsiveness of the device. 4 figures.

  11. Protective sheath for a continuous measurement thermocouple

    DOE Patents [OSTI]

    Phillippi, R. Michael (Highland, MD)

    1991-01-01T23:59:59.000Z

    Disclosed is a protective thermocouple sheath of a magnesia graphite refractory material for use in continuous temperature measurements of molten metal in a metallurgical ladle and having a basic slag layer thereon. The sheath includes an elongated torpedo-shaped sheath body formed of a refractory composition and having an interior borehole extending axially therethrough and adapted to receive a thermocouple. The sheath body includes a lower end which is closed about the borehole and forms a narrow, tapered tip. The sheath body also includes a first body portion integral with the tapered tip and having a relatively constant cross section and providing a thin wall around the borehole. The sheath body also includes a second body portion having a relatively constant cross section larger than the cross section of the first body portion and providing a thicker wall around the borehole. The borehole terminates in an open end at the second body portion. The tapered tip is adapted to penetrate the slag layer and the thicker second body portion and its magnesia constituent material are adapted to withstand chemical attack thereon from the slag layer. The graphite constituent improves thermal conductivity of the refractory material and, thus, enhances the thermal responsiveness of the device.

  12. Continuous Air Monitor Operating Experience Review

    SciTech Connect (OSTI)

    L. C. Cadwallader; S. A. Bruyere

    2008-09-01T23:59:59.000Z

    Continuous air monitors (CAMs) are used to sense radioactive particulates in room air of nuclear facilities. CAMs alert personnel of potential inhalation exposures to radionuclides and can also actuate room ventilation isolation for public and environmental protection. This paper presents the results of a CAM operating experience review of the DOE Occurrence Reporting and Processing System (ORPS) database from the past 18 years. Regulations regarding these monitors are briefly reviewed. CAM location selection and operation are briefly discussed. Operating experiences reported by the U.S. Department of Energy and in other literature sources were reviewed to determine the strengths and weaknesses of these monitors. Power losses, human errors, and mechanical issues cause the majority of failures. The average “all modes” failure rate is 2.65E-05/hr. Repair time estimates vary from an average repair time of 9 hours (with spare parts on hand) to 252 hours (without spare parts on hand). These data should support the use of CAMs in any nuclear facility, including the National Ignition Facility and the international ITER experiment.

  13. Los Alamos Explosives Performance Key to Stockpile Stewardship

    ScienceCinema (OSTI)

    Dattelbaum, Dana

    2015-01-05T23:59:59.000Z

    As the U.S. Nuclear Deterrent ages, one essential factor in making sure that the weapons will continue to perform as designed is understanding the fundamental properties of the high explosives that are part of a nuclear weapons system. As nuclear weapons go through life extension programs, some changes may be advantageous, particularly through the addition of what are known as "insensitive" high explosives that are much less likely to accidentally detonate than the already very safe "conventional" high explosives that are used in most weapons. At Los Alamos National Laboratory explosives research includes a wide variety of both large- and small-scale experiments that include small contained detonations, gas and powder gun firings, larger outdoor detonations, large-scale hydrodynamic tests, and at the Nevada Nuclear Security Site, underground sub-critical experiments.

  14. Introduction Flattening the Earth Continuation procedure Flat Earth Numerical simulations Continuation from a flat to a round Earth model

    E-Print Network [OSTI]

    Boyer, Edmond

    Introduction Flattening the Earth Continuation procedure Flat Earth Numerical simulations Continuation from a flat to a round Earth model in the coplanar orbit transfer problem M. Cerf1, T. Haberkorn, SADCO 2011, March 2nd M. Cerf, T. Haberkorn, E. Tr´elat Continuation from a flat to a round Earth model

  15. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  16. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  17. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    at zero and increase to $47 per ton of CO2 emissions by 2030. Higher electricity prices reduce demandSixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions Summary of Key................................................................ 10 Wholesale Electricity Prices

  18. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  19. Direct and Reverse Secret-Key Capacities of a Quantum Channel

    E-Print Network [OSTI]

    Braunstein, Samuel L.

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

  20. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01T23:59:59.000Z

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  1. Flora &Taxonomy (3100:342). Fall 2008 Lecture T TH 1:10-2:00, Lab Th 2-3:30, Room G01 ASEC.

    E-Print Network [OSTI]

    Mitchell, Randall J.

    Special dates Topic Reading 8/26 Introduction, Collecting Chp 1 (skim), Chp 6 (skim), Chp 17 9/2 Reproductive terminology; Keys & Keying Chp 6, Chp 9 (pg 364- 389), Chp 15 9/9 Vegetative Terminology Chp 9 (pg 347-364) 9/16 More Terminology 9/23 Nomenclature / Classification Chp 16 9/30 Exam Tues Classification

  2. Origin of a complex key innovation in an obligate insectplant mutualism

    E-Print Network [OSTI]

    Krenn, Harald W.

    Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

  3. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-Print Network [OSTI]

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  4. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  5. Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser

    E-Print Network [OSTI]

    Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

  6. On the security of some password-based key agreement schemes

    E-Print Network [OSTI]

    on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19

  7. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  8. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770­2 [7] is vulnerable to a replay attack and also

  9. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks

    E-Print Network [OSTI]

    Hu, Jiankun

    A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Kejie propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous, the wireless sensor network can achieve higher key connectivity and higher resilience. I. INTRODUCTION Wireless

  10. Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates

    E-Print Network [OSTI]

    Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat the environmental correlates exert of the realized fitness of a species (Johnson and O'Neil 2001). They include

  11. Evaluation of the effects of a highway improvement project on Key deer

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30T23:59:59.000Z

    assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

  12. A Remark on Secret-Key Generation over Correlated Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    A Remark on Secret-Key Generation over Correlated Fading Channels Ashish Khisti ECE Dept. Univ@ee.ucla.edu Abstract-- We study secret-key agreement with public discussion over a flat-fading wiretap channel model. INTRODUCTION In recent years there has been a significant interest in developing secret-key agreement protocols

  13. Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion Ashish Khisti Member, IEEE Abstract Fundamental limits of secret-key generation over a two-way, reciprocal and block establish upper and lower bounds on the secret-key generation capacity with public discussion. The upper

  14. Secret-key Agreement with Channel State Information at the Transmitter

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-key Agreement with Channel State Information at the Transmitter Ashish Khisti, Member of secret-key agreement over a wiretap channel with state parameters. The transmitter com- municates discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound

  15. Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach Ashish: akhisti@comm.utoronto.ca Abstract--Fundamental limits of secret-key agreement over reciprocal wireless source generation. The resulting secret-key involves contributions of both channel sequences and source

  16. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number

  17. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  18. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  19. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    SciTech Connect (OSTI)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01T23:59:59.000Z

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  20. Apparatus and methods for continuous beam fourier transform mass spectrometry

    DOE Patents [OSTI]

    McLuckey, Scott A. (Oak Ridge, TN); Goeringer, Douglas E. (Oak Ridge, TN)

    2002-01-01T23:59:59.000Z

    A continuous beam Fourier transform mass spectrometer in which a sample of ions to be analyzed is trapped in a trapping field, and the ions in the range of the mass-to-charge ratios to be analyzed are excited at their characteristic frequencies of motion by a continuous excitation signal. The excited ions in resonant motions generate real or image currents continuously which can be detected and processed to provide a mass spectrum.

  1. Continuous-time quantum walks on star graphs

    SciTech Connect (OSTI)

    Salimi, S. [Department of Physics, University of Kurdistan, P.O. Box 66177-15175, Sanandaj (Iran, Islamic Republic of)], E-mail: shsalimi@uok.ac.ir

    2009-06-15T23:59:59.000Z

    In this paper, we investigate continuous-time quantum walk on star graphs. It is shown that quantum central limit theorem for a continuous-time quantum walk on star graphs for N-fold star power graph, which are invariant under the quantum component of adjacency matrix, converges to continuous-time quantum walk on K{sub 2} graphs (complete graph with two vertices) and the probability of observing walk tends to the uniform distribution.

  2. MASe UCRL-15037 CONTINUOUSLY VARIABLE TRANSMISSIONS: THEORY AND...

    Office of Scientific and Technical Information (OSTI)

    transmission when operating in the power recirculation mode 20 Simple manual system to control the speed ratio of a variable V-belt continuously variable transmission 21 Schematic...

  3. Dairy Outreach Program Training and Continuing Education Program

    E-Print Network [OSTI]

    Mukhtar, Saqib

    1999-10-30T23:59:59.000Z

    This publication describes the training and continuing education required for those who own or operate concentrated animal feeding operations in Texas....

  4. Air Pollution Control Regulations: No. 6 - Continuous Emissions...

    Broader source: Energy.gov (indexed) [DOE]

    Management Stationary sources, including fossil fuel fired steam or hot water generating units, may be required to install and operate a continuous emissions monitoring system...

  5. Los Alamos' continued commitment to our friends, partners and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Personal message Community Connections: Your link to news and opportunities from Los Alamos National Laboratory Latest Issue: May 2015 All Issues submit Los Alamos' continued...

  6. Policy Flash 2014-04 Continuing Appropriations Act, 2014 -- Congressio...

    Office of Environmental Management (EM)

    2014 -- Congressional Notification of Pending Contract or Financial Assistance Actions Policy Flash 2014-04 Continuing Appropriations Act, 2014 -- Congressional Notification of...

  7. NNSA Small Business Week 2012: Pantex continues to excel with...

    National Nuclear Security Administration (NNSA)

    like hers. CTG started in 1981 selling electronics components. As the personal computer revolution took over, the business continued to grow. It now employs about 16 people...

  8. (U) modulator to provide a continuous stepped frequency signal format

    DOE Patents [OSTI]

    Walters, Glenn A. (Escondido, CA)

    1991-01-01T23:59:59.000Z

    A modulator provides a continuous signal format composed of discrete freqcy steps and is designed to eliminate frequency overlap or smearing normally associated with filter ringing.

  9. Continued on page 5 IN AN ERA OF SUSTAINABILITY.........................................2

    E-Print Network [OSTI]

    Carter, John

    Continued on page 5 CONTENTS: IN AN ERA OF SUSTAINABILITY.........................................2 PRACTICAL SOLUTIONS FOR A SUSTAINABLE FUTURE....3 STAFF CHANGES .................................................................5 A LEGACY OF SUSTAINED FRIENDSHIPS ...........................6 KUDOS

  10. Microfluidic systems for continuous crystallization of small organic molecules

    E-Print Network [OSTI]

    Sultana, Mahmooda

    2010-01-01T23:59:59.000Z

    This thesis presents one of the first demonstrations of continuous crystallization in microfluidic devices, and illustrates their use for various applications related to crystallization of small organic molecules. ...

  11. Superior Energy Performance: A Roadmap for Achieving Continual...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performance: A Roadmap for Achieving Continual Improvements in Energy Performance March 4, 2010 Joe Almaguer Dow Chemical Paul Scheihing U.S. Department of Energy Agenda: *...

  12. Municipal Bond - Power Purchase Agreement Model Continues to...

    Broader source: Energy.gov (indexed) [DOE]

    for power purchase agreement model to provide low-cost solar energy. Author: National Renewable Energy Laboratory Municipal Bond - Power Purchase Agreement Model Continues to...

  13. Feebates: A Legislative Option to Encourage Continuous Improvements...

    Open Energy Info (EERE)

    Feebates: A Legislative Option to Encourage Continuous Improvements to Automobile Efficiency Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Feebates: A Legislative...

  14. Optimization Online - A cone-continuity constraint qualification and ...

    E-Print Network [OSTI]

    Roberto Andreani

    2015-02-13T23:59:59.000Z

    Feb 13, 2015 ... A cone-continuity constraint qualification and algorithmic consequences. Roberto Andreani(andreani ***at*** ime.unicamp.br) Jose Mario ...

  15. Continuous multi-phase feeding of broiler chickens

    E-Print Network [OSTI]

    Nasril

    2005-02-17T23:59:59.000Z

    , continuous multi-phase feeding of broiler chickens using corn-soy diets does not appear to be justified by either increased performance or reduced nitrogen excretion....

  16. Continual Learning Program/Individual Training Plans- No Excuses

    Broader source: Energy.gov [DOE]

    The Continual Learning Program (CLP) currently has 4 workshops that focus on employee development. The Individual Development Plan (IDP) is one of the resources discussed in the workshops.

  17. Piezotube Borehole Seismic Source for Continuous Crosswell Monitoring...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Piezotube Borehole Seismic Source for Continuous Crosswell Monitoring Lawrence Berkeley National Laboratory Contact LBL About This Technology (a) Peizotube source, as deployed...

  18. Lowest-rank Solutions of Continuous and Discrete Lyapunov ...

    E-Print Network [OSTI]

    Ziyan Luo

    2012-10-09T23:59:59.000Z

    Oct 9, 2012 ... Abstract: The low-rank solutions of continuous and discrete Lyapunov equations are of great importance but generally difficult to achieve in ...

  19. Tight bounds on the eavesdropping of a continuous-variable quantum cryptographic protocol with no basis switching

    SciTech Connect (OSTI)

    Sudjana, J.; Magnin, L.; Garcia-Patron, R.; Cerf, N. J. [QuIC, Ecole Polytechnique, CP 165, Universite Libre de Bruxelles, 1050 Brussels (Belgium)

    2007-11-15T23:59:59.000Z

    The Gaussian continuous-variable quantum key distribution protocol based on coherent states and heterodyne detection [Phys. Rev. Lett. 93, 170504 (2004)] has the advantage that no active random basis switching is needed on the receiver's side. Its security is, however, not very satisfyingly understood today because the bounds on the secret key rate that have been derived from Heisenberg relations are not attained by any known scheme. Here, we address the problem of the optimal Gaussian individual attack against this protocol, and derive tight upper bounds on the information accessible to an eavesdropper. Interestingly, this protocol is proven to be even more resistant to individual attacks than originally thought. Optical schemes achieving these bounds are also exhibited, which concludes the security analysis of Gaussian protocols against individual attacks.

  20. Saga of Glass Damage in Urban Environments Continues

    E-Print Network [OSTI]

    Kareem, Ahsan

    Saga of Glass Damage in Urban Environments Continues: Consequences of Aerodynamics and Debris Laboratory University of Notre Dame The Saga of Glass Damage in Urban Environments Continues: Consequences east of the city of Houston. Initial reconnaissance suggested that the observed glass/cladding damage