National Library of Energy BETA

Sample records for key terms definition

  1. Key Terms | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | International NuclearKaren AtkinsonAbout the FuelKey

  2. ACKNOWLEDGEMENTS ..................................................................................4 DEFINITIONS OF KEY TERMS .........................................................................6

    E-Print Network [OSTI]

    Escher, Christine

    ) means the chemical compound containing one atom of carbon and two atoms of oxygen. (2) "Carbon dioxide) "Global Warming Potential factor" (GWP) means the radiative forcing impact of one mass-based unit. For instance, methane (CH4) has a GWP of 23, meaning that every gram of methane will trap 23 times as much

  3. Industry Terms and Definitions | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History View NewGuam:on Openei |sourceAnd CentralWorld BankTerms and Definitions

  4. Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships Mohammad, ymu}@uow.edu.au Abstract. In this paper, we revisit security notions for dedicated-key hash functions notions for dedicated-key hash functions. The provision of this set of enhanced properties has been

  5. DEFINITION, PERFORMANCE GOALS AND KEY FINDINGS Photo Source: UBC Public Affairs

    E-Print Network [OSTI]

    passionate for sustainability. Performance Goals & Key Indicators for the University The following are ourDEFINITION, PERFORMANCE GOALS AND KEY FINDINGS Photo Source: UBC Public Affairs GEOGRAPHY 446 and implementing social sustainability at the University of British Columbia University of British Columbia

  6. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Wayne Moe

    2013-05-01

    This document provides key definitions, plant capabilities, and inputs and assumptions related to the Next Generation Nuclear Plant to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor. These definitions, capabilities, and assumptions were extracted from a number of NGNP Project sources such as licensing related white papers, previously issued requirement documents, and preapplication interactions with the Nuclear Regulatory Commission (NRC).

  7. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Phillip Mills

    2012-02-01

    This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

  8. Appendix C: Terms and Definitions The terms and their definition has been done in cooperation with Alla Mo

    E-Print Network [OSTI]

    . Architecture includes also rules for govering system life cycle. An architecture has an architectural with Alla Mo­ rozova during her work on the master thesis project. The following contains terms . Agent is a specialization of an actor . Architecture is a conceptual abstraction of a system reflecting

  9. MeSH key terms for validation and annotation of gene expression clusters

    SciTech Connect (OSTI)

    Rechtsteiner, A. (Andreas); Rocha, L. M. (Luis Mateus)

    2004-01-01

    Integration of different sources of information is a great challenge for the analysis of gene expression data, and for the field of Functional Genomics in general. As the availability of numerical data from high-throughput methods increases, so does the need for technologies that assist in the validation and evaluation of the biological significance of results extracted from these data. In mRNA assaying with microarrays, for example, numerical analysis often attempts to identify clusters of co-expressed genes. The important task to find the biological significance of the results and validate them has so far mostly fallen to the biological expert who had to perform this task manually. One of the most promising avenues to develop automated and integrative technology for such tasks lies in the application of modern Information Retrieval (IR) and Knowledge Management (KM) algorithms to databases with biomedical publications and data. Examples of databases available for the field are bibliographic databases c ntaining scientific publications (e.g. MEDLINE/PUBMED), databases containing sequence data (e.g. GenBank) and databases of semantic annotations (e.g. the Gene Ontology Consortium and Medical Subject Headings (MeSH)). We present here an approach that uses the MeSH terms and their concept hierarchies to validate and obtain functional information for gene expression clusters. The controlled and hierarchical MeSH vocabulary is used by the National Library of Medicine (NLM) to index all the articles cited in MEDLINE. Such indexing with a controlled vocabulary eliminates some of the ambiguity due to polysemy (terms that have multiple meanings) and synonymy (multiple terms have similar meaning) that would be encountered if terms would be extracted directly from the articles due to differing article contexts or author preferences and background. Further, the hierarchical organization of the MeSH terms can illustrate the conceptuallfunctional relationships of genes associated with MeSH terms. MeSH terms can be associated with genes through co-occurrence of these in MEDLINE citations, i.e. the genes occur in titles or abstracts and the MeSH terms are assigned by experts. To identify MeSH terms associated with a group of genes we used the tool MESHGENE developed at the Information Dynamics Lab at HP Labs (http://www-idl.hpl.hp.com/meshgene/). When presented with a list of human genes, MESHGENE uses some sophisticated techniques to search for these gene symbols in the titles and abstracts of all MEDLINE citations. MeSH terms and the number of co-occurrences can be retrieved. Gene symbols that are aliases of each other are pooled from several databases. This addresses the problem of synonymy, the fact that several symbols can refer to the same gene. MESHGENE employs some sophisticated algorithms that disregards symbols that are likely to be acronyms for other concepts than a gene. This addresses the problem of polysemy, i.e. possible multiple meanings of a gene symbol. We applied our approach to gene expression data from herpes virus infected human fibroblast cells. The data contains 12 time-points, between 1/2 hrs and 48 hrs after infection. Singular Value Decomposition was used to identify the dominant modes of expression. 75% of the variance in the expression data was captured by the first two modes, the first exhibiting a monotonly increasing expression pattern and the second a more transient pattern. Projection of the gene expression vectors onto this first two modes identified 3 statistically significant clusters of co-expressed genes. 500 genes from cluster 1 and 300 genes from clusters 2 and 3 each were uploaded to MESHGENE and the MeSH terms and co-occurrence values were retrieved. MeSH terms were also obtained for 5 groups of randomly selected genes with similar numbers of genes. The log was taken of the co-occurrence values and for each MeSH term these log co-occurrence values were summed for each group over the genes in that group. A matrix with 8 columns for the 8 groups of genes and with 14,000 rows with the MeSH terms

  10. Definitions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HAB Packet HanfordDOEDanielDe novo Design ofDefects Lead to|DefinitionA

  11. Definitions This appendix defines the following terms for the purposes of this manual.

    E-Print Network [OSTI]

    US Army Corps of Engineers

    /Acceptable: a term denoting when a written procedure, practice, method, program, engineering design, or employee qualification criteria submittal, which, after a cursory review by a GDA, is determined to generally conform to safety and health or contractual requirements. Acceptance or acceptability of such submittals in no way

  12. VISA DEEMED EXPORT QUESTIONNAIRE -Background Information and Key Definitions First-time users: Please do not complete the Visa Deemed Export Questionnaire until you have read the following material.

    E-Print Network [OSTI]

    Bordenstein, Seth

    VISA DEEMED EXPORT QUESTIONNAIRE - Background Information and Key Definitions First-time users: Please do not complete the Visa Deemed Export Questionnaire until you have read the following material. Repeat users of the Visa Deemed Export Questionnaire: Continue to Page 3 Introduction: The revised Form I

  13. Definition of Total Energy budget equation in terms of moist-air Enthalpy surface flux

    E-Print Network [OSTI]

    Marquet, Pascal

    2015-01-01

    Uncertainty exists concerning the proper formulation of surface heat fluxes, namely the sum of "sensible" and "latent" heat fluxes, and in fact concerning these two fluxes if they are considered as separate fluxes. In fact, eddy flux of moist-air energy must be defined as the eddy transfer of moist-air specific enthalpy ($\\overline{w' h'}$), where the specific enthalpy ($h$) is equal to the internal energy of moist air plus the pressure divided by the density (namely $h = e_{\\rm int} + p/\\rho$). The fundamental issue is to compute this local (specific) moist-air enthalpy ($h$), and in particular to determine absolute reference value of enthalpies for dry air and water vapour $(h_d)_{\\rm ref}$ and $(h_v)_{\\rm ref}$. New results shown in Marquet (QJRMS 2015, arXiv:1401.3125) are based on the Third-law of Thermodynamics and can allow these computations. In this note, this approach is taken to show that Third-law based values of moist-air enthalpy fluxes is the sum of two terms. These two terms are similar to wha...

  14. SECTION SEVEN DEFINITION OF TERMS Additional Subject Group of related modules within an academic discipline which is taken in addition to

    E-Print Network [OSTI]

    Davies, Christopher

    SECTION SEVEN DEFINITION OF TERMS Additional Subject Group of related modules within an academic(s). Single / Double / Triple module Unit of study with a value of 10/20/30 credits. Subject Group of related modules within one academic discipline. Timetable Group Groups within which a module's teaching and other

  15. Quantification of key long-term risks at CO? sequestration sites: Latest results from US DOE's National Risk Assessment Partnership (NRAP) Project

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Pawar, Rajesh; Bromhal, Grant; Carroll, Susan; Chu, Shaoping; Dilmore, Robert; Gastelum, Jason; Oldenburg, Curt; Stauffer, Philip; Zhang, Yingqi; Guthrie, George

    2014-12-31

    Risk assessment for geologic CO? storage including quantification of risks is an area of active investigation. The National Risk Assessment Partnership (NRAP) is a US-Department of Energy (US-DOE) effort focused on developing a defensible, science-based methodology and platform for quantifying risk profiles at geologic CO? sequestration sites. NRAP has been developing a methodology that centers round development of an integrated assessment model (IAM) using system modeling approach to quantify risks and risk profiles. The IAM has been used to calculate risk profiles with a few key potential impacts due to potential CO? and brine leakage. The simulation results are alsomore »used to determine long-term storage security relationships and compare the long-term storage effectiveness to IPCC storage permanence goal. Additionally, we also demonstrate application of IAM for uncertainty quantification in order to determine parameters to which the uncertainty in model results is most sensitive.« less

  16. Quantification of key long-term risks at CO? sequestration sites: Latest results from US DOE's National Risk Assessment Partnership (NRAP) Project

    SciTech Connect (OSTI)

    Pawar, Rajesh; Bromhal, Grant; Carroll, Susan; Chu, Shaoping; Dilmore, Robert; Gastelum, Jason; Oldenburg, Curt; Stauffer, Philip; Zhang, Yingqi; Guthrie, George

    2014-12-31

    Risk assessment for geologic CO? storage including quantification of risks is an area of active investigation. The National Risk Assessment Partnership (NRAP) is a US-Department of Energy (US-DOE) effort focused on developing a defensible, science-based methodology and platform for quantifying risk profiles at geologic CO? sequestration sites. NRAP has been developing a methodology that centers round development of an integrated assessment model (IAM) using system modeling approach to quantify risks and risk profiles. The IAM has been used to calculate risk profiles with a few key potential impacts due to potential CO? and brine leakage. The simulation results are also used to determine long-term storage security relationships and compare the long-term storage effectiveness to IPCC storage permanence goal. Additionally, we also demonstrate application of IAM for uncertainty quantification in order to determine parameters to which the uncertainty in model results is most sensitive.

  17. Key Terms | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice| Department of EnergyDepartmentDepartment

  18. Definitions of Marketing Terms 

    E-Print Network [OSTI]

    McCorkle, Dean; Dhuyvetter, Kevin C.

    2008-12-05

    . Futures Market Carry spread ? when the nearby futures month is trading at a lower price than a distant futures contract. Carrying charge ? a futures market condi- tion in which distant futures contracts are trad- ing at successively higher levels than... nearby contracts and above cash price offers. Carry- ing charges often indicate a surplus situation. A ?full carrying charge? refers to a carrying charge high enough to fully cover storage and other associated ownership costs. Certifi ed stocks...

  19. Energy Intensity Indicators: Terminology and Definitions

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Energy Intensity Indicators website uses the following terms with their associated definitions. The terms related to various definitions of energy are discussed first.

  20. Key Reference Agilent Technologies

    E-Print Network [OSTI]

    Anlage, Steven

    is provided "as is", and is subject to being changed, without notice, in future editions. Further with the User and should any of the contract terms conflict with these terms, the contract terms shall control enables you to define the number of points in a step sweep. When you press this key, the current value

  1. SEC. 203. TRIBAL PARTNERSHIP PROGRAM. (a) DEFINITION OF INDIAN TRIBE.--In this section, the term ``Indian tribe'' has the

    E-Print Network [OSTI]

    US Army Corps of Engineers

    ``Indian tribe'' has the meaning given the term in section 4 of the Indian Self-Determination and Education and the heads of other Federal agencies, the Secretary may study and determine the feasibility of carrying out) are located primarily within Indian country (as defined in section 1151 of title 18, United States Code

  2. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0 Year-1Plant Processing Definitions Key Terms Definition Extraction

  3. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0 Year-1Plant Processing Definitions Key Terms Definition

  4. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0 Year-1Plant Processing Definitions Key Terms DefinitionSupplemental

  5. KEY PERSONNEL

    National Nuclear Security Administration (NNSA)

    KEY PERSONNEL 7062015 TITLE NAME President Christopher C. Gentile Vice President, Engineering Robin Stubenhofer Vice President, Integrated Supply Chain Rick Lavelock Director,...

  6. VCU Community Engagement Terms and Definitions Term Definitions

    E-Print Network [OSTI]

    Gough, Christopher M.

    . Examples are research, capacity building, or economic development. 1 Community Outreach The application://www.atsdr.cdc.gov/communityengagement/pdf/PCE_Report_508_FINAL.pdf. 3Driscoll, A., & Sandmann, L. (2011). Evaluation Criteria for the Scholarship of Engagement. Retrieved from http://www.scholarshipofengagement.org/evaluation/evaluation_criteria.html. 4

  7. Crop Insurance Terms and Definitions 

    E-Print Network [OSTI]

    Stokes, Kenneth; Waller, Mark L.; Outlaw, Joe; Barnaby, G. A. Art

    2008-10-17

    on the date coverage begins for the crop year. To qualify, an enterprise unit must contain all of the insurable acreage of the same insured crop in: One or more basic units that are located 1. in two or more separate sections, section equivalents, FSA... by the termination date specified in the Crop Provisions. Earliest planting date. The initial planting date contained in the Special Provisions, which is the earliest date the insured may plant an in- sured agricultural commodity and qualify for a replanting...

  8. Glossary of CERCLA, RCRA and TSCA related terms and acronyms. Environmental Guidance

    SciTech Connect (OSTI)

    Not Available

    1993-10-01

    This glossary contains CERCLA, RCRA and TSCA related terms that are most often encountered in the US Department of Energy (DOE) Environmental Restoration and Emergency Preparedness activities. Detailed definitions are included for key terms. The CERCLA definitions included in this glossary are taken from the Comprehensive Environmental Response, Compensation and Liability Act (CERCLA), as amended and related federal rulemakings. The RCRA definitions included in this glossary are taken from the Resource Conservation and Recovery Act (RCRA) and related federal rulemakings. The TSCA definitions included in this glossary are taken from the Toxic Substances and Control Act (TSCA) and related federal rulemakings. Definitions related to TSCA are limited to those sections in the statute and regulations concerning PCBs and asbestos.Other sources for definitions include additional federal rulemakings, assorted guidance documents prepared by the US Environmental Protection Agency (EPA), guidance and informational documents prepared by the US Department of Energy (DOE), and DOE Orders. The source of each term is noted beside the term. Terms presented in this document reflect revised and new definitions published before July 1, 1993.

  9. Key ACA Terms A quick reference of frequently used terms

    E-Print Network [OSTI]

    Acton, Scott

    to achieving health care quality goals and outcomes that result in cost savings. Affordable Health Care Health; and pediatric services, including oral and vision care. Federal Poverty Level (FPL) A measure of income level issued annually by the Department of Health and Human Services. The federal poverty level is used

  10. FISH AND WILDLIFE PROGRAM G-1 December 14, 1994 The definitions in this list have no legal significance and are provided only for clarification of terms used

    E-Print Network [OSTI]

    GLOSSARY FISH AND WILDLIFE PROGRAM G-1 December 14, 1994 GLOSSARY The definitions in this list have fish in the water of a particular stream before their release into that stream. Act -- See Northwest of different elements of the system are better understood. adult equivalent population The number of fish

  11. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0 Year-1Plant Processing Definitions Key TermsNumber of Producing

  12. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0 Year-1Plant Processing Definitions Key TermsNumber of

  13. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0 Year-1Plant Processing Definitions Key TermsNumber ofNatural Gas A

  14. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0 Year-1Plant Processing Definitions Key TermsNumber ofNatural Gas

  15. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0 Year-1Plant Processing Definitions Key TermsNumber ofNatural

  16. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0 Year-1Plant Processing Definitions Key TermsNumber

  17. Definitions 4-H members will

    E-Print Network [OSTI]

    principles to achieve variety in design. The criteria for good design are found in the principlesDefinitions Objectives 4-H members will: · Learn definitions of terms used in designing. DESIGN TERMS Before we go into the individual fundamentals of construction for all design, it would help

  18. Genomic definition of species

    SciTech Connect (OSTI)

    Crkvenjakov, R.; Drmanac, R.

    1991-07-01

    The subject of this paper is the definition of species based on the assumption that genome is the fundamental level for the origin and maintenance of biological diversity. For this view to be logically consistent it is necessary to assume the existence and operation of the new law which we call genome law. For this reason the genome law is included in the explanation of species phenomenon presented here even if its precise formulation and elaboration are left for the future. The intellectual underpinnings of this definition can be traced to Goldschmidt. We wish to explore some philosophical aspects of the definition of species in terms of the genome. The point of proposing the definition on these grounds is that any real advance in evolutionary theory has to be correct in both its philosophy and its science.

  19. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  20. Information systems definition architecture

    SciTech Connect (OSTI)

    Calapristi, A.J.

    1996-06-20

    The Tank Waste Remediation System (TWRS) Information Systems Definition architecture evaluated information Management (IM) processes in several key organizations. The intent of the study is to identify improvements in TWRS IM processes that will enable better support to the TWRS mission, and accommodate changes in TWRS business environment. The ultimate goals of the study are to reduce IM costs, Manage the configuration of TWRS IM elements, and improve IM-related process performance.

  1. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  2. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  3. NISTIR 7298 Glossary of Key Information

    E-Print Network [OSTI]

    . For planning and transition purposes, Federal agencies may wish to closely follow the development of these new, technical, and physical standards and guidelines for the cost-effective security and privacy of other than. Since draft documents are not stable, we do not refer to terms/definitions in them. Each entry

  4. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  5. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  6. Identification of Key Barriers in Workforce Development

    SciTech Connect (OSTI)

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  7. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  8. Key Research Results Achievement

    E-Print Network [OSTI]

    ) evaluated several common figures of merit used to compare the electrical and optical performance of TCsKey Research Results Achievement NREL research significantly contributed to inadequate existing not yet at performance levels of TCOs, demonstrate a much better combination of transmission

  9. Key Research Results Achievement

    E-Print Network [OSTI]

    % energy savings in new buildings and major renovations. Researchers at the National Renewable Energy%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvancedEnergy to use signifi- cantly less energy--reducing operating costs and greenhouse gas emissions. This new K-12

  10. The Web Services Vision Definition of Web Services

    E-Print Network [OSTI]

    Cheverst, Keith

    1 The Web Services Vision Overview Definition of Web Services Key concepts Difference from traditional web model Context Service-oriented architecture Distributed computing Overview Microsoft .NET vision Web Services Difference from traditional web model Context Service-oriented architecture

  11. Key Management in Historical Context

    E-Print Network [OSTI]

    ;Rolling Keys Why change keys? --- cryptoperiod (intrinsic to cryptosystem) --- management issuesKey Management in Historical Context Whitfield Diffie Internet Corporation for Assigned Names to become the security or insecurity of the message. #12;Key management systems both reflect and shape

  12. Definition of Energy Efficiency

    U.S. Energy Information Administration (EIA) Indexed Site

    Energy Users Energy Efficiency Page Energy Efficiency Definition Energy Efficiency: Definition Stairs) "Take the Stairs--Be More Energy Efficient" Person A interprets the sign as...

  13. A Distributed Public Key Caching Scheme in Large Wireless Networks

    E-Print Network [OSTI]

    Deng, Jing

    -constrained, in terms of computational power, battery energy, and on-board memory space. For example, the prototypeA Distributed Public Key Caching Scheme in Large Wireless Networks Yuan Kong Jing Deng Stephen R in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate

  14. Policy on Keys and Keycards Policy on Keys and Keycards

    E-Print Network [OSTI]

    Sridhar, Srinivas

    department is responsible for the total cost of lock changes and new keys/cards to secure areas compromised has been compromised, and avoid potentially significant costs due to theft, vandalism, or excessive be given access to keys/cards that permit entry to buildings and locked spaces on the University campuses

  15. Definitions of dwelling

    E-Print Network [OSTI]

    Olgyay, Victor W. (Victor Wayne)

    1986-01-01

    Home is an elusive concept. In one manner it is highly specific and individual in its definition, and in other aspects it is ubiquitous, present in our every act. In this thesis I explore several possible definitions of ...

  16. The definition of HIV-associated neurocognitive disorders: are we overestimating the real prevalence?

    E-Print Network [OSTI]

    Gisslén, Magnus; Price, Richard W; Nilsson, Staffan

    2011-01-01

    been termed asymptomatic neurocognitive impairment (ANI).Discussion: ANI is identified by performance on formalclassified as suffering ANI. This liberal definition raises

  17. Definiteness as Maximal Informativeness

    E-Print Network [OSTI]

    von Fintel, Kai

    2014-01-01

    We argue that definites are interpreted as denoting the maximally informative object that falls under the relevant predicate.

  18. Definitions Main Result

    E-Print Network [OSTI]

    Heubach, Silvia

    Background Definitions Main Result Special Types of Patterns Summary Avoidance of partially ordered Avoidance of partially ordered patterns in compositions #12;Background Definitions Main Result Special Types of Patterns Summary Outline 1 Background 2 Definitions 3 Main Result Preliminaries Main Result 4 Special Types

  19. ‘Model’ or ‘tool’? New definitions for translational research

    E-Print Network [OSTI]

    Sive, Hazel

    The term ‘model’ often describes non-human biological systems that are used to obtain a better understanding of human disorders. According to the most stringent definition, an animal ‘model’ would display exactly the same ...

  20. Everything But: Exploring Definitions of Sexual Outercourse Among Undergraduate Students 

    E-Print Network [OSTI]

    Menn, Mindy Alison

    2011-02-22

    This thesis analyzed if undergraduate students at a Southern university use the term outercourse to describe sexual behaviors that exclude penile-vaginal intercourse. A literature review revealed that no universal definition of outercourse exists...

  1. PRE-EMPLOYMENT BACKGROUND SCREENS 2. Definitions

    E-Print Network [OSTI]

    Emmons, Scott

    Term Definition Background Check Process of acquiring records regarding a final candidate that are used. Criminal Conviction Being found guilty, entering a guilty plea, or pleading no contest or nolo contendere is considered minor while driving under the influence is major). Disclosures of criminal convictions are subject

  2. NAME GRAD'NG KEY .

    E-Print Network [OSTI]

    MA 165 EXAM 3 Fall 2002 Page 1/4. NAME GRAD'NG KEY . Page 1 / 18. STUDENT ID Page 2 / 32. Page 3 /18. RECITATION INSTRUCTOR. Page 4 / 32.

  3. Diversity & Flexibility Key to Sustainability | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Diversity & Flexibility Key to Sustainability Diversity & Flexibility Key to Sustainability Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting...

  4. Key China Energy Statistics 2012

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  5. Key China Energy Statistics 2011

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  6. Key Issues | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKey

  7. Key Steps | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKeyKey Steps

  8. Architecture BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Architecture BA (Hons) Key details Duration: 4 years (honours degree) Delivery type: Day Intake in the subject of Architecture, including a portfolio of Design, Technical and Theoretical courses covering all aspects of Architectural Theory and Practice. The course has been designed with reference to the RIBA

  9. INFORMATION: THE KEY TO SUSTAINABILITY

    E-Print Network [OSTI]

    Bateman, Ian J.

    of construction and demolition wastes and the introduction of demolition plans. Examples of information sources in the UK, Europe and the US are provided. Key words: waste management, construction, demolition, secondary sector so are concerned with re-use and recycling construction and demolition waste (C & D). However many

  10. Food Allergies DEFINITIONS

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    Food Allergies DEFINITIONS: Definition of a Food Allergy: Immune system response to a food that the body mistakenly thinks is harmful. Upon deciding a particular food is harmful, the immune system creates a defense immune system response (antibodies) to fight it. Food allergy symptoms develop when

  11. Few-key Text Entry Revisited: Mnemonic Gestures on Four Keys

    E-Print Network [OSTI]

    Wobbrock, Jacob O.

    of Roman letters for high learnability. We compare this new 4-key method to predominant 3-key and 5-key present a new 4-key method that relies on mnemonic gestures reminiscent of Roman letters. Our method-key methods rely on two keys to move a selector left and right and a third key to select a letter. Although

  12. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  13. Identify key design elements of desired function

    E-Print Network [OSTI]

    Nawroth, Janna C.

    DESIGN Identify key design elements of desired function Identify functionally equivalent implementation of key design elements (e.g. structure, physiology, kinematics etc.) Quantify functional and standardize fabrication for repeatability . Test phase: Quantify implementation of key design elements

  14. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key

  15. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

  16. Key Opportunities and Challenges for Program Sustainability ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  17. Terms, Definitions and Concepts Related to Critical Infrastructures, Chokepoints & Services

    E-Print Network [OSTI]

    Roe, Emery

    2010-01-01

    Food; Banking & Finance; Chemical; Commercial Facilities; Commercial Nuclear Reactors, Materials & Waste;

  18. Terms, Definitions and Concepts Related to Critical Infrastructures, Chokepoints & Services

    E-Print Network [OSTI]

    Roe, Emery

    2010-01-01

    Orders From Generators Coal Price To Generators Price ForDesired Coal Coverage Expected Natural Gas Price Maximum

  19. A-1 APPENDIX A DEFINITION OF TERMS AND ACRONYMS Acronyms

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries PrintA New(Conference)(Journal,f*' A-...

  20. Definitions Derived from Neutrosophics

    E-Print Network [OSTI]

    Florentin Smarandache

    2003-01-28

    Thirty-three new definitions are presented, derived from neutrosophic set, neutrosophic probability, neutrosophic statistics, and neutrosophic logic. Each one is independent, short, with references and cross references like in a dictionary style.

  1. Key Activities | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey

  2. MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS

    E-Print Network [OSTI]

    Gao, Shuhong

    MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS SHUHONG GAO AND RAYMOND HEINDL for multivariate public key cryptosystems, which combines ideas from both triangular and oil-vinegar schemes. We the framework. 1. Introduction 1.1. Multivariate Public Key Cryptography. Public key cryptography plays

  3. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  4. Electronics - Key to Energy Control 

    E-Print Network [OSTI]

    Nelson, K. P.

    1981-01-01

    planned by 1985. The goal of this program is a 50% reduction in energy consumption when measured in terms of BTU'S consumed per square foot and BTU'S consumed per dollar of business. Taking 1973 as the base year, the reduction through 1980 is 38% with a 50...

  5. DOE Acquisition and Project Management (APM) Glossary of Terms Handbook FINAL VERSION 9-30-2014

    Broader source: Energy.gov [DOE]

    ACQUISITION AND PROJECT MANAGEMENT GLOSSARY OF TERMS HANDBOOK This handbook provides definitions of acquisition and project management terms commonly used in DOE projects to ensure consistent use of terms in DOE project documents and discussions. DOE APM Glossary of Terms Handbook – Final, September 2014

  6. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979 1.988 1.996DeutscheReceipts ofInputsArea Definitions Key

  7. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979 1.988 1.996DeutscheReceiptsCrude Stream Definitions Key

  8. Guidelines for Home Energy Professionals Project Glossary

    Broader source: Energy.gov [DOE]

    This document contains key terms and definitions used in the Guidelines for Home Energy Professionals Project.

  9. Hash-based Multivariate Public Key Cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Hash-based Multivariate Public Key Cryptosystems WANG Hou-Zhen and ZHANG Huan-Guo The Key for the traditional multivariate public key cryp- tosystems. For example, the signature scheme SFLASH was broken. at ASIACRYPTO'09. Most multivariate schemes known so far are insecure, except maybe the sigature schemes UOV

  10. AN EXPOSITION ON THE DEFINITION OF FISHING EFFORT' BRIAN J. ROTHSCIIILD2

    E-Print Network [OSTI]

    AN EXPOSITION ON THE DEFINITION OF FISHING EFFORT' BRIAN J. ROTHSCIIILD2 ABSTRACT The term "fishing literature is, however, difficult to reconcile with broader definitions of fishing effort, particularly those and gives some pxamples in the context of allocating inputs, the capacities of fishing hoats, and several

  11. Cost Sharing Basics Definitions

    E-Print Network [OSTI]

    Finley Jr., Russell L.

    Cost Sharing Basics Definitions Some funding agencies require the grantee institution the project costs. Cost sharing is defined as project costs not borne by the sponsor. Cost sharing funds may resources or facilities. If the award is federal, only acceptable non-federal costs qualify as cost sharing

  12. InclusiveVT Definitions

    E-Print Network [OSTI]

    Crawford, T. Daniel

    competent students, faculty, and staff. InclusiveVT is Virginia Tech's new approach to revitalize inclusionInclusiveVT Definitions Vision Virginia Tech will have students and employees who thrive and contribute in a diverse and global world. Virginia Tech will become the premiere institution for culturally

  13. 3 Library Regulations Definitions

    E-Print Network [OSTI]

    Mottram, Nigel

    3 Library Regulations Definitions In Regulation 3: 'Library' means the University Library as defined in Regulation 3.1; 'Library staff' means the staff of the University Library; 'Librarian' means the University Librarian and Head of Information Resources Directorate or nominee; `Library Committee' means

  14. Gmail keyboard shortcut quick reference guide http://www.comp.nus.edu.sg/~kanmy/gmailKeys.doc

    E-Print Network [OSTI]

    Kan, Min-Yen

    >, a Change to Reply All Change a reply to a reply all. Also works with "r", "f" to change to a forward window. Writing and Sending Gmail Key Definition Action c Compose Compose a new email. r Reply Reply to an email. a Reply All Reply to all recipients of an email. f Forward Forward the current email.

  15. Industrial Engineering and Management Summer Term 2015

    E-Print Network [OSTI]

    Stein, Oliver

    and Management (M.Sc.) 6 2 Key Skills 7 3 Module Handbook - a helpful guide throughout the studies 10 4 ActualIndustrial Engineering and Management (M.Sc.) Summer Term 2015 Short version Date: 26.02.2015 Department of Economics and Management KIT - University of the State of Baden-Wuerttemberg and National

  16. Industrial Engineering and Management Summer Term 2015

    E-Print Network [OSTI]

    Stein, Oliver

    and Management (M.Sc.) 14 2 Key Skills 15 3 Module Handbook - a helpful guide throughout the studies 18 4 ActualIndustrial Engineering and Management (M.Sc.) Summer Term 2015 Long version Date: 26.02.2015 Department of Economics and Management KIT - University of the State of Baden-Wuerttemberg and National

  17. Using Event Streams to Validate Process Definitions Stefan Christov

    E-Print Network [OSTI]

    Avrunin, George S.

    is perhaps most disturbing is the absence of real progress in information technology to im- prove clinical to analysis that can in turn help identify sources of medical errors. In this paper, we use the term process definition to refer to a formal model of a process created in a process mod- eling language with well

  18. Regional Short-Term Energy Model (RSTEM) Overview

    Reports and Publications (EIA)

    2009-01-01

    The Regional Short-Term Energy Model (RSTEM) utilizes estimated econometric relationships for demand, inventories and prices to forecast energy market outcomes across key sectors and selected regions throughout the United States.

  19. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  20. Wind Vision: Analysis Highlights and Key Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Highlights and Key Results Eric Lantz (NREL) Ryan Wiser (LBNL) July 15, 2015 2 | Wind and Water Power Technologies Office eere.energy.gov Presentation Overview Wind...

  1. Monroe County Extension Services Key West Office

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    potable water is pumped to the Keys from the mainland through a 130-mile long transmission line irrigation and fertilizer, and are more

  2. Unifying classical and quantum key distillation

    E-Print Network [OSTI]

    Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

    2007-02-28

    Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

  3. On multivariate signatureonly public key cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On multivariate signature­only public key cryptosystems Nicolas T. Courtois 1,2 courtois we argument that the problem has many natural solutions within the framework of the multivariate cryptography. First of all it seems that virtually any non­injective multivariate public key is inherently

  4. Deniable Internet Key Exchange Andrew C. Yao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Deniable Internet Key Exchange Andrew C. Yao Frances F. Yao Yunlei Zhao§ Bin Zhu¶ Abstract In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following of privacy protection (especially for E-commerce over Internet), this work is naturally of practical interest

  5. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  6. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  7. Key Renewable Energy Opportunities for Oklahoma Tribes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKeyKEY

  8. Term Pricing Project

    E-Print Network [OSTI]

    Jeff Beckley

    2015-10-29

    Term Pricing Project. Your job is to reprice Purdue Life's 20 Year Term. You are to write a one page memo or report summarizing your work. The report should ...

  9. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  10. Civil Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Civil Engineering BEng (Hons) Key details Duration: Full-time: 4 years (BEng Hons) Delivery type engineering disciplines of Structures, Geotechnics, Water Engineering and Transportation Engineering civil or structural engineers. After graduation, students are equipped to work for consultants

  11. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  12. Generating Electricity with your Steam System: Keys to Long Term Savings 

    E-Print Network [OSTI]

    Bullock, B.; Downing, A.

    2010-01-01

    The application of combined heat and power principals to existing plant steam systems can help produce electricity at more than twice efficiency of grid generated electricity. In this way, steam plant managers can realize substantial savings...

  13. Smarandache Special Definite Algebraic Structures

    E-Print Network [OSTI]

    W. B. Vasantha Kandasamy

    2009-02-20

    In this book, we introduce the notion of Smarandache special definite algebraic structures. We can also call them equivalently as Smarandache definite special algebraic structures. These new structures are defined as those strong algebraic structures which have in them a proper subset which is a weak algebraic structure. For instance, the existence of a semigroup in a group or a semifield in a field or a semiring in a ring. It is interesting to note that these concepts cannot be defined when the algebraic structure has finite cardinality i.e., when the algebraic structure has finite number of elements in it. This book has four chapters. Chapter one is introductory in nature. In chapter two, the notion of Smarandache special definite groups and Smarandache special definite fields are introduced and several interesting properties are derived. The notion of Smarandache definite special rings, vector spaces and linear algebras are introduced and analyzed in chapter three. The final chapter suggests over 200 problems.

  14. Abstract--In models of imperfect competition of deregulated electricity markets, the key task is to find the Nash equilibrium

    E-Print Network [OSTI]

    Baldick, Ross

    1 Abstract--In models of imperfect competition of deregulated electricity markets, the key task techniques are adopted in this paper. Two example application problems arising from electricity markets Terms-- Bimatrix Game, Complementarity Problem, Deregulation, Dominated Strategy, Electric Power Market

  15. Key Differences between Web1.0 and Web2.0 Graham Cormode and Balachander Krishnamurthy

    E-Print Network [OSTI]

    Cormode, Graham

    Key Differences between Web1.0 and Web2.0 Graham Cormode and Balachander Krishnamurthy AT&T Labs­Research 180 Park Avenue, Florham Park, NJ {graham,bala}@research.att.com February 13, 2008 Abstract Web 2.0 Wide Web. Although largely a marketing term, some of the key attributes associated with Web 2.0 include

  16. Sociocultural definitions of risk

    SciTech Connect (OSTI)

    Rayner, S.

    1990-10-01

    Public constituencies frequently are criticized by technical experts as being irrational in response to low-probability risks. This presentation argued that most people are concerned with a variety of risk attributes other than probability and that is rather irrational to exclude these from the definition and analysis of technological risk. Risk communication, which is at the heart of the right-to-know concept, is described as the creation of shared meaning rather than the mere transmission of information. A case study of utilities, public utility commissions, and public interest groups illustrates how the diversity of institutional cultures in modern society leads to problems for the creation of shared meanings in establishing trust, distributing liability, and obtaining consent to risk. This holistic approach to risk analysis is most appropriate under conditions of high uncertainty and/or decision stakes. 1 fig., 5 tabs.

  17. Terms and Conditions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Testbed Results Current Testbed Research Proposal Process Terms and Conditions Dark Fiber Testbed Federated Testbed Circuits Test Circuit Service Performance (perfSONAR)...

  18. Definition of Power Converters

    E-Print Network [OSTI]

    Bordry, F

    2015-01-01

    The paper is intended to introduce power conversion principles and to define common terms in the domain. The concept s of sources and switches are defined and classified. From the basic laws of source interconnections, a generic method of power converter synthesis is presented. Some examples illustrate this systematic method. Finally, the commutation cell and soft commuta tion are introduced and discussedd.

  19. Review of sour service definitions

    SciTech Connect (OSTI)

    McIntyre, D.R.; Boah, J.K. [Saudi Aramco, Dhahran (Saudi Arabia)

    1996-08-01

    Case histories and laboratory test data are presented to compare the predictive utility of NACE MR0175 with three alternatives. With some exceptions, the MR0175 definition is useful and conservative for most cases. The definition based on water phase pH and hydrogen sulfide (H{sub 2}S) partial pressure, proposed in European Federation of Corrosion (EFC) pub. 16, is not recommended since it does not predict sulfide stress cracking (SSC) in refining environments and presents higher risk of SSC of sweet service materials in certain Arabian Gulf production environments. A modified definition of sour service is proposed, which uses the MR0175 definition except in cases of very low water phase pH. 47 refs., 4 figs., 1 tab.

  20. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  1. Mechanical Engineering BEng / BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Mechanical engineers play key roles in all industrial sectors, from aerospace and oil and gas, through food for Mechanical Engineering graduates in many sectors, including power production, oil and petrochemicals, manufacturing, power plant, medical engineering and many others l Whatever your final career path, developing

  2. Fashion Marketing & Retailing BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Fashion Marketing & Retailing BA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (BA Hons) Delivery type: Day Intake date: September Fees: 54000 AED per year Overview Our Fashion Marketing and Retailing programme confidently prepares students for a career within the marketing and retailing industry

  3. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Duren, Mike

    2012-01-01

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  4. Organisational Change -Key Steps LocalCollege/

    E-Print Network [OSTI]

    Botea, Adi

    Resources Division START Version 1.0 X:\\Employment Strategies\\Workplace Change & Innovation\\Change Management Frameworks\\Change Management - Key Steps 021111.vsd FINISH NOTES: * For information on formal vs informal change refer to the managing change clause in the ANU Enterprise Agreement and the managing change policy

  5. Chemical Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Chemical Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng Hons) Delivery type: Day Intake date: September Fees: 58000 AED per year Overview Chemical engineering successful and thriving types of business in the world. Chemical engineers play a vital role in achieving

  6. Management strategies for endangered Florida Key deer 

    E-Print Network [OSTI]

    Peterson, Markus Nils

    2004-09-30

    species. These data were used to address my study objectives. I found the most commonly cited FSR (2.67:1, male:female) for Florida Key deer to be inaccurate. A male biased FSR of 1.45:1 was more probable. Modified drop and drive nets were appropriate...

  7. Psychology with Management BSc (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Psychology with Management BSc (Hons) Key details Duration: Full-time: 4 years Delivery type: Day% Psychology with 25% Business and Management modules. Psychology modules cover a range of core approaches to psychology as well as research design and analysis and applied specialist topics. The curriculum is based

  8. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  9. Business Management BA / MA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Business Management BA / MA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (MSc Management degree programme follows a number of guiding principles that mirror the values of managers of leading organisations and reflect current business management thinking. In the first two years of all

  10. Vermont's Changing Forests Key Findings on the

    E-Print Network [OSTI]

    Keeton, William S.

    1 Vermont's Changing Forests Key Findings on the Health of Forested Ecosystems from the Vermont Members Anne Archie, USDA Forest Service Douglas Lantagne, University of Vermont Ed O'Leary, Vermont, USDA Farm Service Agency Charles Scott, USDA Forest Service Steven Sinclair, Vermont Agency of Natural

  11. Automotive Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Automotive Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng programme, but allows students in the later years to specialise in subjects relating to automotive technology. Automotive engineering continues to be a major employer of professional engineers, owing

  12. CAREER RESOURCES Canadian Key Business Directory

    E-Print Network [OSTI]

    Thompson, Michael

    CAREER RESOURCES BOOKS Canadian Key Business Directory - Includes the largest companies in Canada companies - Search by name, geography, SIC code and more! - Online version available through library: http://www.jobsetc.gc.ca/eng/ - Training, career and worker information - Career Exploration resources

  13. NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues

    E-Print Network [OSTI]

    NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues Cem Kaner, J.D., Ph.D., ASQ-CQE November 1999 Contact Information: kaner@kaner.com www.kaner.com (testing November 1999 Cem Kaner Page 2 UCITA? Huh?UCITA? Huh? · Uniform Computer Information Transactions Act

  14. 64 IRE TRANSACTIONS ON ENGINEERING MANAGEMENT July Systenas Engineering-Key to Modern Development

    E-Print Network [OSTI]

    Rhoads, James

    64 IRE TRANSACTIONS ON ENGINEERING MANAGEMENT July Systenas Engineering-Key to Modern Development, integration, emphasis on the field of systems engineering. Though and evaluation. In a sense, these terms describe the five engineers with system functions can be found in almost stages -of the systems engineering

  15. Temperature-driven decoupling of key phases of organic matter degradation in marine sediments

    E-Print Network [OSTI]

    Weston, Nathaniel B.

    Temperature-driven decoupling of key phases of organic matter degradation in marine sediments for review August 29, 2005) The long-term burial of organic carbon in sediments results in the net and atmosphere. Sediment microbial activity plays a major role in determining whether particulate organic carbon

  16. The application of a hybrid energy-economy model to a key developing country China

    E-Print Network [OSTI]

    . Climate change. Currently, China's discharge of carb- on dioxide (CO2) ranks second in the world after in the world in terms of economic growth, energy consumption and associated emissions. In October 2002 emissions are three key challenges facing China's decision-makers. In this study, we first applied CIMS

  17. Keys to Canola Production in South Texas 

    E-Print Network [OSTI]

    Livingston, Stephen; Bremer, John E.; Parker, Roy D.; Miller, Travis

    1995-11-22

    Canola is a term patented by the Canadian government. It refers to rapeseed (Brassica napus), which has specific chemical properties that lend themselves to the production of a high-quality cooking oil and an edible meal ...

  18. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

  19. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  20. Rapid Compression Machine ? A Key Experimental Device to Effectively...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compression Machine A Key Experimental Device to Effectively Collaborate with Basic Energy Sciences Rapid Compression Machine A Key Experimental Device to Effectively...

  1. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  2. Single, Key Gene Discovery Could Streamline Production of Biofuels...

    Energy Savers [EERE]

    Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

  3. Building America Expert Meeting: Key Innovations for Adding Energy...

    Energy Savers [EERE]

    Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance...

  4. Thailand-Key Results and Policy Recommendations for Future Bioenergy...

    Open Energy Info (EERE)

    Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future...

  5. Technology Key to Harnessing Natural Gas Potential | Department...

    Office of Environmental Management (EM)

    Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa...

  6. Key Energy-Saving Projects for Smaller Facilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Energy-Saving Projects for Smaller Facilities Key Energy-Saving Projects for Smaller Facilities This presentation discusses how smaller industrial facilities can save energy...

  7. Manufacturing Energy and Carbon Footprint Definitions and Assumptions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Definitions and Assumptions, October 2012 Manufacturing Energy and Carbon Footprint Definitions and Assumptions, October 2012 footprintsassumptionsdefinitions2012.pdf More...

  8. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  9. Another key Y-12 General Foreman remembered

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TAPropaneandAn319Another key Y-12 General Foreman

  10. Keyes, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLCKeyes,

  11. NERSC.COE.key.actions-4.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on77 PAGEMissionStressMoveMuncriefB ONERSCNERSC8 CoE Key Actions

  12. Composite keys? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlusComposite keys? Home >

  13. Fermilab | Science | Particle Physics | Key Discoveries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find whatGasEnergyfeature photo featureParticleDark matterKey

  14. Key Agency Targets Summary _FY 2012_.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5 B

  15. Key Actions for Optimizing for KNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin Morris Title:AnaKey

  16. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power, IncBio Centers Announcement at theproduceƈ GOAL:Key

  17. Fair Encryption of RSA Keys Guillaume Poupard and Jacques Stern

    E-Print Network [OSTI]

    Stern, Jacques

    based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs

  18. Session-Key Generation using Human Passwords Only Oded Goldreich

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session-Key Generation using Human Passwords Only Oded Goldreich Department of Computer Science present session-key generation protocols in a model where the legitimate parties share only a human assumptions. Keywords: Session-key generation (authenticated key-exchange), mutual authentication proto- cols

  19. SessionKey Generation using Human Passwords Only # Oded Goldreich +

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session­Key Generation using Human Passwords Only # Oded Goldreich + Department of Computer Science present session­key generation protocols in a model where the legitimate parties share only a human setup assumptions. Keywords: Session­key generation (authenticated key­exchange), mutual authentication

  20. The impacts of urbanization on endangered florida key deer 

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12

    of peninsular Florida. Key deer range is restricted to the Lower Florida Keys with approximately 60% residing on Big Pine Key and 15% residing on No Name Key which have undergone rapid human population growth and development over the past 30 years. Urban...

  1. SARNET: Integrating Severe Accident Research in Europe - Safety Issues in the Source Term Area

    SciTech Connect (OSTI)

    Haste, T. [Paul Scherrer Institute, 5232 Villigen PSI (Switzerland); Giordano, P.; Micaelli, J.-C. [Institut de Radioprotection et de S et Nucl ire, IRSN, BP 3 13115 St Paul lez Durance Cedex (France); Herranz, L. [Centro de Investigaciones Energeticas Medio Ambientales y Tecnologica, CIEMAT, Avda. Complutense 22, 28040 Madrid (Spain)

    2006-07-01

    SARNET (Severe Accident Research Network) is a Network of Excellence of the EU 6. Framework Programme that integrates in a sustainable manner the research capabilities of about fifty European organisations to resolve important remaining uncertainties and safety issues concerning existing and future nuclear plant, especially water-cooled reactors, under hypothetical severe accident conditions. It emphasises integrating activities, spreading of excellence (including knowledge transfer) and jointly-executed research. This paper summarises the main results obtained at the middle of the current 4-year term, highlighting those concerning radioactive release to the environment. Integration is pursued through different methods: the ASTEC integral computer code for severe accident modelling, development of PSA level 2 methods, a means for definition, updating and resolution of safety issues, and development of a web database for storing experimental results. These activities are helped by an evolving Advanced Communication Tool, easing communication amongst partners. Concerning spreading of excellence, educational courses covering severe accident analysis methodology and level 2 PSA have been organised for early 2006. A text book on Severe Accident Phenomenology is being written. A mobility programme for students and young researchers has started. Results are disseminated mainly through open conference proceedings, with journal publications planned. The 1. European Review Meeting on Severe Accidents in November 2005 covered SARNET activities during its first 18 months. Jointly executed research activities concern key issues grouped in the Corium, Containment and Source Term areas. In Source Term, behaviour of the highly radio-toxic ruthenium under oxidising conditions, including air ingress, is investigated. Models are proposed for fuel and ruthenium oxidation. Experiments on transport of oxide ruthenium species are performed. Reactor scenario studies assist in defining conditions for new experiments. Regarding predictability of iodine species exiting the Reactor Coolant System (RCS), which affects the amount entering the containment, iodine behaviour in the circuit and silver-indium-cadmium (SIC) release have been reviewed. New experiments are being discussed and performed, and SIC degradation and release models are being improved. For the radioactive aerosol source term, work is conducted in the risk-relevant areas of steam generator (SG) tube rupture, transport through cracks in containment walls and revaporization from previous deposits in the RCS that could lead to a delayed source term. Models for aerosol retention in containment cracks and interpretation of data on retention in the SG secondary side are proposed. For radioactive iodine release to the environment, many physical and chemical processes affect the iodine concentration in the containment atmosphere; of these effects, mass transfer phenomena and radiolytic oxidation are being investigated first. (authors)

  2. TABLE OF CONTENTS: Building Executive Definition.......................................................................3

    E-Print Network [OSTI]

    Capogna, Luca

    #12;TABLE OF CONTENTS: Building Executive Definition.......................................................................3 Building Executives Areas of Responsibilities ...................................................................................5 Building Safety and Security Issues

  3. Definition of GPRA08 benefits metrics

    SciTech Connect (OSTI)

    None, None

    2009-01-18

    Background information for the FY 2007 GPRA methodology review on the definitions of GPRA08 benefits metrics.

  4. Satellite power system concept development and evaluation program system definition technical assessment report

    SciTech Connect (OSTI)

    Not Available

    1980-12-01

    The results of the system definition studies conducted by NASA as a part of the Department of Energy/National Aeronautics and Space Administration SPS Concept Development and Evaluation Program are summarized. The purpose of the system definition efforts was to identify and define candidate SPS concepts and to evaluate the concepts in terms of technical and cost factors. Although the system definition efforts consisted primarily of evaluation and assessment of alternative technical approaches, a reference system was also defined to facilitate economic, environmental, and societal assessments by the Department of Energy. This reference system was designed to deliver 5 GW of electrical power to the utility grid. Topics covered include system definition; energy conversion and power management; power transmission and reception; structures, controls, and materials; construction and operations; and space transportation.

  5. Passive decoy state quantum key distribution: Closing the gap to perfect sources

    E-Print Network [OSTI]

    Wolfgang Mauerer; Christine Silberhorn

    2006-10-17

    We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present-day, non-ideal photon-number detection. Arbitrary experimental imperfections which lead to bit errors are included. We select decoy states by classical post-processing. This allows to improve the effective signal statistics and achievable distance.

  6. SQL Data Definition Database Systems Lecture 5

    E-Print Network [OSTI]

    Alechina, Natasha

    SQL Data Definition Database Systems Lecture 5 Natasha Alechina #12;SQL Data Definition In This Lecture · SQL · The SQL language · SQL, the relational model, and E/R diagrams · CREATE TABLE · Columns.6. #12;SQL Data Definition SQL · Originally `Sequel' - Structured English query Language, part of an IBM

  7. SQL Data Definition Database Systems Lecture 5

    E-Print Network [OSTI]

    Alechina, Natasha

    1 SQL Data Definition Database Systems Lecture 5 Natasha Alechina SQL Data Definition In This Lecture · SQL · The SQL language · SQL, the relational model, and E/R diagrams · CREATE TABLE · Columns.6. SQL Data Definition SQL · Originally `Sequel' - Structured English query Language, part of an IBM

  8. Preference Term List

    E-Print Network [OSTI]

    Wu, Yih-Min

    · Subject Bibliography Library #12; 1/2 · Edit Preferences #12; 2/2 · Library ­ PreferencesDisplay Fields · ­ PreferencesDuplicates · ­ PreferencesFind Full Text · PreferencesReference Types #12;? #12;Journal term list() · Bibliography() · Footnotes() · #12;15 4.Journal Article "Insert Field" #12;16 5. : "Reference Types ""Insert

  9. A comparison of world-wide uses of severe reactor accident source terms

    SciTech Connect (OSTI)

    Ang, M.L. [NNC Ltd., Knutsford (United Kingdom); Frid, W. [Swedish Nuclear Power Inspectorate, Stockholm (Sweden); Kersting, E.J.; Friederichs, H.G. [Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, Koeln (Germany); Lee, R.Y. [Nuclear Regulatory Commission, Washington, DC (United States); Meyer-Heine, A. [CEA Centre d`Etudes de Cadarache, Saint Paul Lez Durance (France); Powers, D.A. [Sandia National Labs., Albuquerque, NM (United States); Soda, K. [Japan Atomic Energy Research Inst., Tokyo (Japan); Sweet, D. [AEA Technology, Winfrith (United Kingdom)

    1994-09-01

    The definitions of source terms to reactor containments and source terms to the environment are discussed. A comparison is made between the TID-14844 example source term and the alternative source term described in NUREG-1465. Comparisons of these source terms to the containments and those used in France, Germany, Japan, Sweden, and the United Kingdom are made. Source terms to the environment calculated in NUREG-1500 and WASH-1400 are discussed. Again, these source terms are compared to those now being used in France, Germany, Japan, Sweden, and the United Kingdom. It is concluded that source terms to the containment suggested in NUREG-1465 are not greatly more conservative than those used in other countries. Technical bases for the source terms are similar. The regulatory use of the current understanding of radionuclide behavior varies among countries.

  10. Rules-GASB 51 Definitions

    E-Print Network [OSTI]

    . Capitalization ceases when the software project is substantially complete after all testing is completed. #12The New Software Accounting Rules-GASB 51 #12;Definitions Software Package: Software purchased or licensed with the software code already written and developed . The useful life must be over 1 year

  11. 13 Lyapunov stability Definition 13.1 (Positive definite). We say that V (x, y) is positive definite, if V (x, y) 0

    E-Print Network [OSTI]

    Karageorgis, Paschalis

    13 Lyapunov stability Definition 13.1 (Positive definite). We say that V (x, y) is positive definite, if V (x, y) 0 at all points and if equality holds only at the origin. Definition 13.2 (Lyapunov functions). Suppose that V (x, y) is continuous and positive definite. Then we say that V is a Lyapunov

  12. Stochastic Pronunciation Modelling for Out-of-Vocabulary Spoken Term Detection 

    E-Print Network [OSTI]

    Wang, Dong; King, Simon; Frankel, Joe

    2010-01-01

    pronunciation model (SPM) which explicitly deals with this uncertainty. The key insight is to search for all possible pronunciations when detecting an OOV term, explicitly capturing the uncertainty in pronunciation. This requires a probabilistic model...

  13. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    SciTech Connect (OSTI)

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  14. Status Company Terminal Term

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation ofAlbuquerque|SensitiveApril 2,BL4-2 Bio-SAXSAppropriations CommitteeShort-Term

  15. Terms and Conditions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservationBio-Inspired Solar FuelTechnologyTel: Name: Rm. Tel: Location: Rm.TennesseeTerms and

  16. GENERAL TERMS & CONDITIONS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclear Physics (NP)aboutRioGlobalGENERAL TERMS

  17. Electricity and Development: Global Trends and Key Challenges

    E-Print Network [OSTI]

    ;3. Prospects for Electricity Development Electricity Access Projected Electrification Rates by Region globalElectricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12

  18. Energy Storage: The Key to a Reliable, Clean Electricity Supply...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy...

  19. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  20. SOW and Key Performance Parameters (KPP) Handbook Final Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 This handbook provides suggested...

  1. Could Solar Energy Storage be Key for Residential Solar? | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? October 26, 2010 - 4:52pm Addthis This is the silent power storage...

  2. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  3. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  4. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  5. Master Thesis Group Key Agreement for Ad Hoc Networks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Master Thesis Group Key Agreement for Ad Hoc Networks Lijun Liao Date: 06 July 2005 Supervisor: M their financial support. #12;Abstract Over the last 30 years the study of group key agreement has stimulated much present a Tree-based group key agreement Framework for Ad-hoc Networks (TFAN). TFAN is especially suitable

  6. Distributed Key Generation in the Wild Aniket Kate1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distributed Key Generation in the Wild Aniket Kate1 Yizhou Huang2 Ian Goldberg2 1 Max Planck of Waterloo, Canada aniket@mpi-sws.org, {y226huan, iang}@uwaterloo.ca Abstract Distributed key generation (DKG communication model. computational setting. distributed key generation. uniform randomness. implementation 1

  7. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  8. Leakage-Resilient Cryptography with Key Derived from Sensitive Data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Leakage-Resilient Cryptography with Key Derived from Sensitive Data Konrad Durnoga , Tomasz Kazana subject to adversarial leakage. We propose a method to derive keys for such protocols on-the-fly from the actual keys are derived from. That is, an adversary can hardly gain any knowledge about the private data

  9. Workshop On Definition Extraction 2009 -Borovets, Bulgaria, pages 3339, Language Independent System for Definition Extraction

    E-Print Network [OSTI]

    on different corpus get worst. In the case of classification approach one of the main issue to be dealt with is the sparseness of definitions in a corpus. It is a matter of fact that the number of definition bearing sentences] used a balanced corpus where the definition-bearing sentences represent 59% of the whole corpus, while

  10. Connate Water Saturation -Irreducible or Not: the Key to Reliable Hydraulic Rock Typing in Reservoirs Straddling Multiple Capillary Windows

    E-Print Network [OSTI]

    Torres-Verdín, Carlos

    SPE 166082 Connate Water Saturation - Irreducible or Not: the Key to Reliable Hydraulic Rock Typing Irreducible water saturation is an important attribute to quantify reservoir petrophysical quality in terms of flow capacity. High in-situ capillary pressure causes connate water saturation in reservoir rocks

  11. Transportation Energy Futures: Key Opportunities and Tools for Decision Makers (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2012-12-01

    The Transportation Energy Futures (TEF) project examines underexplored greenhouse gas-abatement and oil-savings opportunities by consolidating transportation energy knowledge, conducting advanced analysis, and exploring additional opportunities for sound strategic action. Led by NREL, in collaboration with Argonne National Laboratory, the project's primary goal is to provide analysis to accompany DOE-EERE's long-term transportation energy planning by addressing high-priority questions, informing domestic decisions about transportation energy strategies, priorities, and investments. Research and analysis were conducted with an eye toward short-term actions that support long-term energy goals The project looks beyond technology to examine each key question in the context of the marketplace, consumer behavior, industry capabilities, and infrastructure. This updated fact sheet includes a new section on initial project findings.

  12. Definitions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalent Bonding Low-Cost2Department of Energy Defense-RelatedCall

  13. Fusion Simulation Program Definition. Final report

    SciTech Connect (OSTI)

    Cary, John R.

    2012-09-05

    We have completed our contributions to the Fusion Simulation Program Definition Project. Our contributions were in the overall planning with concentration in the definition of the area of Software Integration and Support. We contributed to the planning of multiple meetings, and we contributed to multiple planning documents.

  14. Entropy and Energy: Toward a Definition of Physical Sustainability

    E-Print Network [OSTI]

    Hermanowicz, Slawomir W

    2005-01-01

    of entropy-energy definition of sustainability as well asto assess the sustainability is based on the energy. Thisand Energy: Toward a Definition of Physical Sustainability

  15. Entropy and Energy: Toward a Definition of Physical Sustainability

    E-Print Network [OSTI]

    Hermanowicz, Slawomir W

    2005-01-01

    of entropy-energy definition of sustainability as well asand Energy: Toward a Definition of Physical Sustainabilityto assess the sustainability is based on the energy. This

  16. Updated distribution and reintroduction of the Lower Keys marsh rabbit 

    E-Print Network [OSTI]

    Faulhaber, Craig Alan

    2005-02-17

    , for their advice and interest in the project. Kim Rohrs of the Monroe County Department of Planning and Environmental Resources provided valuable spatial and tabular data on land ownership and land-use planning in the Keys. My interns, Josh Harris, Kyle........................ 29 3.1 The number of individual Lower Keys marsh rabbits captured in 13 occupied populations on 4 keys from October 2001?August 2002. Data are arranged according to sex and age class...

  17. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  18. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  19. Deputy Secretary Sherwood-Randall Meets Key Government Officials...

    Broader source: Energy.gov (indexed) [DOE]

    Pritzker and Deputy Secretary Sherwood-Randall had the opportunity to engage with key Chinese government officials while in Beijing. Both met with Premier Li Keqiang and Vice...

  20. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Climate Action Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment...

  1. California Energy Incentive Programs An Annual Update on Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Issues and Financial Opportunities for Federal Sites in California California Energy Incentive Programs An Annual Update on Key Energy Issues and Financial Opportunities...

  2. Intercropped silviculture systems, a key to achieving soil fungal...

    Office of Scientific and Technical Information (OSTI)

    Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations Citation Details In-Document Search Title: Intercropped...

  3. Strategic Energy Management.  Keys to Behavioral and Operational Change.

    E-Print Network [OSTI]

    Kroll, Ryan M; Willems, Phil; Rubado, Dan; Belkhayat, Kathleen

    2015-01-01

    Strategic Energy Management Keys to Behavioral andof Oregon’s Strategic Energy Management (SEM) initiative.Introduction Strategic energy management (SEM) is defined

  4. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  5. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  6. AES Flow Interception : Key Snooping Method on Virtual Machine.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES for snooping AES en- cryption key on Virtual Machine Monitor (VMM), and we present coun- termeasures against. In general, the virtualization technology composes two software parts: one is vir- tual machine (VM

  7. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  8. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  9. Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme P. Scholl and N.P. Smart scheme was the slow key generation process. Gentry and Halevi provided a fast technique for 2-power cyclo. In particular they focused on the field generated by the polynomial F(X) = X2n + 1, but they noted

  10. Zero-one laws for connectivity in random key graphs

    E-Print Network [OSTI]

    Yagan, Osman

    with the random key predistribution scheme of Eschenauer and Gligor for wireless sensor networks. For this class which are more realistic for applications to wireless sensor networks. Keywords: Wireless sensor- dom key predistribution for wireless sensor networks (WSNs) [6], [7], [9]. For the sake

  11. Baton: Key Agility for Android without a Centralized Certificate Infrastructure

    E-Print Network [OSTI]

    Van Oorschot, Paul

    Baton: Key Agility for Android without a Centralized Certificate Infrastructure David Barrera,dmccarney}@ccsl.carleton.ca {clark,paulv}@scs.carleton.ca ABSTRACT Android's trust-on-first-use application signing model asso transfer signing au- thority to a new signing key. Our proposal, Baton, modifies Android's app installation

  12. Comparative Analysis of Software Libraries for Public Key Cryptography

    E-Print Network [OSTI]

    Gaj, Krzysztof

    Comparative Analysis of Software Libraries for Public Key Cryptography Ashraf Abusharekh1 and Kris libraries implementing such operations exist both commercially and in the public domain, in this paper, we, using performance and support of public key primitive operations. The performance of all libraries

  13. k-Connectivity in Random Key Graphs with Unreliable Links

    E-Print Network [OSTI]

    Yagan, Osman

    of Eschenauer and Gligor for securing wireless sensor network (WSN) communications. Random key graphs have real-world networks; e.g., with secure WSN application in mind, link unreliability can be attributed for securing WSN communications is the random predistribution of cryptographic keys to sensor nodes

  14. Wireless sensor networks under the random pairwise key predistribution scheme

    E-Print Network [OSTI]

    Yagan, Osman

    Wireless sensor networks under the random pairwise key predistribution scheme: Can resiliency, College Park, MD 20742. Email: armand@isr.umd.edu Abstract--We investigate the resiliency of wireless the classical key predistribution scheme of Eschenauer and Gligor. Keywords: Wireless sensor networks, Security

  15. F-term uplifting via consistent D-terms

    E-Print Network [OSTI]

    Z. Lalak; O. J. Eyton-Williams; R. Matyszkiewicz

    2007-02-13

    The issue of fine-tuning necessary to achieve satisfactory degree of hierarchy between moduli masses, the gravitino mass and the scale of the cosmological constant has been revisited in the context of supergravities with consistent D-terms. We have studied (extended) racetrack models where supersymmetry breaking and moduli stabilisation cannot be separated from each other. We show that even in such cases the realistic hierarchy can be achieved on the expense of a single fine-tuning. The presence of two condensates changes the role of the constant term in the superpotential, W_0, and solutions with small vacuum energy and large gravitino mass can be found even for very small values of W_0. Models where D-terms are allowed to vanish at finite vevs of moduli fields - denoted `cancellable' D-terms - and the ones where D-terms may vanish only at infinite vevs of some moduli - denoted `non-cancellable' - differ markedly in their properties. It turns out that the tuning with respect to the Planck scale required in the case of cancellable D-terms is much weaker than in the case of non-cancellable ones. We have shown that, against intuition, a vanishing D-term can trigger F-term uplifting of the vacuum energy due to the stringent constraint it imposes on vacuum expectation values of charged fields. Finally we note that our models only rely on two dimensionful parameters: M_P and W_0.

  16. Key success factors in transforming traditional family business for success and long-term survival in changing markets

    E-Print Network [OSTI]

    Srisomburananont, Thitipong, 1976-

    2004-01-01

    Most of family-owned enterprises start their operations in the traditional businesses such as manufacturing, trading, or providing services. Some of them are very successful and become major global players in the industries, ...

  17. Short-term energy outlook, January 1999

    SciTech Connect (OSTI)

    1999-01-01

    The Energy Information Administration (EIA) prepares the Short-Term Energy Outlook (energy supply, demand, and price projections) monthly. The forecast period for this issue of the Outlook extends from January 1999 through December 2000. Data values for the fourth quarter 1998, however, are preliminary EIA estimates (for example, some monthly values for petroleum supply and disposition are derived in part from weekly data reported in EIA`s Weekly Petroleum Status Report) or are calculated from model simulations that use the latest exogenous information available (for example, electricity sales and generation are simulated by using actual weather data). The historical energy data, compiled in the January 1999 version of the Short-Term Integrated Forecasting System (STIFS) database, are mostly EIA data regularly published in the Monthly Energy Review, Petroleum Supply Monthly, and other EIA publications. Minor discrepancies between the data in these publications and the historical data in this Outlook are due to independent rounding. The STIFS model is driven principally by three sets of assumptions or inputs: estimates of key macroeconomic variables, world oil price assumptions, and assumptions about the severity of weather. Macroeconomic estimates are produced by DRI/McGraw-Hill but are adjusted by EIA to reflect EIA assumptions about the world price of crude oil, energy product prices, and other assumptions which may affect the macroeconomic outlook. By varying the assumptions, alternative cases are produced by using the STIFS model. 28 figs., 19 tabs.

  18. Long-Term Environmental Stewardship

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    activities maintenance of barriers and other contaminant structures periodic inspections control of site access posted signs Long-term environmental stewardship (LTES) data access...

  19. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  20. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  1. APPENDIX I: TERMS AND DEFINITIONS Action -The manner in which a horse travels and moves.

    E-Print Network [OSTI]

    New Hampshire, University of

    in the horse's mouth. The bit provides communication between the rider or driver and the horse. Bloom and other irritants from the horse; massages muscles. Gymkhana - A program of competitive games on horseback

  2. Definitions of Terms Part 772-page 1 Export Administration Regulations July 16, 2001

    E-Print Network [OSTI]

    Bernstein, Daniel

    during the operation (Ref. ISO 2806-1980). Advisory Committee on Export Policy (ACEP). The ACEP voting, will speak and vote on behalf of their agencies or departments. The ACEP may invite Assistant Secretary in the activities of the ACEP when matters of interest to such agencies or departments are under consideration

  3. Root Cause Analysis: Terms and Definitions, Accimaps, MES, SOL and WBA Peter Bernard Ladkin

    E-Print Network [OSTI]

    Ladkin, Peter B.

    systems"). For example, international agreements in civil aviation require that transport- aircraft Aviation Organisation, ICAO. All ICAO members (those who have signed the relevant agreements, which include or avoidance of any of the identified hazards and other danger-related phenomena The use and maintenance of ,as

  4. Manufacturing Energy and Carbon Footprint Definitions and Assumptions, October 2012

    Broader source: Energy.gov [DOE]

    Definitions of parameters and table of assumptions for the Manufacturing Energy and Carbon Footprint

  5. Research on Short-term Load Forecasting of the Thermoelectric Boiler Based on a Dynamic RBF Neural Network 

    E-Print Network [OSTI]

    Dai, W.; Zou, P.; Yan, C.

    2006-01-01

    As thermal inertia is the key factor for the lag of thermoelectric utility regulation, it becomes very important to forecast its short-term load according to running parameters. In this paper, dynamic radial basis function ...

  6. RESEARCH MISCONDUCT: POLICIES, DEFINITIONS AND PROCEDURES

    E-Print Network [OSTI]

    Oviedo, Néstor J.

    RESEARCH MISCONDUCT: POLICIES, DEFINITIONS AND PROCEDURES I. INTRODUCTION The purpose and principles for assessing allegations of research misconduct, conducting inquiries and investigations related to possible research misconduct and reporting the results to federal sponsors. This policy applies to all

  7. Department of Bioengineering Definition of Biomedical Engineering

    E-Print Network [OSTI]

    is a discipline that advances knowledge in engineering, biology and medicine, and improves human health throughDepartment of Bioengineering Definition of Biomedical Engineering Biomedical engineering cross-disciplinary activities that integrate the engineering sciences with the biomedical sciences

  8. When a beam a definite shaft

    E-Print Network [OSTI]

    No. 719 Aug. 31 When a beam a definite shaft A Science Service Foature ? \\UY THE WIEATEZR ? -----T and heavy clouds. For the long shafts of light can be seen i n the --------..- (Tomorrow: High Barometer VS

  9. Definition of a 'Zero Net Energy' Community

    SciTech Connect (OSTI)

    Carlisle, N.; Van Geet, O.; Pless, S.

    2009-11-01

    This document provides a definition for a net zero-energy community. A community that offsets all of its energy use from renewables available within the community's built environment.

  10. Key Facts about Argonne National Laboratory | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKeyKey

  11. Energy Audits: The Key to Performance Contracting Projects 

    E-Print Network [OSTI]

    Tharoor, M.

    1994-01-01

    The term "Performance Contracting" relates to projects where the performance of various energy conservation retrofits result in eavings that exceed the implementation cost of the entire project when financed over a fixed term. Such projects minimize...

  12. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  13. OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts!

    E-Print Network [OSTI]

    OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts! Eyestalk mouth antenna cheliped CURRICULUM Name: _____________________ Fun Crab Facts! Eyestalk Mouth Antenna Cheliped Carapace Walking metamorphosis motorcycle exoskeleton omnivores butterfly pea #12;OIMB GK12 CURRICULUM Masked crab Fiddler crab

  14. EnergySmart Schools National Financing Roundtable - Key Outcomes

    SciTech Connect (OSTI)

    2009-04-01

    This document presents key outcomes from the EnergySmart Schools National Financing Roundtable as a follow-up to the release of its Guide to FInancing EnergySmart Schools

  15. LANL breaks ground on key sediment control project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and made of rocks...

  16. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all about turbulence....

  17. Refine the Concept of Public Key Encryption with Delegated Search

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    with the public key of Bob, but unfortunately, her computer is infected by some virus which embeds a malware contents. However, in this way, Bob's computer will be under the risk of infection by the malware

  18. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

  19. A Key Review On Exergetic Analysis And Assessment Of Renewable...

    Open Energy Info (EERE)

    A Key Review On Exergetic Analysis And Assessment Of Renewable Energy Resources For A Sustainable Future Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal...

  20. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren students may want to (quietly) opt out of their friends' illicit file trading activities, but academics

  1. Practical Non-Interactive Key Distribution Based on Pairings

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , the Private Key Generator (PKG), who possesses additional privileged information in the form of a master in a non- interactive system is that the synchronous communication between Alice and Bob is replaced

  2. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  3. Reflective cracking of shear keys in multi-beam bridges 

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02

    strength to resist cracking from vehicular loads, but uneven temperature changes and shrinkage strains cause high tensile stresses in the shear key regions and lead to reflective cracking. The analyses showed the highest stresses were often times near...

  4. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  5. Darcy Q. Hou State Key Laboratory of Hydraulic

    E-Print Network [OSTI]

    Tijsseling, A.S.

    Darcy Q. Hou State Key Laboratory of Hydraulic Engineering Simulation and Safety, and School to severe dam- ages. Over 50 incidents have been attributed to this mechanism and an accident was reported

  6. Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the observed set of round subkeys in memory (computed via the cipher's key schedule operation), which were, for transparent en- cryption and decryption of data. One could apply the method from [9] to obtain the computer

  7. Energy Exchange Terms and Conditions

    Broader source: Energy.gov [DOE]

    We will be requesting that participants acknowledge that they have read these terms and conditions at the time of registration (also included in the online registration form) and at the time of printing their badges on-site.

  8. Gaussian Quadrature Inference for Multicarrier Continuous-Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Laszlo Gyongyosi

    2015-04-21

    We propose the Gaussian quadrature inference (GQI) method for multicarrier continuous-variable quantum key distribution (CVQKD). A multicarrier CVQKD protocol utilizes Gaussian subcarrier quantum continuous variables (CV) for information transmission. The GQI framework provides a minimal error estimate of the quadratures of the CV quantum states from the discrete, measured noisy subcarrier variables. GQI utilizes the fundamentals of regularization theory and statistical information processing. We characterize GQI for multicarrier CVQKD, and define a method for the statistical modeling and processing of noisy Gaussian subcarrier quadratures. We demonstrate the results through the adaptive multicarrier quadrature division (AMQD) scheme. We define direct GQI (DGQI), and prove that it achieves a theoretical minimal magnitude error. We introduce the terms statistical secret key rate and statistical private classical information, which quantities are derived purely by the statistical functions of GQI. We prove the secret key rate formulas for a multiple access multicarrier CVQKD via the AMQD-MQA (multiuser quadrature allocation) scheme. The GQI and DGQI frameworks can be established in an arbitrary CVQKD protocol and measurement setting, and are implementable by standard low-complexity statistical functions, which is particularly convenient for an experimental CVQKD scenario.

  9. 9. Table Definition in SQL 9-1 Part 9: Table Definition

    E-Print Network [OSTI]

    Brass, Stefan

    9. Table Definition in SQL 9-1 Part 9: Table Definition References: · Elmasri/Navathe:Fundamentals of Database Systems, 3rd Edition, 1999. Chap. 8, "SQL -- The Relational Database Standard" · Kemper/Darwen: A Guide to the SQL Standard, Fourth Edition, Addison-Wesley, 1997. · van der Lans: SQL, Der ISO

  10. Rigorous and General Definition of Thermodynamic Entropy

    E-Print Network [OSTI]

    Gian Paolo Beretta; Enzo Zanchini

    2010-10-05

    The physical foundations of a variety of emerging technologies --- ranging from the applications of quantum entanglement in quantum information to the applications of nonequilibrium bulk and interface phenomena in microfluidics, biology, materials science, energy engineering, etc. --- require understanding thermodynamic entropy beyond the equilibrium realm of its traditional definition. This paper presents a rigorous logical scheme that provides a generalized definition of entropy free of the usual unnecessary assumptions which constrain the theory to the equilibrium domain. The scheme is based on carefully worded operative definitions for all the fundamental concepts employed, including those of system, property, state, isolated system, environment, process, separable system, system uncorrelated from its environment, and parameters of a system. The treatment considers also systems with movable internal walls and/or semipermeable walls, with chemical reactions and/or external force fields, and with small numbers of particles. The definition of reversible process is revised by introducing the new concept of scenario. The definition of entropy involves neither the concept of heat nor that of quasistatic process; it applies to both equilibrium and nonequilibrium states. The role of correlations on the domain of definition and on the additivity of energy and entropy is discussed: it is proved that energy is defined and additive for all separable systems, while entropy is defined and additive only for separable systems uncorrelated from their environment; decorrelation entropy is defined. The definitions of energy and entropy are extended rigorously to open systems. Finally, to complete the discussion, the existence of the fundamental relation for stable equilibrium states is proved, in our context, for both closed and open systems.

  11. Quantum generalized fluctuation-dissipation relations in terms of time-distributed observations

    E-Print Network [OSTI]

    Yu. E. Kuzovlev

    2013-06-18

    New formulations of quantum generalized fluctuation-dissipation relations in terms of characteristic and probabilistic functionals of continuous observations are suggested and discussed. It is shown that control of entropy production in quantum system turns any measurement in it to a source of its extra perturbations, and because of this effect relations between probabilities of mutually time-reversed processes become definitely non-local in their functional space

  12. Term statistics Zipf's law text statistics

    E-Print Network [OSTI]

    Lu, Jianguo

    Term statistics Zipf's law text statistics October 20, 2014 text statistics 1 / 19 #12;Term statistics Zipf's law Overview 1 Term statistics 2 Zipf's law text statistics 2 / 19 #12;Term statistics Zipf's law Outline 1 Term statistics 2 Zipf's law text statistics 3 / 19 #12;Term statistics Zipf's law Model

  13. Untappable key distribution system: a one-time-pad booster

    E-Print Network [OSTI]

    Geraldo A. Barbosa; Jeroen van de Graaf

    2015-07-08

    One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. This paper presents a solution for this problem providing a fast and unlimited renewal of secure keys: An untappable key distribution system is presented and detailed. This fast key distribution system utilizes two layers of confidentially protection: 1) Physical noise intrinsic to the optical channel that turn the coded signals into stealth signals and 2) Privacy amplification using a bit pool of refreshed entropy run after run, to eliminate any residual information. The resulting level of security is rigorously calculated and demonstrates that the level of information an eavesdropper could obtain is completely negligible. The random bit sequences, fast and securely distributed, can be used to encrypt text, data or voice.

  14. Short-term energy outlook, April 1999

    SciTech Connect (OSTI)

    1999-04-01

    The forecast period for this issue of the Outlook extends from April 1999 through December 2000. Data values for the first quarter 1999, however, are preliminary EIA estimates (for example, some monthly values for petroleum supply and disposition are derived in part from weekly data reported in EIA`s Weekly Petroleum Status Report) or are calculated from model simulations that use the latest exogenous information available (for example, electricity sales and generation are simulated by using actual weather data). The historical energy data, compiled in the April 1999 version of the Short-Term Integrated forecasting system (STIFS) database, are mostly EIA data regularly published in the Monthly Energy Review, Petroleum Supply Monthly, and other EIA publications. Minor discrepancies between the data in these publications and the historical data in this Outlook are due to independent rounding. The STIFS model is driven principally by three sets of assumptions or inputs: estimates of key macroeconomic variables, world oil price assumptions, and assumptions about the severity of weather. Macroeconomic estimates are produced by DRI/McGraw-Hill but are adjusted by EIA to reflect EIA assumptions about the world price of crude oil, energy product prices, and other assumptions which may affect the macroeconomic outlook. By varying the assumptions, alternative cases are produced by using the STIFS model. 25 figs., 19 tabs.

  15. Continuous Variable Quantum Key Distribution with a Noisy Laser

    E-Print Network [OSTI]

    Christian S. Jacobsen; Tobias Gehring; Ulrik L. Andersen

    2015-07-06

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances large amounts of preparation noise can be tolerated in contrast to reverse reconciliation where the key rate quickly drops to zero. Our experiment thereby demonstrates that quantum key distribution with non-shot-noise limited laser diodes might be feasible.

  16. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  17. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  18. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  19. Robust Shot Noise Measurement for Continuous Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Sébastien Kunz-Jacques; Paul Jouguet

    2015-01-17

    We study a practical method to measure the shot noise in real time in Continuous Variable Quantum Key Distribution (CVQKD) systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e. noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  20. Feasibility of underwater free space quantum key distribution

    E-Print Network [OSTI]

    Peng Shi; Shi-Cheng Zhao; Wen-Dong Li; Yong-Jian Gu

    2014-04-04

    We investigate the optical absorption and scattering properties of underwater media pertinent to our underwater free space quantum key distribution (QKD) channel model. With the vector radiative transfer theory and Monte Carlo method, we obtain the attenuation of photons, the fidelity of the scattered photons, the quantum bit error rate and the sifted key generation rate of underwater quantum communication. It can be observed from our simulations that the most secure single photon underwater free space QKD is feasible in the clearest ocean water.

  1. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKey

  2. Margin of Safety Definition and Examples Used in Safety Basis Documents and the USQ Process

    SciTech Connect (OSTI)

    Beaulieu, R. A.

    2013-10-03

    The Nuclear Safety Management final rule, 10 CFR 830, provides an undefined term, margin of safety (MOS). Safe harbors listed in 10 CFR 830, Table 2, such as DOE?STD?3009 use but do not define the term. This lack of definition has created the need for the definition. This paper provides a definition of MOS and documents examples of MOS as applied in a U.S. Department of Energy (DOE) approved safety basis for an existing nuclear facility. If we understand what MOS looks like regarding Technical Safety Requirements (TSR) parameters, then it helps us compare against other parameters that do not involve a MOS. This paper also documents parameters that are not MOS. These criteria could be used to determine if an MOS exists in safety basis documents. This paper helps DOE, including the National Nuclear Security Administration (NNSA) and its contractors responsible for the safety basis improve safety basis documents and the unreviewed safety question (USQ) process with respect to MOS.

  3. Calendar Year study term 1

    E-Print Network [OSTI]

    Dawson, Jeff W.

    of Solids I Thermodynamics and Heat Transfer Numerical Methods Study Term 4 Engineering Geoscience as a professional engineer. A wide range of topics are covered in the program--from life cycle analysis Systems Modeling Geotechnical Mechanics Water Resources Engineering Civil Engineering Materials Study

  4. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  5. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  6. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  7. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  8. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  9. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  10. Preparing Turkey Safely Turkey provides protein along with other key

    E-Print Network [OSTI]

    Preparing Turkey Safely Nutrition Turkey provides protein along with other key nutrients. A serving is 3 ounces cooked poultry (about the size of a deck of cards). One serving of roasted, skinless turkey protein; iron--8% daily value Right Size Turkey Use this chart as a helpful guide: Whole bird ­ 1 pound

  11. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  12. GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald

    E-Print Network [OSTI]

    Ma, Lena

    GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald Contact: Soil and Water information systems (GIS), geostatistical and statistical methods, space-time landscape modeling, remote laboratory. Available software include: MS Office Suite; MS SQL database; ArcGIS Suite (ESRI) including

  13. November 2012 Key Performance Indicator (KPI): Carbon Management

    E-Print Network [OSTI]

    Evans, Paul

    November 2012 Key Performance Indicator (KPI): Carbon Management NTU report our carbon footprint provided. The carbon emissions are calculated using Carbon Trust conversion factors, as used in NTU's EMS.64 2011/2012 18,130 4.20 The recorded changes in emissions are a result of carbon management projects

  14. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  15. Experimental quantum key distribution without monitoring signal disturbance

    E-Print Network [OSTI]

    Hiroki Takesue; Toshihiko Sasaki; Kiyoshi Tamaki; Masato Koashi

    2015-05-29

    Since the invention of Bennett-Brassard 1984 (BB84) protocol, many quantum key distribution (QKD) protocols have been proposed and some protocols are operated even in field environments. One of the striking features of QKD is that QKD protocols are provably secure unlike cryptography based on computational complexity assumptions. It has been believed that, to guarantee the security of QKD, Alice and Bob have to monitor the statistics of the measurement outcomes which are used to determine the amount of the privacy amplification to generate a key. Recently a new type of QKD protocol, called round robin differential phase shift (RRDPS) protocol, was proposed, and remarkably this protocol can generate a key without monitoring any statistics of the measurement outcomes. Here we report an experimental realization of the RRDPS protocol. We used a setup in which Bob randomly chooses one from four interferometers with different pulse delays so that he could implement phase difference measurements for all possible combinations with five-pulse time-bin states. Using the setup, we successfully distributed keys over 30 km of fiber, making this the first QKD experiment that does not rely on signal disturbance monitoring.

  16. The Seven Keys to Success in Energy Management and Conservation 

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  17. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE­HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN­order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  18. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  19. Appendix 30 Fire Effects on Key Ecological Processes in Forested

    E-Print Network [OSTI]

    Appendix 30 Fire Effects on Key Ecological Processes in Forested Ecosystems The following paragraphs on fire effects on forest succession are from Stickney (1982) Forest Succession ...the severity of the pre-disturbance forest herb species also demonstrated the ability to survive fire, particularly those

  20. Outline Overview Design Principles Key Points Design Principles

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 12 #12-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least Common Mechanism Psychological Acceptability 3 Key Points Ahmad Almulhem - Network Security Engineering - 2008 2 / 12 #12;Outline

  1. Annual Report 2004 1 Key events during 2004

    E-Print Network [OSTI]

    Svenningsson, Josef

    Johansson studying the separation of carbon dioxide in a reactor system for two-stage combustion. #12;1 Key for innovation systems and entrepreneurship A year of anniversaries ­ the University, the Foundation, Chalmers are among those hardest struck,but many holidaying Swedes,especially in Thailand,fall victim to the tsunami

  2. MOLECULAR ENTOMOLOGY Molecular Identification Key for Pest Species of Scirtothrips

    E-Print Network [OSTI]

    Hoddle, Mark S.

    primers and determining the size of the products by using standard agarose gel electrophoresis, followed, Neohydatothrips, molecular identiÞcation key, exotic pests, nondestruc- tive DNA extraction The genus Scirtothrips, several species of Scirtothrips have (or have the potential to) spread from their natural habitats

  3. Introduction Adhesion complexes play key roles in many events, including

    E-Print Network [OSTI]

    Hardin, Jeff

    Introduction Adhesion complexes play key roles in many events, including cell migration cell adhesion are remarkably similar in Caenorhabditis elegans, Drosophila and humans (Hynes and Zhao to reveal much about the basic, conserved molecular mechanisms that mediate and regulate cell adhesion

  4. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  5. news and views A key issue for hydrogen storage materi-

    E-Print Network [OSTI]

    Palumbi, Stephen

    news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

  6. Key Directions and a Roadmap for Electrical Design for Manufacturability

    E-Print Network [OSTI]

    Kahng, Andrew B.

    Key Directions and a Roadmap for Electrical Design for Manufacturability (Invited Talk) Andrew B by design and design-for- manufacturability (DFM) techniques. This talk addresses trends and a roadmap assumptions come true? The second part will give a roadmap for electrical DFM technologies, motivated

  7. Key Title Marine Ecology www.wiley.com

    E-Print Network [OSTI]

    Wall, Diana

    Key Title Marine Ecology www.wiley.com Antarctic Ecosystems: An Extreme Environment in a Changing their genomes. Chapters address both Antarctic terrestrial and marine ecosystems, and the scientific and evolution Part II: Marine habitats and regions Chapter 4. The impact of regional climate change

  8. Key Facts About Hurricane Readiness Preparing for a Hurricane

    E-Print Network [OSTI]

    HURRICANES Key Facts About Hurricane Readiness Preparing for a Hurricane If you are under a hurricane watch or warning, here are some basic steps to take to prepare for the storm: · Learn about your. · Identify potential home hazards and know how to secure or protect them before the hurricane strikes

  9. More SQL Data Definition Database Systems Lecture 6

    E-Print Network [OSTI]

    Alechina, Natasha

    More SQL Data Definition Database Systems Lecture 6 Natasha Alechina #12;More SQL Data Definition In this Lecture · More SQL · DROP TABLE · ALTER TABLE · INSERT, UPDATE, and DELETE · Data dictionary · Sequences · For more information · Connolly and Begg chapters 5 and 6 #12;More SQL Data Definition Creating Tables

  10. More SQL Data Definition Database Systems Lecture 6

    E-Print Network [OSTI]

    Alechina, Natasha

    1 More SQL Data Definition Database Systems Lecture 6 Natasha Alechina More SQL Data Definition In this Lecture · More SQL · DROP TABLE · ALTER TABLE · INSERT, UPDATE, and DELETE · Data dictionary · Sequences · For more information · Connolly and Begg chapters 5 and 6 More SQL Data Definition Creating Tables · From

  11. Michael Rupen EVLA Phase II Definition Aug 23 25, 2001.

    E-Print Network [OSTI]

    Groppi, Christopher

    Michael Rupen EVLA Phase II Definition Meeting Aug 23 ­ 25, 2001. 1 EVLA Phase II Scientific Overview Michael P. Rupen #12;Michael Rupen EVLA Phase II Definition Meeting Aug 23 ­ 25, 2001. 2 New the resolution · Always available! #12;Michael Rupen EVLA Phase II Definition Meeting Aug 23 ­ 25, 2001. 3 NMA

  12. Notes on the CRTDH Group Key Agreement Protocol Spyros Magliveras and Wandi Wei

    E-Print Network [OSTI]

    Magliveras, Spyros

    , the distributed schemes help in the uniform distribution of the work-load for key management and eliminate: xkzou@cs.iupui.edu Abstract Group key management (GKM) is one of the primary is- sues for secure group Key Management (GKM), Contributory Group Key Agreement, Chinese Remainder Theorem, Diffie-Hellman Key

  13. RESEARCH INVOLVING PRISONERS DEFINITIONS AND EXAMPLES

    E-Print Network [OSTI]

    1 RESEARCH INVOLVING PRISONERS 05/30/2008 DEFINITIONS AND EXAMPLES The DUHS IRB reviews and approves research involving prisoners in compliance with 45 CFR 46 Subpart C and other applicable regulations and laws. The provisions of Subpart C apply whenever the research targets prisoners as subjects

  14. Local Constructive Set Theory and Inductive Definitions

    E-Print Network [OSTI]

    Aczel, Peter

    Local Constructive Set Theory and Inductive Definitions Peter Aczel 1 Introduction Local Constructive Set Theory (LCST) is intended to be a local version of con- structive set theory (CST principles, is also acceptable in topos mathematics, the mathematics that can be carried out in an arbi

  15. Key Points of STFC and EPSRC's Fusion for Energy EPSRC and STFC Councils have agreed a revised strategy for fusion for energy

    E-Print Network [OSTI]

    Key Points of STFC and EPSRC's Fusion for Energy Strategy EPSRC and STFC Councils have agreed a revised strategy for fusion for energy research: 1) EPSRC and STFC will support fusion research as a long and demonstrating leadership to realise the goal of fusion energy. 2) EPSRC will develop a long term base funding

  16. Abstract--Wave energy will have a key role in meeting re-newable energy targets en route to a low carbon economy. How-

    E-Print Network [OSTI]

    Harrison, Gareth

    1 Abstract--Wave energy will have a key role in meeting re- newable energy targets en route will impact on wave energy conversion. Where the resource is restricted there may be reductions in energy the sensitivity of wave energy production and econom- ics to changes in climate. Index Terms--Wave energy

  17. Insurable Storage Services: Creating a Marketplace for Long-Term Document Archival

    E-Print Network [OSTI]

    Simha, Rahul

    Insurable Storage Services: Creating a Marketplace for Long-Term Document Archival K. Gopinath1 Washington, DC 20052, USA simha@gwu.edu Abstract Digital storage is a key element not only of computing-capacity storage. At the same time, the storage needs of users have now become more sophisticated and diverse. Some

  18. Carbon Capture and Sequestration: how much does this uncertain option affect near-term policy choices?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Carbon Capture and Sequestration: how much does this uncertain option affect near-term policy Carbon Capture and Sequestration (CCS) as a key option to avoid costly emission reduction. While Carbon Capture and Sequestration (CCS) technologies are receiving increasing atten- tion, mainly

  19. LOCALIZATION EFFECTS AND MEASURE SOURCE TERMS IN NUMERICAL SCHEMES FOR BALANCE LAWS

    E-Print Network [OSTI]

    LOCALIZATION EFFECTS AND MEASURE SOURCE TERMS IN NUMERICAL SCHEMES FOR BALANCE LAWS LAURENT GOSSE corresponds to the general case of a scalar balance law (26). These two problems share the common feature) is the key point and the general balance law, where a long- time decay to some steady regime should occur

  20. LONG-TERM VARIATION IN THE SUN'S ACTIVITY CAUSED BY MAGNETIC ROSSBY WAVES IN THE TACHOCLINE

    E-Print Network [OSTI]

    Usoskin, Ilya G.

    LONG-TERM VARIATION IN THE SUN'S ACTIVITY CAUSED BY MAGNETIC ROSSBY WAVES IN THE TACHOCLINE (10Be and 14C) on the Earth reveal the variation of the Suns magnetic activity over hundreds during the first half of this century. Key words: Sun: activity ­ Sun: interior ­ Sun: oscillations 1

  1. Impact of Biodiesel on the Near-term Performance and Long-term...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performance and Long-term Durability of Advanced Aftertreatment Systems Impact of Biodiesel on the Near-term Performance and Long-term Durability of Advanced Aftertreatment...

  2. Lighting Principles and Terms | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Principles and Terms Lighting Principles and Terms Light quantity, energy consumption, and light quality are the basic principles of lighting. | Photo courtesy of

  3. Distribution and abundance of endangered Florida Key deer on outer islands 

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25

    -based survey data. All outer islands exhibited estimated abundances considerably below carrying capacities, with larger populations occurring closer to Big Pine Key. Results indicated that other islands and complexes such as Ramrod Key, Water Key...

  4. Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01

    "Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

  5. Simple rate-adaptive LDPC coding for quantum key distribution

    E-Print Network [OSTI]

    Mo Li; Chun-Mei Zhang; Zhen-Qiang Yin; Wei Chen; Chuan Wang; Zheng-Fu Han

    2015-05-24

    Although quantum key distribution (QKD) comes from the development of quantum theory, the implementation of a practical QKD system does involve a lot of classical process, such as key reconciliation and privacy amplification, which is called post-processing. Post-processing has been a crucial element to high speed QKD systems, even the bottleneck of it because of its relatively high time consumption. Low density parity check (LDPC) is now becoming a promising approach of overcoming the bottleneck due to its good performance in processing throughput. In this article we propose and simulate an easily implemented but efficiently rate-adaptive LDPC coding approach of reconciliation, different from the previously proposed puncturing- and shortening-based approach. We also give a measure for choosing the optimal LDPC parameter for our rate-adaptive approach according to error rates.

  6. Quantum Hacking on Quantum Key Distribution using Homodyne Detection

    E-Print Network [OSTI]

    Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2014-02-27

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  7. No-signaling Quantum Key Distribution: Solution by Linear Programming

    E-Print Network [OSTI]

    Won-Young Hwang; Joonwoo Bae; Nathan Killoran

    2013-01-15

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csisz\\'ar-K\\"orner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  8. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  9. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  10. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  11. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIALU.S. DepartmentJeanKey Meeting Takeaways from 2014 Meeting

  12. Key Activities in Energy Efficiency | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore: ENERGYKevinKey

  13. Key Concepts in Project Development and Financing in Alaska

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: Project

  14. Vehicle Technologies Office: Key Activities in Vehicles | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-ScaleTechnology|Energy Key

  15. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  16. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  17. Standard Terms and Conditions | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation ofAlbuquerque|SensitiveApril 2, 2014ApplicationLanceStaff DeputyStandard Terms

  18. Loan Terms | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIALU.S.Leadership on CleanUpList of EERE WaiversFunds WebinarsTerms

  19. Short-Term Energy Outlook

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979 1.988 1.996 2.003 1990-2016November3 1 Short-Term (83/3Q)

  20. Short-Term Energy Outlook

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979 1.988 1.996 2.003 1990-2016November3 1 Short-Term

  1. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  2. Web Markup Languages Definitions and examples

    E-Print Network [OSTI]

    Inkpen, Diana

    1 Web Markup Languages Definitions and examples http://www.w3schools.com #12;2 What is HTML? · HTML · The markup tags tell the Web browser how to display the page · An HTML file must have an htm or html file is a complement to HTML, not a replacement. In future Web development it is most likely that XML will be used

  3. Hydrogen storage for vehicular applications: Technology status and key development areas

    SciTech Connect (OSTI)

    Robinson, S.L.; Handrock, J.L.

    1994-04-01

    The state-of-the-art of hydrogen storage technology is reviewed, including gaseous, liquid, hydride, surface adsorbed media, glass microsphere, chemical reaction, and liquid chemical technologies. The review of each technology includes a discussion of advantages, disadvantages, likelihood of success, and key research and development activities. A preferred technological path for the development of effective near-term hydrogen storage includes both cur-rent DOT qualified and advanced compressed storage for down-sized highly efficient but moderate range vehicles, and liquid storage for fleet vehicle applications. Adsorbate media are also suitable for fleet applications but not for intermittent uses. Volume-optimized transition metal hydride beds are also viable for short range applications. Long-term development of coated nanoparticulate or metal matrix high conductivity magnesium alloy, is recommended. In addition, a room temperature adsorbate medium should be developed to avoid cryogenic storage requirements. Chemical storage and oxidative schemes present serious obstacles which must be addressed for these technologies to have a future role.

  4. 2014 CATEE: Collaboration is the Key- Public/Private Partnerships 

    E-Print Network [OSTI]

    Lin, L.

    2014-01-01

    stream_source_info ESL-KT-14-11-24.pdf.txt stream_content_type text/plain stream_size 9508 Content-Encoding UTF-8 stream_name ESL-KT-14-11-24.pdf.txt Content-Type text/plain; charset=UTF-8 2014 CATEE Collaboration... is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston Energy Efficiency Programs 2000...

  5. Upconversion based receivers for quantum hacking resistant quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Gregory S. Kanter

    2015-09-21

    We propose a novel upconversion (sum frequency generation) based quantum-optical setup that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  6. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLC Jump

  7. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to the

  8. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theA

  9. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theAA

  10. Florida Keys El Coop Assn, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpAFlex Fuels Energy Jump to:Flora HomeKeys El Coop

  11. SimTable key tool for preparing, responding to wildfire

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effect Photovoltaics -7541 UnlimitedShift EndShutdownSolar PhotovoltaicSimTable key

  12. Sandia Energy - The Brain: Key To a Better Computer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities General overview of theBrain: Key To a

  13. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecoveryplanning Career Planning for theFebruary 26, 2014andKEY

  14. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclear Physics (NP)aboutRio de Janeiro,theIs Key

  15. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5

  16. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey Dates

  17. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey

  18. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenryInhibitingInteractivePGAS andUniversity IonIron is the Key to

  19. Key Publications - Natural Gas Regulation | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKey

  20. Robotics Key to Subsea Exploration | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The Energy Materials CenterRobotics Key to Subsea

  1. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  2. A look at the PGP ecosystem through the key server data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    to be challenging. GnuPG does not provide library access to low level functions that would allow parsing the data-based encryption systems use a network of key servers to share public keys. These key server operate on an add only basis, thus the data gives us access to PGP public keys from over 20 years of PGP usage. Analyzing

  3. Find More Like This Table 1. Key dimensions of

    E-Print Network [OSTI]

    p, 1 chart, 1 diagram, 9 graphs Document Type: Article Subject Terms: *EMISSIONS trading CARBON of economic burdens among nations; Influence of emissions trading on policy costs. Full Text Word Count: 10068 the reductions attained, and how policy costs may be influenced by emissions trading. We explore the sensitivity

  4. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ] as the 2nd edition of ISO/IEC 11770­2. . In mid 2008, Mathuria and Sriram [19] described new type attacks] is di#erent to the Cheng­ Comley fix, and is not subject to the Mathuria­Sriram attacks. The term `type, see [4]. Before proceeding we note that the Mathuria­Sriram attacks require three consecutive fields

  5. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    Mitchell, Chris

    ] as the 2nd edition of ISO/IEC 11770-2. · In mid 2008, Mathuria and Sriram [19] described new type attacks] is different to the Cheng- Comley fix, and is not subject to the Mathuria-Sriram attacks. The term `type attack proceeding we note that the Mathuria-Sriram attacks require three consecutive fields in one protocol message

  6. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    of ISO/IEC 11770-2. · In mid 2008, Mathuria and Sriram [19] described new type attacks on both mechanism- Comley fix, and is not subject to the Mathuria-Sriram attacks. The term `type attack' refers proceeding we note that the Mathuria-Sriram attacks require three consecutive fields in one protocol message

  7. Implementing Performance-Based Sustainability Requirements for the Low Carbon Fuel Standard – Key Design Elements and Policy Considerations

    E-Print Network [OSTI]

    Yeh, Sonia; Sumner, Daniel A.; Kaffka, Stephen R.; Ogden, J; Jenkins, Bryan M.

    2009-01-01

    Standard – Key Design Elements and Policy ConsiderationsStandard ? Key Design Elements and Policy Considerations:Standard ? Key Design Elements and Policy Considerations:

  8. A passive transmitter for quantum key distribution with coherent light

    E-Print Network [OSTI]

    Marcos Curty; Marc Jofre; Valerio Pruneri; Morgan W. Mitchell

    2011-08-03

    Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, since no externally driven element is required. Typical passive transmitters involve parametric down-conversion. More recently, it has been shown that phase-randomized coherent pulses also allow passive generation of decoy states and Bennett-Brassard 1984 (BB84) polarization signals, though the combination of both setups in a single passive source is cumbersome. In this paper, we present a complete passive transmitter that prepares decoy-state BB84 signals using coherent light. Our method employs sum-frequency generation together with linear optical components and classical photodetectors. In the asymptotic limit of an infinite long experiment, the resulting secret key rate (per pulse) is comparable to the one delivered by an active decoy-state BB84 setup with an infinite number of decoy settings.

  9. The role of naturally occurring waterholes in determining the distribution of Florida Key Deer 

    E-Print Network [OSTI]

    Kim, Ji Yeon

    2009-05-15

    (Big Pine Key Inn Station, 1953) Data on Big Pine Key and the Volume of Daily Fresh Water Shortage on Big Pine Key (From the Result of 1-Year Base Line Simulation)................................................................................ 26...). I used two precipitation data sets to parameterize dv1, one consisting of daily precipitation (inches) from January 1 to December 31, 1953 from the Big Pine Key Inn weather station and one from January 1 to December 31, 2001 from the Key West...

  10. Corporate Performance Measures Definitions | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Corporate Performance Measures Plutonium Metal or Oxide packaged for long-term storage (number of containers): Certified DOE storagetreatmentdisposal (STD) 3013 containers (or...

  11. Short-term energy outlook: Quarterly projections, fourth quarter 1997

    SciTech Connect (OSTI)

    1997-10-14

    The Energy Information Administration (EIA) prepares quarterly short-term energy supply, demand, and price projections for printed publication in January, April, July, and October in the Short-Term Energy Outlook. The details of these projections, as well as monthly updates on or about the 6th of each interim month, are available on the internet at: www.eia.doe.gov/emeu/steo/pub/contents.html. The forecast period for this issue of the Outlook extends from the fourth quarter of 1997 through the fourth quarter of 1998. Values for the fourth quarter of 1997, however, are preliminary EIA estimates (for example, some monthly values for petroleum supply and disposition are derived in part from weekly data reported in EIA`s Weekly Petroleum Status Report) or are calculated from model simulations that use the latest exogenous information available (for example, electricity sales and generation are simulated by using actual weather data). The historical energy data, compiled in the fourth quarter 1997 version of the Short-Term Integrated Forecasting System (STIFS) database, are mostly EIA data regularly published in the Monthly Energy Review, Petroleum Supply Monthly, and other EIA publications. Minor discrepancies between the data in these publications and the historical data in this Outlook are due to independent rounding. The STIFS model is driven principally by three sets of assumptions or inputs: estimates of key macroeconomic variables, world oil price assumptions, and assumptions about the severity of weather. 19 tabs.

  12. Salvage HDR Brachytherapy for Recurrent Prostate Cancer After Previous Definitive Radiation Therapy: 5-Year Outcomes

    SciTech Connect (OSTI)

    Chen, Chien Peter [Department of Radiation Oncology, Scripps Clinic, San Diego, California (United States)] [Department of Radiation Oncology, Scripps Clinic, San Diego, California (United States); Weinberg, Vivian [Comprehensive Cancer Center Biostatistics Core, University of California—San Francisco, San Francisco, California (United States)] [Comprehensive Cancer Center Biostatistics Core, University of California—San Francisco, San Francisco, California (United States); Shinohara, Katsuto [Department of Urology, University of California—San Francisco, San Francisco, California (United States)] [Department of Urology, University of California—San Francisco, San Francisco, California (United States); Roach, Mack; Nash, Marc; Gottschalk, Alexander; Chang, Albert J. [Department of Radiation Oncology, University of California—San Francisco, San Francisco, California (United States)] [Department of Radiation Oncology, University of California—San Francisco, San Francisco, California (United States); Hsu, I-Chow, E-mail: IHsu@radonc.ucsf.edu [Department of Radiation Oncology, University of California—San Francisco, San Francisco, California (United States)] [Department of Radiation Oncology, University of California—San Francisco, San Francisco, California (United States)

    2013-06-01

    Purpose: Evaluate efficacy and toxicity of salvage high-dose-rate brachytherapy (HDRB) for locally recurrent prostate cancer after definitive radiation therapy (RT). Methods and Materials: We retrospectively analyzed 52 consecutively accrued patients undergoing salvage HDRB between 1998 and 2009 for locally recurrent prostate cancer after previous definitive RT. After pathologic confirmation of locally recurrent disease, patients received 36 Gy in 6 fractions. Twenty-four patients received neoadjuvant hormonal therapy before salvage, and no patients received adjuvant hormonal therapy. Determination of biochemical failure after salvage HDRB was based on the Phoenix definition. Overall survival (OS) and bF distributions were calculated using the Kaplan-Meier method. Univariate analyses were performed to identify predictors of biochemical control. Acute and late genitourinary (GU) and gastrointestinal (GI) toxicities, based on Common Terminology Criteria for Adverse Events (version 4), were documented. Results: Median follow-up after salvage HDRB was 59.6 months. The 5-year OS estimate was 92% (95% confidence interval [CI]: 80%-97%) with median survival not yet reached. Five-year biochemical control after salvage was 51% (95% CI: 34%-66%). Median PSA nadir postsalvage was 0.1 (range: 0-7.2) reached at a median of 10.2 months after completing HDRB. As for complications, acute and late grade 3 GU toxicities were observed in only 2% and 2%, respectively. No grade 2 or higher acute GI events and 4% grade 2 GI late events were observed. On univariate analysis, disease-free interval after initial definitive RT (P=.07), percent of positive cores at the time of diagnosis (P=.08), interval from first recurrence to salvage HDRB (P=.09), and pre-HDRB prostate-specific antigen (P=.07) were each of borderline significance in predicting biochemical control after salvage HDRB. Conclusions: Prostate HDRB is an effective salvage modality with relatively few long-term toxicities. We provide potential predictors of biochemical control for prostate salvage HDRB.

  13. Modified definition of group velocity and electromagnetic energy conservation equation

    E-Print Network [OSTI]

    Changbiao Wang

    2015-05-11

    The classical definition of group velocity has two flaws: (a) the group velocity can be greater than the phase velocity and break Fermat's principle in a non-dispersive, lossless, non-conducting, anisotropic uniform medium; (b) the definition is not consistent with the principle of relativity for a plane wave in a moving isotropic uniform medium. To remove the flaws, a modified definition is proposed. A criterion is set up to identify the justification of group velocity definition. A "superluminal power flow" is constructed to show that the electromagnetic energy conservation equation cannot uniquely define the power flow if the principle of Fermat is not taken into account.

  14. Long-term Contract Information and Registrations

    Office of Energy Efficiency and Renewable Energy (EERE)

    DOE/FE orders granting long-term authorization to export liquefied natural gas by vessel require authorization holders to file long-term contract information with DOE/FE for LNG exports and long...

  15. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  16. Descriptive Morphology Terms For MAMA software

    SciTech Connect (OSTI)

    Ruggiero, Christy E.; Porter, Reid B.

    2014-05-21

    The table on the following pages lists a set of morphology terms for describing materials. We have organized these terms by categories. Software uses are welcome to suggest other terms that are needed to accurately describe materials. This list is intended as a initial starting point to generating a consensus terminology list.

  17. Total termination of term rewriting is undecidable

    E-Print Network [OSTI]

    Utrecht, Universiteit

    Total termination of term rewriting is undecidable Hans Zantema Utrecht University, Department Usually termination of term rewriting systems (TRS's) is proved by means of a monotonic well­founded order. If this order is total on ground terms, the TRS is called totally terminating. In this paper we prove that total

  18. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0 Year-1 Year-2Feet)Thousand7,YearCountry Definitions

  19. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0 Year-1 Year-2Feet)Thousand7,YearCountry DefinitionsPoint of

  20. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0 Year-1 Year-2Feet)Thousand7,YearCountry DefinitionsPoint

  1. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0 Year-1 Year-2Feet)Thousand7,YearCountry DefinitionsPointImports

  2. Category:ISGAN Definitions | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButte County,Camilla, Georgia:Geothermal Regulatory RoadmapISGAN Definitions Jump

  3. Property:Definition | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to: navigation, search Property NameDefinition Jump to: navigation, search

  4. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979 1.988 1.996Deutsche BankResidualArea of Entry Definitions

  5. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979 1.988 1.996DeutscheReceipts of Crude OilInput Definitions

  6. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979 1.988 1.996DeutscheReceipts ofInputsArea Definitions

  7. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979 1.988 1.996DeutscheReceipts ofInputsArea DefinitionsAPI

  8. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979 1.988 1.996DeutscheReceiptsCrude Stream Definitions

  9. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  10. Modern hydrocracking is the key to upgrading processes

    SciTech Connect (OSTI)

    Corbett, R.A.

    1989-06-26

    Hydrocracking technology is the key to Canada's heavy oil and bitumen upgrading facilities that have recently started or are due to start up during the next few years. The upgrader at Consumers' Cooperative Refineries Ltd. in Regina Sask.; the capacity addition program (CAP) at Syncrude Canada Ltd.'s Fort McMurray, Alta., plant; Husky Oil Operations Ltd.'s Bi-Provincial upgrader to be built near Lloydminster, Sask.; and the OSLO project to be built near Fort McMurray, all rely on this modern technology for primary upgrading. All of the projects are designed to upgrade heavy oil and bitumen extracted from oil sands to a high-quality synthetic crude oil (SCO) that is a blend of high-quality naphtha and gas oil.

  11. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  12. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  13. Passive decoy state quantum key distribution with practical light sources

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Bing Qi; Tobias Moroder

    2009-11-14

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. While active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty {\\it et al.}, Opt. Lett. {\\bf 34}, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy state setup with an infinite number of decoy settings. In this paper we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photo-detectors. In particular, we consider sources emitting thermal states, phase randomized WCP, and strong coherent light in combination with several types of photo-detectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photo-detectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret ket rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  14. Definition of a Random Variable Distribution Functions Properties of Distribution Functions Random Variables and Distribution Functions

    E-Print Network [OSTI]

    Watkins, Joseph C.

    Definition of a Random Variable Distribution Functions Properties of Distribution Functions Topic 7 Random Variables and Distribution Functions Distribution Functions 1 / 11 #12;Definition of a Random Variable Distribution Functions Properties of Distribution Functions Outline Definition of a Random

  15. Home Biology Medicine Technology Products News Definition Dictionary Movies Links Whole Site Goog

    E-Print Network [OSTI]

    Chiao, Jung-Chih

    Home Biology Medicine Technology Products News Definition Dictionary Movies Links Search RSS Whole Site Goog Navigation Links Biology News Medicine News Biology Products Medicine Products Biology Definition Medicine Definition Biology Technology Medicine Technology Biology Dictionary Medicine Dictionary

  16. Software solutions manage the definition, operation, maintenance and configuration control of the National Ignition Facility

    SciTech Connect (OSTI)

    Dobson, D; Churby, A; Krieger, E; Maloy, D; White, K

    2011-07-25

    The National Ignition Facility (NIF) is the world's largest laser composed of millions of individual parts brought together to form one massive assembly. Maintaining control of the physical definition, status and configuration of this structure is a monumental undertaking yet critical to the validity of the shot experiment data and the safe operation of the facility. The NIF business application suite of software provides the means to effectively manage the definition, build, operation, maintenance and configuration control of all components of the National Ignition Facility. State of the art Computer Aided Design software applications are used to generate a virtual model and assemblies. Engineering bills of material are controlled through the Enterprise Configuration Management System. This data structure is passed to the Enterprise Resource Planning system to create a manufacturing bill of material. Specific parts are serialized then tracked along their entire lifecycle providing visibility to the location and status of optical, target and diagnostic components that are key to assessing pre-shot machine readiness. Nearly forty thousand items requiring preventive, reactive and calibration maintenance are tracked through the System Maintenance & Reliability Tracking application to ensure proper operation. Radiological tracking applications ensure proper stewardship of radiological and hazardous materials and help provide a safe working environment for NIF personnel.

  17. 1.0 Introduction 1.1 Definition of Nanotechnology

    E-Print Network [OSTI]

    1 1.0 Introduction 1.1 Definition of Nanotechnology Nanotechnology is the art and science improvements in technologies for protecting the environment. While many definitions for nanotechnology exist Nanotechnology Initiative (NNI), a U.S. Government research and development (R&D) program established

  18. Formal definition of POTENTIAL ENERGY (valid for conservative forces only)

    E-Print Network [OSTI]

    some kinetic energy as well as some potential energy change along the way. Question: What doespage - 16 Formal definition of POTENTIAL ENERGY (valid for conservative forces only) Given one type of conservative force F UB - UA= - = - Definition of 'Potential energy difference" conserv #12;page - 17

  19. D-Term Series E User Guide Table of Contents

    E-Print Network [OSTI]

    Bordenstein, Seth

    ............................................................................................................... 13 #12;2 Keys and Lamps LED Some of the keys listed below have a built-in Light Emitting Diode (LED

  20. High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors

    E-Print Network [OSTI]

    Spellmeyer, Neal W.

    We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

  1. Blast furnace key to earth's birth P11 Balancing the body clock P14

    E-Print Network [OSTI]

    Liley, David

    Newage Blast furnace key to earth's birth P11 Balancing the body clock P14 Research readies to the stars Julian criBB 11 blast furnace holds key to earth's birth Julian criBB 12 agency audit raises

  2. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  3. The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks #

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks # Johann Großsch, Security. Keywords Wireless networking, security protocols, cryptography, key establishment, energy Inffeldgasse 16a, A--8010 Graz, Austria ABSTRACT Wireless sensor nodes generally face serious limitations

  4. A World Wide Web key to the grass genera of Texas 

    E-Print Network [OSTI]

    Dawson, John Edward

    2001-01-01

    An illustrated dichotomous key to the grass genera of Texas is presented in hypertext markup language (HTML) format. The key combines scanned images of inflorescences, digitized images of dissected spikelets, text descriptions ...

  5. ASTROPHYSICS Thesaurus of key words used in the annual subject indexes

    E-Print Network [OSTI]

    Xu, Ren-Xin

    ASTRONOMY AND ASTROPHYSICS Thesaurus of key words used in the annual subject indexes (valid from processing 03.20.2 Techniques: interferometric 03.20.3 Techniques: miscellaneous #12;2 Thesaurus of key words

  6. Large trees-key climate influencers-die first in drought

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Large trees-key climate influencers-die first in drought Large trees-key climate influencers-die first in drought A team of researchers studied forests worldwide, ranging from...

  7. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  8. Formulas & definitions to know Formulas & definitions that will be provided if Distance formula in 3 dimensions compab = ab

    E-Print Network [OSTI]

    Lozano-Robledo, Alvaro

    Formulas & definitions to know Formulas & definitions that will be provided if needed Distance formula in 3 dimensions compab = a·b |a| Equation of a sphere W = F · D (work, force, distance) Vector of differentiability for a function of two variables arc length formula, arc length function the graph of a function

  9. PURCHASE TERMS AND CONDITION (PTC) Article 1 Scope of application of these terms

    E-Print Network [OSTI]

    The purpose of these standard terms of purchase is to define the framework of the contractual relationship or private entities not subject to the French Government Contracts Code. In these standard terms of purchaseMars 2014 PURCHASE TERMS AND CONDITION (PTC) Article 1 ­ Scope of application of these terms

  10. Key issues of ultraviolet radiation of OH at high altitudes

    SciTech Connect (OSTI)

    Zhang, Yuhuai; Wan, Tian; Jiang, Jianzheng; Fan, Jing

    2014-12-09

    Ultraviolet (UV) emissions radiated by hydroxyl (OH) is one of the fundamental elements in the prediction of radiation signature of high-altitude and high-speed vehicle. In this work, the OH A{sup 2}?{sup +}?X{sup 2}? ultraviolet emission band behind the bow shock is computed under the experimental condition of the second bow-shock ultraviolet flight (BSUV-2). Four related key issues are discussed, namely, the source of hydrogen element in the high-altitude atmosphere, the formation mechanism of OH species, efficient computational algorithm of trace species in rarefied flows, and accurate calculation of OH emission spectra. Firstly, by analyzing the typical atmospheric model, the vertical distributions of the number densities of different species containing hydrogen element are given. According to the different dominating species containing hydrogen element, the atmosphere is divided into three zones, and the formation mechanism of OH species is analyzed in the different zones. The direct simulation Monte Carlo (DSMC) method and the Navier-Stokes equations are employed to compute the number densities of the different OH electronically and vibrationally excited states. Different to the previous work, the trace species separation (TSS) algorithm is applied twice in order to accurately calculate the densities of OH species and its excited states. Using a non-equilibrium radiation model, the OH ultraviolet emission spectra and intensity at different altitudes are computed, and good agreement is obtained with the flight measured data.

  11. Do myoepithelial cells hold the key for breast tumorprogression?

    SciTech Connect (OSTI)

    Polyak, Kornelia; Hu, Min

    2005-11-18

    Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

  12. Time-cost analysis of a quantum key distribution system clocked at 100 MHz

    E-Print Network [OSTI]

    Xiaofan Mo; Itzel Lucio Martinez; Philip Chan; Chris Healey; Steve Hosier; Wolfgang Tittel

    2011-05-18

    We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

  13. Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R; Lantz, Margaret W; Mili, Ali

    2013-01-01

    In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

  14. A Thesis for the Degree of Master An Efficient Tree-based Group Key

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master An Efficient Tree-based Group Key Agreement using Bilinear Map-based Group Key Agreement using Bilinear Map #12;An Efficient Tree-based Group Key Agreement using Bilinear in partial fulfillment of the require- ments for the degree of Master of Science in the School of Engineering

  15. A Thesis for the Degree of Master A New Group Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master A New Group Key Agreement Scheme based on Ternary Tree Sang-won Lee School of Engineering Information and Communications University 2003 #12;A New Group Key Agreement Scheme based on Ternary Tree #12;A New Group Key Agreement Scheme based on Ternary Tree Advisor

  16. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  17. Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2 , Jun Ao3 , and Jianhua Li1 1 School@263.net Abstract. Kallahalla et al. presented a RSA-based Forward Key Rotation mechanism in secure storage present a Forward Key Rotation storage scheme based on discrete logarithm and discuss its security

  18. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

    E-Print Network [OSTI]

    State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University Experimental for energy dissipation mechanism. State Key Laboratory of Disaster Reduction in Civil Engineering #12;· Scope on Horizontal connection. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

  19. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek1, , S presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers

  20. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek 1,# , S presents the first scalable, e#cient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2­KE/3­KE) protocols. We propose three di#erent compilers where

  1. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  2. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12;A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt1,buchmann}@cdc.informatik.tu-darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  3. TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen-way trapdoor function, and then propose a new multivariate public key cryptosystem called TOT, which can though C was broken, its high speed has been affirmed). Keywords: TOT; multivariate public key

  4. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12; A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt 1,buchmann}@cdc.informatik.tu­darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  5. A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the

    E-Print Network [OSTI]

    Zdun, Uwe

    A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise in (all) the new key technology areas, it was hard for the management to estimate which new technologies, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale

  6. A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner Hamburg in the ubiquitous and pervasive comput- ing setting is secure key exchange. The restrictions moti- vate-core in ¢¡¤£¦¥¨§ -CMOS technology are evaluated. 1. Introduction In ubiquitous and pervasive computing scenarios, key

  7. HTGR Mechanistic Source Terms White Paper

    SciTech Connect (OSTI)

    Wayne Moe

    2010-07-01

    The primary purposes of this white paper are: (1) to describe the proposed approach for developing event specific mechanistic source terms for HTGR design and licensing, (2) to describe the technology development programs required to validate the design methods used to predict these mechanistic source terms and (3) to obtain agreement from the NRC that, subject to appropriate validation through the technology development program, the approach for developing event specific mechanistic source terms is acceptable

  8. Renewable Energy Specifications, Testing and Certification Terms...

    Open Energy Info (EERE)

    Renewable Energy Specifications, Testing and Certification Terms of Reference Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Renewable Energy Specifications, Testing...

  9. Genomic definition of species. Revision 1

    SciTech Connect (OSTI)

    Crkvenjakov, R.; Dramanac, R.

    1992-06-01

    A genome is the sum total of the DNA sequences in the cells of an individual organism. The common usage that species possess genomes comes naturally to biochemists, who have shown that all protein and nucleic acid molecules are at the same time species and individual-specific, with minor individual variations being superimposed on a consensus sequence that is constant for a species. By extension, this property is attributed to the common features of DNA in the chromosomes of members of a given species and is called (species) genome. The definition of species based on chromosomes, genes, or genome common to its member organisms has been implied or mentioned in passing numerous times. Some population biologists think that members of species have similar ``homeostatic genotypes,`` which are to a degree resistant to mutation or environmental change in the production of a basic phenotype.

  10. Genomic definition of species. Revision 2

    SciTech Connect (OSTI)

    Crkvenjakov, R.; Drmanac, R.

    1993-03-01

    A genome is the sum total of the DNA sequences in the cells of an individual organism. The common usage that species possess genomes comes naturally to biochemists, who have shown that all protein and nucleic acid molecules are at the same time species- and individual-specific, with minor individual variations being superimposed on a consensus sequence that is constant for a species. By extension, this property is attributed to the common features of DNA in the chromosomes of members of a given species and is called species genome. Our proposal for the definition of a biological species is as follows: A species comprises a group of actual and potential biological organisms built according to a unique genome program that is recorded, and at least in part expressed, in the structures of their genomic nucleic acid molecule(s), having intragroup sequence differences which can be fully interconverted in the process of organismal reproduction.

  11. Societal-Equity-Enhancing Criteria and Facility-Host Incentives Supporting Five Key Elements in the January 2012 Blue Ribbon Commission Report - 13015

    SciTech Connect (OSTI)

    Eriksson, Leif G.; Dials, George E.; George, Critz H.

    2013-07-01

    In February 2009, the Obama Administration announced it would abandon USA's only candidate SNF/HLW-disposal facility since 1987. In 2010, all related activities were stopped and the Blue Ribbon Commission on America's Nuclear Future was established 'to recommend a new strategy for managing the back end of the nuclear fuel cycle', which it did in January 2012, emphasizing eight key elements. However, Key Element 1, 'A new, consent-based approach to siting future nuclear facilities', is qualitative/indeterminate rather than quantitative/measurable. It is thus highly-susceptible to semantic permutations that could extend rather than, as intended, expedite the siting of future nuclear facilities unless it also defines: a) Whose consent is needed?; and b) What constitutes consent? The following 'generic', radiation-risk- and societal-equity-based criteria address these questions: 1. Identify areas affected by projected radiation and other health risks from: a. The proposed nuclear facility (facility stakeholders); and b. The related nuclear-materials-transportation routes (transportation stakeholders); then 2. Surround each stakeholder area with a buffer zone and use this enlarged foot print to identify: a. Stakeholder hosts; and b. Areas not hosting any stakeholder category (interested parties). 3. Define 'consent-based' as being at least 60 percent of the 'population' in the respective stakeholder category and apply this yardstick to both 'in favor' and 'against' votes. Although criteria 1 and 2 also need facility-based definitions to make Key Element 1 measurable, the described siting approach, augmented by related facility-host incentives, would expedite the schedule and reduce the cost for achieving Key Elements 4-6 and 8, politics permitting. (authors)

  12. Definition of Terms Part 772page 1 Export Administration Regulations Bureau of Industry and Security July 16, 2013

    E-Print Network [OSTI]

    "Airship"..........................6 "All compensations available" .........................6 "Allocated

  13. Key establishment à la Merkle in a quantum world

    E-Print Network [OSTI]

    Gilles Brassard; Peter Hoyer; Kassem Kalach; Marc Kaplan; Sophie Laplante; Louis Salvail

    2015-02-13

    In 1974, Ralph Merkle proposed the first unclassified scheme for secure communications over insecure channels. When legitimate communicating parties are willing to spend an amount of computational effort proportional to some parameter N, an eavesdropper cannot break into their communication without spending a time proportional to N^2, which is quadratically more than the legitimate effort. Two of us showed in 2008 that Merkle's schemes are completely insecure against a quantum adversary, but that their security can be partially restored if the legitimate parties are also allowed to use quantum computation: the eavesdropper needed to spend a time proportional to N^{3/2} to break our earlier quantum scheme. Furthermore, all previous classical schemes could be broken completely by the onslaught of a quantum eavesdropper and we conjectured that this is unavoidable. We give now two novel key establishment schemes in the spirit of Merkle's. The first one can be broken by a quantum adversary who makes an effort proportional to N^{5/3}, which is the optimal attack against this scheme. Our second scheme is purely classical, yet it cannot be broken by a quantum eavesdropper who is only willing to expend an effort proportional to that of the legitimate parties. We then introduce two families of more elaborate protocols. The first family consists in quantum protocols whose security is arbitrarily close to quadratic in the query complexity model. The second is a family of classical protocols whose security against a quantum adversary is arbitrarily close to N^{3/2} in the same model.

  14. Short-term energy outlook. Quarterly projections, first quarter 1996

    SciTech Connect (OSTI)

    NONE

    1996-02-01

    The Energy Information Administration (EIA) prepares quarterly, short-term energy supply, demand, and price projections for publication in February, May, August, and November in the Outlook. The forecast period for this issue of the Outlook extends from the first quarter of 1996 through the fourth quarter of 1997. Values for the fourth quarter of 1995, however, are preliminary EIA estimates (for example, some monthly values for petroleum supply and disposition are derived in part from weekly data reported in the Weekly Petroleum Status Report) or are calculated from model simulations using the latest exogenous information available (for example, electricity sales and generation are simulated using actual weather data). The historical energy data, compiled into the first quarter 1996 version of the Short-Term Integrated Forecasting System (STIFS) database, are mostly EIA data regularly published in the Monthly Energy Review, Petroleum Supply Monthly, and other EIA publications. Minor discrepancies between the data in these publications and the historical data in this Outlook are due to independent rounding. The STIFS database is archived quarterly and is available from the National Technical Information Service. The cases are produced using the Short-Term Integrated Forecasting System (STIFS). The STIFS model is driven principally by three sets of assumptions or inputs: estimates of key macroeconomic variables, world oil price assumptions, and assumptions about the severity of weather. Macroeconomic estimates are produced by DRI/McGraw-Hill but are adjusted by EIA to reflect EIA assumptions about the world price of crude oil, energy product prices, and other assumptions which may affect the macroeconomic outlook.

  15. Short-term energy outlook: Quarterly projections, second quarter 1997

    SciTech Connect (OSTI)

    1997-04-01

    The Energy Information Administration (EIA) prepares quarterly short-term energy supply, demand, and price projections for publication in January, April, July, and October in the Outlook. The forecast period for this issue of the Outlook extends from the second quarter of 1997 through the fourth quarter of 1998. Values for the first quarter of 1997, however, are preliminary EIA estimates (for example, some monthly values for petroleum supply and disposition are derived in part from weekly data reported in EIA`s Weekly Petroleum Status Report) or are calculated from model simulations that use the latest exogenous information available (for example, electricity sales and generation are simulated by using actual weather data). The historical energy data, compiled in the second quarter 1997 version of the Short-Term Integrated Forecasting System (STIFS) database, are mostly EIA data regularly published in the Monthly Energy Review, Petroleum Supply Monthly, and other EIA publications. Minor discrepancies between the data in these publications and the historical data in this Outlook are due to independent rounding. The STIFS database is archived quarterly and is available from the National Technical Information Service. The STIFS model is driven principally by three sets of assumptions or inputs: estimates of key macroeconomic variables, world oil price assumptions, and assumptions about the severity of weather. Macroeconomic estimates are produced by DRI/McGraw-Hill but are adjusted by EIA to reflect EIA assumptions about the world price of crude oil, energy product prices, and other assumptions which may affect the macroeconomic outlook. By varying the assumptions, alternative cases are produced by using the Short-Term Integrated Forecasting System (STIFS). 34 figs., 19 tabs.

  16. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    SciTech Connect (OSTI)

    Abercrombie, R. K.; Peters, Scott

    2014-05-28

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

  17. Comparing topological charge definitions using topology fixing actions

    E-Print Network [OSTI]

    Bruckmann, Falk; Jansen, Karl; Marinkovic, Marina; Urbach, Carsten; Wagner, Marc

    2009-01-01

    We investigate both the hyperbolic action and the determinant ratio action designed to fix the topological charge on the lattice. We show to what extent topology is fixed depending on the parameters of these actions, keeping the physical situation fixed. At the same time the agreement between different definitions of topological charge - the field theoretic and the index definition - is directly correlated to the degree topology is fixed. Moreover, it turns out that the two definitions agree very well. We also study finite volume effects arising in the static potential and related quantities due to topology fixing.

  18. Comparing topological charge definitions using topology fixing actions

    E-Print Network [OSTI]

    Falk Bruckmann; Florian Gruber; Karl Jansen; Marina Marinkovic; Carsten Urbach; Marc Wagner

    2010-04-05

    We investigate both the hyperbolic action and the determinant ratio action designed to fix the topological charge on the lattice. We show to what extent topology is fixed depending on the parameters of these actions, keeping the physical situation fixed. At the same time the agreement between different definitions of topological charge - the field theoretic and the index definition - is directly correlated to the degree topology is fixed. Moreover, it turns out that the two definitions agree very well. We also study finite volume effects arising in the static potential and related quantities due to topology fixing.

  19. Compound Term Composition Algebra: The Semantics

    E-Print Network [OSTI]

    Analyti, Anastasia

    classification and analysis see [12, 6, 18, 7, 9, 10, 8]). Having a faceted taxonomy, the indexing of domain Science, FORTH, Heraklion, Greece 3 Laboratoire de Recherche en Informatique, Universite de Paris to specify the meaningful (valid) compound terms (conjunctions of terms) in a given faceted taxonomy

  20. GLOSSARY OF WATER RESOURCES TERMS Compiled by

    E-Print Network [OSTI]

    District of Columbia, University of the

    #12;GLOSSARY OF WATER RESOURCES TERMS Compiled by WRRC Staff D.C. Water Resources Research Center;PREFACE The glossary of water research terms was compiled from a variety of other glossaries, dictionaries. The compilation and preparation of this edition of the glossary was carried out by WRRC staff including Faculty

  1. Confluence of Term Rewriting: Theory and Automation

    E-Print Network [OSTI]

    Middeldorp, Aart

    its theory and its automation. Term rewrite systems are a model of computation in which terms of the requirements for the degree of Doctor of Philosophy advisor: Univ.-Prof. Dr. Aart Middeldorp Innsbruck, 3 (1016683) bertram.felgenhauer@uibk.ac.at 3 February 2015 advisor: Univ.-Prof. Dr. Aart Middeldorp #12

  2. Music at Brasenose Concert Term Card

    E-Print Network [OSTI]

    Oxford, University of

    Music at Brasenose Concert Term Card Trinity Term 2013 All concerts are in Brasenose College Chapel May 1.25pm: Piano Recital Ella Thorpe-Beeston and Katya D'Janoeff (1 st year Music at BNC) Saturday 11 Wednesday 5 th June 1.25pm: HCR Concert (tbc) Friday 7 th June 6.15pm: `Music at Brasenose' concert Eighth

  3. Music at Brasenose Concert Term Card

    E-Print Network [OSTI]

    Oxford, University of

    Music at Brasenose Concert Term Card Michaelmas Term 2012 All concerts are in Brasenose College Horn Triumph Brass quintet is made up of current and former students of the Royal College of Music repertoire. The quintet aspires to entertain their audiences, whilst maintaining the highest musical

  4. UNIVERSITY PLANNING (SCUP) Terms of Reference

    E-Print Network [OSTI]

    Lennard, William N.

    UNIVERSITY PLANNING (SCUP) Terms of Reference: The Committee is the chief forum within Senate for critical appraisal and coordination of long-term strategic, capital and budget plans for the University planning context, it has specific responsibilities as follows: Long-Range Planning To review and recommend

  5. Winter Term University of Oldenburg (Core Provider)

    E-Print Network [OSTI]

    Habel, Annegret

    Evaluation Modul Winter Term Titel Wind Energy Wind Energy I Wind Tutorial Wind Energy Systems Wind Energy Conversion (Lab) Excursion/Wind/DEWI Modul Winter Term Titel Solar Energy PV Systems I Solar Thermal I Solar Tutorial PV Cell Characteristics (Lab) Solar

  6. Wadham College Chapel Trinity Term 2015

    E-Print Network [OSTI]

    Wallace, Mark

    . It is a holy space where we enter into the search for meaning, comfort and rest. Organ Restoration In midWadham College Chapel Trinity Term 2015 #12;Sunday in Chapel 6 pm The principal service in chapel for drinks or (where marked with a star) for a meal together in hall. Our theme this term is Stories of Faith

  7. Warping and F-term uplifting

    E-Print Network [OSTI]

    Philippe Brax; Anne-Christine Davis; Stephen C. Davis; Rachel Jeannerot; Marieke Postma

    2007-09-24

    We analyse the effective supergravity model of a warped compactification with matter on D3 and D7-branes. We find that the main effect of the warp factor is to modify the F-terms while leaving the D-terms invariant. Hence warped models with moduli stabilisation and a small positive cosmological constant resulting from a large warping can only be achieved with an almost vanishing D-term and a F-term uplifting. By studying string-motivated examples with gaugino condensation on magnetised D7-branes, we find that even with a vanishing D-term, it is difficult to achieve a Minkowski minimum for reasonable parameter choices. When coupled to an ISS sector the AdS vacua is uplifted, resulting in a small gravitino mass for a warp factor of order 10^-5.

  8. DOE Releases Common Definition for Zero Energy Buildings, Campuses...

    Office of Environmental Management (EM)

    the U.S. Department of Energy (DOE) reached a significant milestone in bringing the building community together by releasing a common definition for a zero energy building, or...

  9. Genetic Testing Registry GTR Field Definitions -Version 2.0

    E-Print Network [OSTI]

    Levin, Judith G.

    Genetic Testing Registry GTR Field Definitions - Version 2.0 2/19/2015 #12;2 TABLE OF CONTENTS............................................................................................................15 Facility email address and/or URL to web contact form: Text field - Minimal

  10. Using enhancement data for deinterlacing 1080i high definition television

    E-Print Network [OSTI]

    Lin, Andy L

    2009-01-01

    Modern displays deinterlace interlaced high definition television (HDTV) to remove unsightly artifacts. U.S. over-the-air television broadcasting is scheduled to switch to an all-digital format in June, 2009. Therefore, ...

  11. Comparison of different lattice definitions of the topological charge

    E-Print Network [OSTI]

    Krzysztof Cichy; Arthur Dromard; Elena Garcia-Ramos; Konstantin Ottnad; Carsten Urbach; Marc Wagner; Urs Wenger; Falk Zimmermann

    2014-11-05

    We present a comparison of different definitions of the topological charge on the lattice, using a small-volume ensemble with 2 flavours of dynamical twisted mass fermions. The investigated definitions are: index of the overlap Dirac operator, spectral projectors, spectral flow of the Hermitian Wilson-Dirac operator and field theoretic with different kinds of smoothing of gauge fields (HYP and APE smearings, gradient flow, cooling). We also show some results on the topological susceptibility.

  12. Spring Term 2010 Assessment Report Page 1 Spring Term 2010: Assessment of the Learning Outcomes

    E-Print Network [OSTI]

    Marsh, David

    focused on the student learning experience, particularly the teaching methods employed in #12;Spring Term carries many aspects with it, but our main focus has always been on our central learning objectiveSpring Term 2010 Assessment Report Page 1 Spring Term 2010: Assessment of the Learning Outcomes

  13. Integrating short-term demand response into long-term investment planning

    E-Print Network [OSTI]

    De Jonghe, Cedric; Hobbs, Benjamin F.; Belmans, Ronnie

    2011-03-20

    the importance of integrating short-term demand response to time-varying prices into those investment models. Three different methodologies are suggested to integrate short-term responsiveness into a long-term model assuming that consumer response can be modelled...

  14. Long-term Decline of Aggregate Fuel Use per Cargo-ton-mile of Commercial Trucking; A Key Enabler of Expanded U.S. Trade and Economic Growth

    Broader source: Energy.gov [DOE]

    Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER 2007). 13-16 August, 2007, Detroit, Michigan. Sponsored by the U.S. Department of Energy's (DOE) Office of FreedomCAR and Vehicle Technologies (OFCVT).

  15. Laboratory Report on Performance Evaluation of Key Constituents during Pre-Treatment of High Level Waste Direct Feed

    SciTech Connect (OSTI)

    Huber, Heinz J.

    2013-06-24

    The analytical capabilities of the 222-S Laboratory are tested against the requirements for an optional start up scenario of the Waste Treatment and Immobilization Plant on the Hanford Site. In this case, washed and in-tank leached sludge would be sent directly to the High Level Melter, bypassing Pretreatment. The sludge samples would need to be analyzed for certain key constituents in terms identifying melter-related issues and adjustment needs. The analyses on original tank waste as well as on washed and leached material were performed using five sludge samples from tanks 241-AY-102, 241-AZ-102, 241-AN-106, 241-AW-105, and 241-SY-102. Additionally, solid phase characterization was applied to determine the changes in mineralogy throughout the pre-treatment steps.

  16. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  17. Long Term Roadmap for DPNC September 2003

    E-Print Network [OSTI]

    Schibler, Ueli

    Long Term Roadmap for DPNC September 2003 Particle physics is the science to study, at the most experiments, we will organize the roadmap in three paths (the experiments in bold type are those in which

  18. Long term prisoners’ accounts of their sentence 

    E-Print Network [OSTI]

    Schinkel, Marguerite Lucile

    2013-07-02

    This thesis examines how long-term prisoners make sense of their sentence: what they see as its purpose, whether they think it fair and how they integrate their sentence in their life story. Its findings are based on ...

  19. LONG-TERM STEWARDSHIP AT DOE HANFORD SITE - 12575

    SciTech Connect (OSTI)

    MOREN RJ; GRINDSTAFF KD

    2012-01-11

    The U.S. Department of Energy's (DOE) Hanford Site is located in southeast Washington and consists of 1,518 square kilometers (586 square miles) of land. Established in 1943 as part of the Manhattan Project, Hanford workers produced plutonium for our nation's nuclear defense program until the mid 1980's. Since then, the site has been in cleanup mode that is being accomplished in phases. As we achieve remedial objectives and complete active cleanup, DOE will manage Hanford land under the Long-Term Stewardship (LTS) Program until completion of cleanup and the site becomes ready for transfer to the post cleanup landlord - currently planned for DOE's Office of Legacy Management (LM). We define Hanford's LTS Program in the ''Hanford Long-Term Stewardship Program Plan,'' (DOE/RL-201 0-35)[1], which describes the scope including the relationship between the cleanup projects and the LTS Program. DOE designed the LTS Program to manage and provide surveillance and maintenance (S&M) of institutional controls and associated monitoring of closed waste sites to ensure the protection of human health and the environment. DOE's Richland Operations Office (DOE-RL) and Hanford cleanup and operations contractors collaboratively developed this program over several years. The program's scope also includes 15 key activities that are identified in the DOE Program Plan (DOE/RL-2010-35). The LTS Program will transition 14 land segments through 2016. The combined land mass is approximately 570 square kilometers (220 square miles), with over 1,300 active and inactive waste sites and 3,363 wells. Land segments vary from buffer zone property with no known contamination to cocooned reactor buildings, demolished support facilities, and remediated cribs and trenches. DOE-RL will transition land management responsibilities from cleanup contractors to the Mission Support Contract (MSC), who will then administer the LTS Program for DOE-RL. This process requires an environment of cooperation between the contractors and DOE-RL. Information Management (IM) is a key part of the LTS program. The IM Program identifies, locates, stores, protects and makes accessible Hanford LTS records and data to support the transfer of property ultimately to LM. As such, DOE-RL manages the Hanford LTS Program in a manner consistent with LM's goals, policies, and procedures.

  20. File under: A Web name: Admissions Definition of an Ontario Resident [May 17, 1979] Official name: Definition of Ontario Resident [May 17, 1979] Location

    E-Print Network [OSTI]

    Prodiæ, Aleksandar

    File under: A Web name: Admissions ­ Definition of an Ontario Resident [May 17, 1979] Official name: Definition of Ontario Resident [May 17, 1979] Location: https://share.utorcsi.utoronto.ca/sites/gc/Governing%20Council/All%20Policies/A/Definition%20of%20Ontario%20Resident.docx [Official update: May 17, 1979

  1. Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using "Omics" Citation Details In-Document Search Title: Unveiling Microbial Carbon Cycling...

  2. Introduction Soil compaction is the key physical feature that can prevent sustainable woodland

    E-Print Network [OSTI]

    Introduction Soil compaction is the key physical feature that can prevent sustainable woodland risk of physical instability and windthrow due to underdeveloped root systems. This Best Practice

  3. Key Benefits in Using Ethanol-Diesel Blends | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Benefits in Using Ethanol-Diesel Blends Key Benefits in Using Ethanol-Diesel Blends Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER...

  4. 2003 Long-Term Surveillance and Maintenance Program Report

    SciTech Connect (OSTI)

    2004-07-01

    Radioactive waste was created by the Federal Government and private industry at locations around the country in support of national defense, research, and civilian power-generation programs. If not controlled, much of this legacy waste would remain hazardous to human health and the environment indefinitely. Current technology does not allow us to render this waste harmless, so the available methods to control risk rely on consolidation, isolation, and long-term management of the waste. The U.S. Department of Energy (DOE) has an obligation to safely control the radioactive waste and to inform and train future generations to maintain and, perhaps, improve established protections. DOE is custodian for much of the radioactive and other hazardous waste under control of the Federal Government. DOE established the Formerly Utilized Sites Remedial Action Program (FUSRAP) in 1974 and the Defense Decontamination and Decommissioning (D&D) Program and the Surplus Facilities Management Program in the 1980s. Congress passed the Uranium Mill Tailings Radiation Control Act (UMTRCA) in 1978. These federal programs and legislation were established to identify, remediate, and manage legacy waste. Remedial action is considered complete at a radioactive waste site when the identified hazardous material is isolated and the selected remedial action remedy is in place and functioning. Radioactive or other hazardous materials remain in place as part of the remedy at many DOE sites. Long-term management of radioactive waste sites incorporates a set of actions necessary to maintain protection of human health and the environment. These actions include maintaining physical impoundment structures in good repair to ensure that they perform as designed, preventing exposure to the wastes by maintaining access restrictions and warnings, and recording site conditions and activities for future custodians. Any actions, therefore, that will prevent exposure to the radioactive waste now or in the future are part of long-term site management. In response to post-closure care requirements set forth in UMTRCA, DOE Headquarters established the Long-Term Surveillance and Maintenance (LTS&M) Program in 1988 at the DOE office in Grand Junction, Colorado. The program assumed long-term management responsibility for sites remediated under UMTRCA and other programs. Since its inception, the LTS&M Program has evolved in response to changing stakeholder needs, improvements in technology, and the addition of more DOE sites as remediation is completed. The mission of the LTS&M Program was to fulfill DOE’s responsibility to implement all activities necessary to ensure regulatory compliance and to protect the public and the environment from long-lived wastes associated with the nation’s nuclear energy, weapons, and research activities. Key components of the LTS&M Program included stakeholder participation, site monitoring and maintenance, records and information management, and research and technology transfer. This report presents summaries of activities conducted in 2003 in fulfillment of the LTS&M Program mission. On December 15, 2003, DOE established the Office of Legacy Management (LM) to allow for optimum management of DOE’s legacy responsibilities. Offices are located in Washington, DC, Grand Junction, Colorado, Morgantown, West Virginia, and Pittsburgh, Pennsylvania, to perform long-term site management, land management, site transition support, records management, and other related tasks. All activities formerly conducted under the LTS&M Program have been incorporated into the Office of Land and Site Management (LM–50), as well as management of remedies involving ground water and surface water contaminated by former processing activities.

  5. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  6. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Na¨im Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  7. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  8. Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    (and tamper-resistance), limited computing power and memory space, inability to perform public challenges for communication security: no public-key cryptography can be used, only symmetric algorithms is that there is no communication overhead due to evolution of keys ­ this is important, since energy consumption for communication

  9. Band structures Optical absorption Summary Key concepts in Density Functional Theory (II)

    E-Print Network [OSTI]

    Botti, Silvana

    Band structures Optical absorption Summary Key concepts in Density Functional Theory (II) Kohn-Sham scheme, band structure and optical spectra Silvana Botti European Theoretical Spectroscopy Facility (ETSF, Belfast Key concepts in Density Functional Theory (II) Silvana Botti #12;Band structures Optical

  10. MOLECULAR PHYSICS, 2002, VOL. 100, NO. 11, 16591675 Key properties of monohalogen substituted phenols: interpretation

    E-Print Network [OSTI]

    Nguyen, Minh Tho

    MOLECULAR PHYSICS, 2002, VOL. 100, NO. 11, 1659±1675 Key properties of monohalogen substituted August 2001; accepted 31 December 2001) This paper is an attempt to bridge the key properties by Runge from coal tar [1] in 1834 and named pheÂnol by Gerhardt in 1843 [2] (see also Laurent [3

  11. FFT-Based Key Recovery for the Integral Attack Yosuke Todo

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FFT-Based Key Recovery for the Integral Attack Yosuke Todo NTT Secure Platform Laboratories Abstract. The integral attack is one of the most powerful attack against block ciphers. In this paper, we propose two new techniques for the integral attack, the FFT technique and the key concealment technique

  12. Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol

    E-Print Network [OSTI]

    Sonny Lumbantoruan; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2010-03-11

    In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this paper, we show that by assigning different transmission probability to each transmitted qubit within a single polarization basis, we can generally improve the key generation rate of the BB84 protocol and achieve a higher key rate.

  13. Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives

    E-Print Network [OSTI]

    is a multilateral effort to develop the next generation of economical and safe nuclear reactors, and the ITERBetter Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas

  14. Generating RSA Keys on a Handheld Using an Untrusted Server Nagendra Modadugu Dan Boneh Michael Kim

    E-Print Network [OSTI]

    Boneh, Dan

    Æciently generate RSA keys on a low power handheld device with the help of an untrusted server. Most of the key power handheld device is somewhat problematic. For example, generating a 1024 bit RSA signature life time is a concern. Consider a user who is given a new cellphone application while traveling

  15. Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing- able, server-passive and user-anonymous timed release public-key encryption scheme which allows precise in our scheme is completely passive -- no interaction between it and the sender or receiver is needed

  16. Secure Key Management in the Cloud Ivan Damgrd1, Thomas P. Jakobsen1,,

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Secure Key Management in the Cloud Ivan Damgård1, Thomas P. Jakobsen1,, Jesper Buus Nielsen1 of assistance from outside the cloud when doing the transition. We study the levels of security one can on their practical performance. Keywords: Information security, cloud computing, cloud cryptography, secure key man

  17. Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Schage Jorg Schwenk

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Sch¨age J efficient attacks on the na¨ive combination of these protocols. In this paper, we propose new compilers challenge(s) exchanged during authentication. Keywords: authenticated key agreement, protocol compiler, TLS

  18. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  19. Key Frame Selection Algorithms for Automatic Generation of Panoramic Images from

    E-Print Network [OSTI]

    Shahabi, Cyrus

    acquire and fuse various sensor data (e.g., geospatial metadata) together with video to create sensor, and possibly even on-demand. Our experimental results demonstrate that by using geospatial metadata qual- ity. Key words:Geo-tagged videos, crowdsourcing, key frame selection, geospa- tial metadata

  20. On the Communication Complexity of Secret Key Generation in the Multiterminal Source Model

    E-Print Network [OSTI]

    Kashyap, Navin

    On the Communication Complexity of Secret Key Generation in the Multiterminal Source Model Manuj Mukherjee Navin Kashyap Abstract--Communication complexity refers to the minimum rate of public communication required for generating a maximal- rate secret key (SK) in the multiterminal source model of Csisz

  1. Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks

    E-Print Network [OSTI]

    Heys, Howard

    Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks Xueying-- In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless energy efficiency with a level of security suitable for wireless sensor networks. Keywords - wireless

  2. On The IndistinguishabilityBased Security Model of Key Agreement Protocols-Simple Cases 1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On The Indistinguishability­Based Security Model of Key Agreement Protocols-Simple Cases 1 Zhaohui University White Hart Lane, London N17 8HR, United Kingdom {m.z.cheng of authenticated key agreement protocols in simple cases have been evolving for more than ten years. In this paper

  3. On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases1 Zhaohui University White Hart Lane, London N17 8HR, United Kingdom {m.z.cheng of authenticated key agreement protocols in simple cases have been evolving for more than ten years. In this paper

  4. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two

  5. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two

  6. Evaluation of the effects of a highway improvement project on Key deer 

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30

    Deer-vehicle collisions (DVCs) along a 5.6-km segment of United States Highway 1 (US 1) on Big Pine Key (BPK), Florida responsible for approximately 26% of endangered Florida Key deer (Odocoileus virginianus clavium) annual mortalities. The Florida...

  7. Ntru-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Ntr¯u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra Ehsan Malekian) as well as non-associative Octonions (a power-associative and alternative algebra of dimension eight over: Public Key Cryptography, Ntr¯u, Alternative algebra, lattice based cryptogra- phy, non

  8. Proxy Key Re-encapsulation Mechanism for Group Communications Chunbo Ma and Jun Ao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    - 1 - Proxy Key Re-encapsulation Mechanism for Group Communications Chunbo Ma and Jun Ao School. China machunbo@guet.edu.cn Abstract. Many practical applications use hybrid encryption mechanism to deal scheme is poor. The key encapsulation is a crucial part in hybrid encryption mechanism, which allows

  9. Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    and 192, 256-bit key AES for TOP SECRET information [19]. In the last ten years AES has been subject 197 [18]. In June 2003 the US government has approved the use of 128, 192, 256 bit key AES for SECRET block. We concatenate four such local collisions together and add another 6-round trail on top in order

  10. Reaction Attacks on Public Key Cryptosystems Based on the Word Problem

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Reaction Attacks on Public Key Cryptosystems Based on the Word Problem Mar#19;#16;a Isabel Gonz#19 for public key cryptosystems based on the hardness of the word problem for #12;nitely presented groups. In particular, the evidenced hardness of the classical problems for #12;nitely presented groups (the word

  11. A 100 MHz MEMS SiBAR Phase Modulator for Quadrature Phase Shift Keying

    E-Print Network [OSTI]

    Ayazi, Farrokh

    A 100 MHz MEMS SiBAR Phase Modulator for Quadrature Phase Shift Keying Logan Sorenson and Farrokh of a MEMS resonator to form the basic component of a switchless quadrature phase shift keying (QPSK) scheme. INTRODUCTION In recent years, microelectromechanical systems (MEMS)- based solutions have gained acceptance

  12. A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks$

    E-Print Network [OSTI]

    Merro, Massimo

    analysis of three well-known key management protocols for wireless sensor networks: µTESLA, LEAP+ and Li. Introduction Wireless sensors are small and cheap devices powered by low-energy batteries, equipped with radio protocol. Due to resource limitations, all key management protocols for WSNs, such as µTESLA [1], LiSP [2

  13. The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean

    E-Print Network [OSTI]

    The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean Phoebe J. Lam1 concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll a key source of bioavailable Fe to the HNLC North Pacific. Keywords: iron, continental margin, HNLC 1

  14. Matrix Codes and Multitone Frequency Shift Keying for Power Line Communications

    E-Print Network [OSTI]

    Chee, Yeow Meng

    Matrix Codes and Multitone Frequency Shift Keying for Power Line Communications Yeow Meng Chee, Han Technological University, Singapore Abstract--Single-tone frequency shift keying (FSK) modulation with permutation codes has been found to be useful in addressing the problem of narrowband noise disturbance

  15. Short-term energy outlook, quarterly projections, first quarter 1998

    SciTech Connect (OSTI)

    1998-01-01

    The forecast period for this issue of the Outlook extends from the first quarter of 1998 through the fourth quarter of 1999. Values for the fourth quarter of 1997, however, are preliminary EIA estimates (for example, some monthly values for petroleum supply and disposition are derived in part from weekly data reported in EIA`s Weekly Petroleum Status Report) or are calculated from model simulations that use the latest exogenous information available (for example, electricity sales and generation are simulated by using actual weather data). The historical energy data, compiled in the first quarter 1998 version of the Short-Term Integrated Forecasting System (STIFS) database, are mostly EIA data regularly published in the Monthly Energy Review, Petroleum Supply Monthly, and other EIA publications. Minor discrepancies between the data in these publications and the historical data in this Outlook are due to independent rounding. The STIFS model is driven principally by three sets of assumptions or inputs: estimates of key macroeconomic variables, world oil price assumptions, and assumptions about the severity of weather. Macroeconomic estimates are adjusted by EIA to reflect EIA assumptions which may affect the macroeconomic outlook. By varying the assumptions, alternative cases are produced by using the STIFS model. 24 figs., 19 tabs.

  16. Holographic Entanglement for Chern-Simons Terms

    E-Print Network [OSTI]

    Tatsuo Azeyanagi; R. Loganayagam; Gim Seng Ng

    2015-08-04

    We derive the holographic entanglement entropy contribution from pure and mixed gravitational Chern-Simons(CS) terms in AdS$_{2k+1}$. This is done through two different methods : first, by a direct evaluation of CS action in a holographic replica geometry and second by a descent of Dong's derivation applied to the corresponding anomaly polynomial. In lower dimensions $(k=1,2)$, the formula coincides with the Wald-Tachikawa formula for black hole entropy from gravitational CS terms. New extrinsic curvature corrections appear for $k\\geq 3$ : we give explicit and concise expressions for the two pure gravitational CS terms in AdS$_7$ and present various consistency checks, including agreements with the black hole entropy formula when evaluated at the bifurcation surface.

  17. Semantic Features for Classifying Referring Search Terms

    SciTech Connect (OSTI)

    May, Chandler J.; Henry, Michael J.; McGrath, Liam R.; Bell, Eric B.; Marshall, Eric J.; Gregory, Michelle L.

    2012-05-11

    When an internet user clicks on a result in a search engine, a request is submitted to the destination web server that includes a referrer field containing the search terms given by the user. Using this information, website owners can analyze the search terms leading to their websites to better understand their visitors needs. This work explores some of the features that can be used for classification-based analysis of such referring search terms. We present initial results for the example task of classifying HTTP requests countries of origin. A system that can accurately predict the country of origin from query text may be a valuable complement to IP lookup methods which are susceptible to the obfuscation of dereferrers or proxies. We suggest that the addition of semantic features improves classifier performance in this example application. We begin by looking at related work and presenting our approach. After describing initial experiments and results, we discuss paths forward for this work.

  18. Experimental Passive Round-Robin Differential Phase-Shift Quantum Key Distribution

    E-Print Network [OSTI]

    Jian-Yu Guan; Zhu Cao; Yang Liu; Guo-Liang Shen-Tu; Jason S. Pelc; M. M. Fejer; Cheng-Zhi Peng; Xiongfeng Ma; Qiang Zhang; Jian-Wei Pan

    2015-05-29

    In quantum key distribution (QKD), the bit error rate is used to estimate the information leakage and hence determines the amount of privacy amplification --- making the final key private by shortening the key. In general, there exists a threshold of the error rate for each scheme, above which no secure key can be generated. This threshold puts a restriction on the environment noises. For example, a widely used QKD protocol --- BB84 --- cannot tolerate error rates beyond 25%. A new protocol, round-robin differential phase shifted (RRDPS) QKD, essentially removes this restriction and can in principle tolerate more environment disturbance. Here, we propose and experimentally demonstrate a passive RRDPS QKD scheme. In particular, our 500 MHz passive RRDPS QKD system is able to generate a secure key over 50 km with a bit error rate as high as 29%. This scheme should find its applications in noisy environment conditions.

  19. Remote Key Establishment by Mode Mixing in Multimode Fibres and Optical Reciprocity

    E-Print Network [OSTI]

    Bromberg, Yaron; Popoff, Sebastien M; Cao, Hui

    2015-01-01

    Disorder and scattering in photonic systems have long been considered a nuisance that should be circumvented. Recently, disorder has been harnessed for a rapidly growing number of applications, including imaging, sensing and spectroscopy. The chaotic dynamics and extreme sensitivity to external perturbations make random media particularly well-suited for optical cryptography. However, using random media for distribution of secret keys between remote users still remains challenging, since it requires the users have access to the same scattering system. Here we utilize random mode mixing in multimode fibres to generate and distribute keys simultaneously. Fast fluctuations in the fibre mode mixing provide the source of randomness for the key generation, and optical reciprocity guarantees that the keys at the two ends of the fibre are identical. We experimentally demonstrate the scheme using classical light and off-the-shelf components, opening the door for cost effective key establishment at the physical-layer o...

  20. Moduli stabilization, F-term uplifting and soft supersymmetry breaking terms

    E-Print Network [OSTI]

    Hiroyuki Abe; Tetsutaro Higaki; Tatsuo Kobayashi; Yuji Omura

    2007-01-21

    We study moduli stabilization with F-term uplifting. As a source of uplifting F-term, we consider spontaneous supersymmetry breaking models, e.g. the Polonyi model and the Intriligator-Seiberg-Shih model. We analyze potential minima by requiring almost vanishing vacuum energy and evaluate the size of modulus F-term. We also study soft SUSY breaking terms. In our scenario, the mirage mediation is dominant in gaugino masses. Scalar masses can be comparable with gaugino masses or much heavier, depending on couplings with spontaneous supersymmetry breaking sector.

  1. Short-Term Farm Credit in Texas. 

    E-Print Network [OSTI]

    Lee, Virgil P.

    1927-01-01

    contains analysis of information on short-term farm credit received from 455 farmers, 52 bankers, and 279 merchants. The study indicates that about 69 per cent of the farmers in Texas received short-term credit in 1925. Banks are the most important... source. Approximately 83 per cent of those receiving credit obtained all or a part of it from banks, 52 per cent received credit from merchants, and 17 per cent received credit from individuals. Approximately 53 per cent of the bank loans were secured...

  2. Term Structure Dynamics with Macroeconomic Factors 

    E-Print Network [OSTI]

    Park, Ha-Il

    2011-02-22

    that this considerably reduces the statistical tension between matching the rst and second moments of interest rates. In terms of forecasting yields, the models with the velocity of money outperform among the ATSMs examined, including those with in ation and real... rate into an a ne term structure model by imposing cross-equation restrictions from no-arbitrage using daily data. In doing so, I identify the high- frequency monetary policy rule that describes the central bank?s reaction to expected in ation and real...

  3. Habitat-Lite: A GSC case study based on free text terms for environmental metadata

    SciTech Connect (OSTI)

    Kyrpides, Nikos; Hirschman, Lynette; Clark, Cheryl; Cohen, K. Bretonnel; Mardis, Scott; Luciano, Joanne; Kottmann, Renzo; Cole, James; Markowitz, Victor; Kyrpides, Nikos; Field, Dawn

    2008-04-01

    There is an urgent need to capture metadata on the rapidly growing number of genomic, metagenomic and related sequences, such as 16S ribosomal genes. This need is a major focus within the Genomic Standards Consortium (GSC), and Habitat is a key metadata descriptor in the proposed 'Minimum Information about a Genome Sequence' (MIGS) specification. The goal of the work described here is to provide a light-weight, easy-to-use (small) set of terms ('Habitat-Lite') that captures high-level information about habitat while preserving a mapping to the recently launched Environment Ontology (EnvO). Our motivation for building Habitat-Lite is to meet the needs of multiple users, such as annotators curating these data, database providers hosting the data, and biologists and bioinformaticians alike who need to search and employ such data in comparative analyses. Here, we report a case study based on semi-automated identification of terms from GenBank and GOLD. We estimate that the terms in the initial version of Habitat-Lite would provide useful labels for over 60% of the kinds of information found in the GenBank isolation-source field, and around 85% of the terms in the GOLD habitat field. We present a revised version of Habitat-Lite and invite the community's feedback on its further development in order to provide a minimum list of terms to capture high-level habitat information and to provide classification bins needed for future studies.

  4. Collaboration in long-term stewardship at DOE Hanford Site

    SciTech Connect (OSTI)

    Moren, R. J.; Zeisloft, J. H.; Feist, E. T.; Brown, D.; Grindstaff, K. D.

    2013-01-10

    The U.S. Department of Energy's (DOE) Hanford Site comprises approximately 1,517 km{sup 2} (586 mi{sup 2}) of land in southeastern Washington. The site was established in 1943 as part of the Manhattan Project to produce plutonium for the nation's nuclear weapons program. As the Cold War era came to an end, the mission of the site transitioned from weapons production to environmental cleanup. As the River Corridor area of the site cleanup is completed, the mission for that portion of the site will transition from active cleanup to continued protection of environment through the Long-Term Stewardship (LTS) Program. The key to successful transition from cleanup to LTS is the unique collaboration among three (3) different DOE Programs and three (3) different prime contractors with each contractor having different contracts. The LTS Program at the site is a successful model of collaboration resulting in efficient resolution of issues and accelerated progress that supports DOE's Richland Office 2015 Vision for the Hanford Site. The 2015 Vision for the Hanford Site involves shrinking the active cleanup footprint of the surface area of the site to approximately 20 mi{sup 2} on the Central Plateau. Hanford's LTS Program is defined in DOE's planning document, Hanford Long-Term Stewardship Program Plan, DOE/RL-2010-35 Rev 1. The Plan defines the relationship and respective responsibilities between the federal cleanup projects and the LTS Program along with their respective contractors. The LTS Program involves these different parties (cleanup program and contractors) who must work together to achieve the objective for transition of land parcels. Through the collaborative efforts with the prime contractors on site over the past two years, 253.8 km{sup 2} (98 mi{sup 2}) of property has been successfully transitioned from the cleanup program to the LTS Program upon completion of active surface cleanup. Upcoming efforts in the near term will include transitioning another large parcel that includes one of the six (6) cocooned reactors on site. These accomplishments relied upon the transparency between DOE cleanup programs and their contractors working together to successfully transition the land while addressing the challenges that arise. All parties, the three different DOE Programs and their respective prime contractors are dedicated to working together and continuing the progress of transitioning land to LTS, in alignment with the Program Plan and compliant with contractual requirements. This paper highlights the accomplishments and collaborative efforts to address the challenges faced as work progresses from the cleanup to transitioning of land parcels to LTS Program.

  5. Home Biology Medicine Technology Products News Definition Dictionary Movies Links Tags Search RSS Whole Site Google Search

    E-Print Network [OSTI]

    Espinosa, Horacio D.

    Home Biology Medicine Technology Products News Definition Dictionary Movies Links Tags Search RSS Whole Site Google Search Navigation Links Biology News Medicine News Biology Products Medicine Products Biology Definition Medicine Definition Biology Technology Medicine Technology Biology Dictionary Medicine

  6. Terms of Reference Information Security Group

    E-Print Network [OSTI]

    Haase, Markus

    Terms of Reference Information Security Group Version 3.1 8 March 2011 © University of Leeds 2011 Security Group Information Security Management 3.1 (8/3/11) Page 2 of 4 Document Control Owner: Kevin Darley, IT Security Co-ordinator, Information Systems Services, University of Leeds Source Location: V

  7. Risk Management Steering Committee Terms of Reference

    E-Print Network [OSTI]

    Victoria, University of

    Risk Management Steering Committee Terms of Reference October 2009 1.0 Purpose The purposes Facilities Management Risk and Insurance Analyst Associate Vice-President Human Resources Administrative of the Steering Committee are: a) to follow a continuous process to understand and communicate risk from

  8. Campus Planning Committee Terms of Reference

    E-Print Network [OSTI]

    Victoria, University of

    1 Campus Planning Committee Terms of Reference Type: Advisory to President Charge: 1. Recognizing the academic priorities of the institution, the Committee shall advise the President on: a) the long-range plan for the physical development of the Campus; b) amendments to the approved campus plan; c) the University's proposed

  9. Termination Analysis of Term Rewriting by Polynomial

    E-Print Network [OSTI]

    Middeldorp, Aart

    Termination Analysis of Term Rewriting by Polynomial Interpretations and Matrix Interpretations of the University of Innsbruck in partial fulfillment of the requirements for the degree of "Doktor der technischen Wissenschaften" advisor: Univ.-Prof. Dr. Aart Middeldorp Innsbruck, March 2012 #12;#12;dissertation Termination

  10. (Mid-term evaluation of the Central America Rural Electrification Support program)

    SciTech Connect (OSTI)

    Perlack, R.D.

    1990-03-30

    Oak Ridge National Laboratory (ORNL) was requested by Regional Office for Central America and Panama (ROCAP) to conduct a mid-term evaluation of the CARES project. Numerous meetings were held with National Rural Electric Cooperative Association (NRECA) staff, ROCAP staff, and local officials in Guatemala, Honduras, and Belize. In general, the CARES project has been quite successful in a number of key areas as well as in soliciting support from utilities and US Agency for International Development (USAID) Missions. Changes were recommended in the area of report writing and some management activities. It was also recommended that any new activities be considered in the light of the availability of local personnel.

  11. GRADUATE RESEARCH ASSISTANT (GRA) TERM PERFORMANCE EVALUATION DUE: LAST DAY OF EACH TERM OF APPOINTMENT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    GRADUATE RESEARCH ASSISTANT (GRA) TERM PERFORMANCE EVALUATION DUE: LAST DAY OF EACH TERM No N/A If yes: By Grad School By Department When: Were the expectations made known to the GRA? Yes those functions that apply to the GRA. Otherwise select N/A.) RESEARCH FUNCTIONS PERFORMANCE LEVEL

  12. Determining Long-Term Performance of Cool Storage Systems from Short-Term Tests, Final Report 

    E-Print Network [OSTI]

    Reddy, T. A.; Elleson, J.; Haberl, J. S.

    2000-01-01

    This is the final report for ASHRAE Research Project 1004-RP: Determining Long-Term Performance of Cool Storage Systems from Short-Term Tests. This report presents the results of the development and application of the methodology to Case Study #2...

  13. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  14. Definition, Expansion and Screening of Architectures for Planetary Exploration Class Nuclear Electric Propulsion and Power Systems

    E-Print Network [OSTI]

    Definition, Expansion and Screening of Architectures for Planetary Exploration Class Nuclear, expansion and screening of Nuclear Electric Propulsion and Power concepts capable of achieving planetary left blank 2 #12;Definition, Expansion and Screening of Architectures for Planetary Exploration Class

  15. On Wright’s Inductive Definition of Coherence Truth for Arithmetic 

    E-Print Network [OSTI]

    Ketland, Jeffrey

    2000-01-01

    In “Truth – A Traditional Debate Reviewed” (1999), Crispin Wright proposed an inductive definition of “coherence truth” for arithmetic relative to an arithmetic base theory B. Wright’s definition is in fact a notational ...

  16. Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks

    SciTech Connect (OSTI)

    Patel, K. A.; Dynes, J. F.; Lucamarini, M.; Choi, I.; Sharpe, A. W.; Yuan, Z. L. Shields, A. J.; Penty, R. V.

    2014-02-03

    We demonstrate quantum key distribution (QKD) with bidirectional 10 Gb/s classical data channels in a single fiber using dense wavelength division multiplexing. Record secure key rates of 2.38 Mbps and fiber distances up to 70?km are achieved. Data channels are simultaneously monitored for error-free operation. The robustness of QKD is further demonstrated with a secure key rate of 445 kbps over 25?km, obtained in the presence of data lasers launching conventional 0 dBm power. We discuss the fundamental limit for the QKD performance in the multiplexing environment.

  17. Level-1 Milestone 350 Definitions v1

    SciTech Connect (OSTI)

    Quinn, T

    2006-11-17

    This milestone is the direct result of work that started seven years ago with the planning for a 100-teraFLOP platform and will be satisfied when 100 teraFLOPS is placed in operation and readied for Stockpile Stewardship Program simulations. The end product of this milestone will be a production-level, high-performance computing system, code named Purple, designed to be used to solve the most demanding stockpile stewardship problems, that is, the large-scale application problems at the edge of our understanding of weapon physics. This fully functional 100 teraFLOPS system must be able to serve a diverse scientific and engineering workload. It must also have a robust code development and production environment, both of which facilitate the workload requirements. This multi-year effort includes major activities in contract management, facilities, infrastructure, system software, and user environment and support. Led by LLNL, the trilabs defined the statement of work for a 100-teraFLOP system that resulted in a contract with IBM known as the Purple contract. LLNL worked with IBM throughout the contract period to resolve issues and collaborated with the Program to resolve contractual issues to ensure delivery of a platform that best serves the Program for a reasonable cost. The Purple system represents a substantial increase in the classified compute resources at LLNL for NNSA. The center computer environment must be designed to accept the Purple system and to scale with the increase of compute resources to achieve required end-to-end services. Networking, archival storage, visualization servers, global file systems, and system software will all be enhanced to support Purple's size and architecture. IBM and LLNL are sharing responsibility for Purple's system software. LLNL is responsible for the scheduler, resource manager, and some code development tools. Through the Purple contract, IBM is responsible for the remainder of the system software including the operating system, parallel file system, and runtime environment. LLNL, LANL, and SNL share responsibility for the Purple user environment. Since LLNL is the host for Purple, LLNL has the greatest responsibility. LLNL will provide customer support for Purple to the tri-labs and as such has the lead for user documentation, negotiating the Purple usage model, mapping of the ASC computational environment requirements to the Purple environment, and demonstrating those requirements have been met. In addition, LLNL will demonstrate important capabilities of the computing environment including full functionality of visualization tools, file transport between Purple and remote site file systems, and the build environment for principle ASC codes. LANL and SNL are responsible for delivering unique capabilities in support of their users, porting important applications and libraries, and demonstrating remote capabilities. The key capabilities that LANL and SNL will test are user authorization and authentication, data transfer, file system, data management, and visualization. SNL and LANL should port and run in production mode a few key applications on a substantial number of Purple nodes.

  18. BWR Source Term Generation and Evaluation

    SciTech Connect (OSTI)

    J.C. Ryman

    2003-07-31

    This calculation is a revision of a previous calculation (Ref. 7.5) that bears the same title and has the document identifier BBAC00000-01717-0210-00006 REV 01. The purpose of this revision is to remove TBV (to-be-verified) -41 10 associated with the output files of the previous version (Ref. 7.30). The purpose of this and the previous calculation is to generate source terms for a representative boiling water reactor (BWR) spent nuclear fuel (SNF) assembly for the first one million years after the SNF is discharged from the reactors. This calculation includes an examination of several ways to represent BWR assemblies and operating conditions in SAS2H in order to quantify the effects these representations may have on source terms. These source terms provide information characterizing the neutron and gamma spectra in particles per second, the decay heat in watts, and radionuclide inventories in curies. Source terms are generated for a range of burnups and enrichments (see Table 2) that are representative of the waste stream and stainless steel (SS) clad assemblies. During this revision, it was determined that the burnups used for the computer runs of the previous revision were actually about 1.7% less than the stated, or nominal, burnups. See Section 6.6 for a discussion of how to account for this effect before using any source terms from this calculation. The source term due to the activation of corrosion products deposited on the surfaces of the assembly from the coolant is also calculated. The results of this calculation support many areas of the Monitored Geologic Repository (MGR), which include thermal evaluation, radiation dose determination, radiological safety analyses, surface and subsurface facility designs, and total system performance assessment. This includes MGR items classified as Quality Level 1, for example, the Uncanistered Spent Nuclear Fuel Disposal Container (Ref. 7.27, page 7). Therefore, this calculation is subject to the requirements of the Quality Assurance Requirements and Description (Ref. 7.28). The performance of the calculation and development of this document are carried out in accordance with AP-3.124, ''Design Calculation and Analyses'' (Ref. 7.29).

  19. Basic definitions and first examples The main result and its proof

    E-Print Network [OSTI]

    Kuske, Dietrich

    Basic definitions and first examples The main result and its proof Concluding remarks Finite of November 2011 Lutz H. Strüngmann FAP Groups #12;Basic definitions and first examples The main result and its proof Concluding remarks Contents 1 Basic definitions and first examples 2 The main result and its

  20. Language Independent System for Definition Extraction: First Results Using Learning Algorithms

    E-Print Network [OSTI]

    Branco, António Horta

    of the main issue to be dealt with is the sparseness of definitions in a corpus. It is a matter of fact that the number of definition bearing sentences is much lesser than the number of sentences to get a balanced data set. For example [8] used a balanced corpus where the definition-bearing sentences