Sample records for key words survey

  1. Word Sense Disambiguation: A Survey ROBERTO NAVIGLI

    E-Print Network [OSTI]

    Navigli, Roberto

    -tagged as "They like/ENJOY grilled/COOKED bass/FISH." WSD has been described as an AI-complete problem [Mallery) I can hear bass sounds. (b) They like grilled bass. The occurrences of the word bass in the two sentences clearly denote different mean- ings: low-frequency tones and a type of fish, respectively

  2. Visualizing Key Words and Trends in a Subset of the US Patent Database Andrew B. Godbehere

    E-Print Network [OSTI]

    Sekhon, Jasjeet S.

    Visualizing Key Words and Trends in a Subset of the US Patent Database Andrew B. Godbehere Laurent of an interactive content visualization tool as applied to a subset of the US Patent Database pertaining to clean ed word is an associated list of patents from the given time window mentioning both the query terms

  3. Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action,

    E-Print Network [OSTI]

    Lubell, Mark

    Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action, environmentalism, collective interest model. Mark Lubell Department The literature on environmental activism has failed to produce a model of individual decision- making explicitly

  4. Key words Science of information, spatio-temporal, semantic and structural information, Darwin channel, noisy constrained capacity.

    E-Print Network [OSTI]

    Szpankowski, Wojciech

    Key words ­ Science of information, spatio-temporal, semantic and structural information, Darwin argue that a new science of information is to rekindle for extraction, comprehension, and manipulation channel, noisy constrained capacity. Wojciech SZPANKOWSKI Department of Computer Science Purdue University

  5. Key words. Emissions markets, Cap-and-trade schemes, Equilibrium models, Environmental MARKET DESIGN FOR EMISSION TRADING SCHEMES

    E-Print Network [OSTI]

    Carmona, Rene

    Key words. Emissions markets, Cap-and-trade schemes, Equilibrium models, Environmental Finance. MARKET DESIGN FOR EMISSION TRADING SCHEMES REN´E CARMONA , MAX FEHR , JURI HINZ , AND ARNAUD PORCHET to help policy makers and regulators understand the pros and the cons of the emissions markets. We propose

  6. Key words: GPS, attitude, inertial GPS was used with ultra-short baselines (2-3 carrier wavelengths) in a triple antenna configuration to obtain aircraft atti-

    E-Print Network [OSTI]

    Stanford University

    Abstract Key words: GPS, attitude, inertial GPS was used with ultra-short baselines (2-3 carrier and yaw respectively. The accuracy and robustness of the system was enhanced by combining the ultra short is currently obtained by spinning rotor or ring laser gyros. In General Aviation (GA) applications a vertical

  7. Key Word List Administrative

    E-Print Network [OSTI]

    Fernandez, Eduardo

    Privacy Policy Recruitment/Retention - Faculty/Emp Recruitment/Retention - Students Recycling Research Efficiency/Maint Vendors Work Environment Work Requests Work Teams 11/2/2012 #12;

  8. Microsoft Word - User Survey Summary_2012-Apr_Redacted.r0.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Surveys Sent: 601 Survey Response Rate: 23.6% 1. How satisfied were you with the availability of facilities and equipment? 77 Very Satisfied 57 Satisfied 4 Neither...

  9. Study of Dating Violence in College Relationships and the Effect of Question Wording on Survey Responses

    E-Print Network [OSTI]

    Ballinger, Leslie 1991-

    2011-04-27T23:59:59.000Z

    ). Another found that from adolescence until college graduation, about 88% of women will experien ce either sexual or physical violence and 63.5% will experience both (Smith, White , and Holland 2003). Yet another study reports 32% of women are i nvolved... perpetrated mi nor incidents and 63% of females perpetrated minor incidents. In this survey version, 70% of the respondents reported having perpetrated at least one minor incident. The rate of mi nor perpetration for men was 60% and 58% for women. Twelve...

  10. A SURVEY OF NONLINEAR CONJUGATE GRADIENT METHODS WILLIAM W. HAGER AND HONGCHAO ZHANG

    E-Print Network [OSTI]

    Zhang, Hongchao

    A SURVEY OF NONLINEAR CONJUGATE GRADIENT METHODS WILLIAM W. HAGER AND HONGCHAO ZHANG Abstract. This paper reviews the development of different versions of nonlinear conjugate gradient methods, with special attention given to global convergence properties. Key words. Nonlinear conjugate gradient methods

  11. Word Domain Disambiguation via Word Sense Disambiguation

    SciTech Connect (OSTI)

    Sanfilippo, Antonio P.; Tratz, Stephen C.; Gregory, Michelle L.

    2006-06-04T23:59:59.000Z

    Word subject domains have been widely used to improve the perform-ance of word sense disambiguation al-gorithms. However, comparatively little effort has been devoted so far to the disambiguation of word subject do-mains. The few existing approaches have focused on the development of al-gorithms specific to word domain dis-ambiguation. In this paper we explore an alternative approach where word domain disambiguation is achieved via word sense disambiguation. Our study shows that this approach yields very strong results, suggesting that word domain disambiguation can be ad-dressed in terms of word sense disam-biguation with no need for special purpose algorithms.

  12. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  13. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  14. Google distance between words

    E-Print Network [OSTI]

    Kjos-Hanssen, Bjørn

    2009-01-01T23:59:59.000Z

    Cilibrasi and Vitanyi have demonstrated that it is possible to extract the meaning of words from the world-wide web. To achieve this, they rely on the number of webpages that are found through a Google search containing a given word and they associate the page count to the probability that the word appears on a webpage. Thus, conditional probabilities allow them to correlate one word with another word's meaning. Furthermore, they have developed a similarity distance function that gauges how closely related a pair of words is. We present a specific counterexample to the triangle inequality for this similarity distance function.

  15. Finance Idol Word Cloud

    Broader source: Energy.gov [DOE]

    This word cloud represents the topics discussed during the Big and Small Ideas: How to Lower Solar Financing Costs breakout session at the SunShot Grand Challenge.

  16. Microsoft Word - fact sheet alternatives and key findings 090214...

    National Nuclear Security Administration (NNSA)

    health of workers and the public. Worker dose would result in additional latent cancer fatality risk of a maximum of 1 chance in 100,000. Public dose would result in...

  17. Microsoft Word - fact sheet alternatives and key findings 090214.docx

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysis andB - H, Page i PART I2MAY

  18. Sky Surveys

    E-Print Network [OSTI]

    Djorgovski, S G; Drake, A J; Graham, M J; Donalek, C

    2012-01-01T23:59:59.000Z

    Sky surveys represent a fundamental data basis for astronomy. We use them to map in a systematic way the universe and its constituents, and to discover new types of objects or phenomena. We review the subject, with an emphasis on the wide-field imaging surveys, placing them in a broader scientific and historical context. Surveys are the largest data generators in astronomy, propelled by the advances in information and computation technology, and have transformed the ways in which astronomy is done. We describe the variety and the general properties of surveys, the ways in which they may be quantified and compared, and offer some figures of merit that can be used to compare their scientific discovery potential. Surveys enable a very wide range of science; that is perhaps their key unifying characteristic. As new domains of the observable parameter space open up thanks to the advances in technology, surveys are often the initial step in their exploration. Science can be done with the survey data alone or a comb...

  19. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  20. STAFF TRAVEL SURVEY 2006 KEY FINDINGS Survey introduction

    E-Print Network [OSTI]

    Brierley, Andrew

    routes. · Car users are most likely to be encouraged to car share if help is given in finding suitable car sharing partners. How do you usually travel to work? Almost half of all staff (46%) drive to work alone. Another 23% car share, giving a total of 70% staff using a car to travel to work. Comparing

  1. Student Survey Management Group The Student Survey Management Group, which reports to the Learning and Teaching Board via the Student Learning

    E-Print Network [OSTI]

    Greenaway, Alan

    Student Survey Management Group The Student Survey Management Group, which reports to the Learning are appropriately timed and "survey fatigue" is minimised. Key Student Surveys The Student Survey Management Group manages five student surveys key to HWU: Student Survey Framework and Process In June 2014, the Learning

  2. The weighted words collector

    E-Print Network [OSTI]

    Boisberranger, Jérémie Du; Ponty, Yann

    2012-01-01T23:59:59.000Z

    Motivated by applications in bioinformatics, we consider the word collector problem, i.e. the expected number of calls to a random weighted generator of words of length $n$ before the full collection is obtained. The originality of this instance of the non-uniform coupon collector lies in the, potentially large, multiplicity of the words/coupons of a given probability/composition. We obtain a general theorem that gives an asymptotic equivalent for the expected waiting time of a general version of the Coupon Collector. This theorem is especially well-suited for classes of coupons featuring high multiplicities. Its application to a given language essentially necessitates some knowledge on the number of words of a given composition/probability. We illustrate the application of our theorem, in a step-by-step fashion, on three exemplary languages, revealing asymptotic regimes in $\\Theta(\\mu(n)\\cdot n)$ and $\\Theta(\\mu(n)\\cdot \\log n)$, where $\\mu(n)$ is the sum of weights over words of length $n$.

  3. Microsoft Word - test | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    test Microsoft Word - test Microsoft Word - test More Documents & Publications Interested Parties - WAPA Public Comment InterestedPartiesCOPSCoWAPA040309.pdf Microsoft Word -...

  4. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  5. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  6. Microsoft Word - SAR 517

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    one of the anomalies, now identified as SWMU 517. During the excavation of this area, concrete rubble was found. The concrete rubble was surveyed by Health Physics and was...

  7. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  8. Microsoft Word - ~7664231.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    USA Fred Gunnerson Nuclear Engineering Program University of Idaho, IdahoFalls, Idaho, USA ABSTRACT One key long-standing issue that must be overcome to fully realize the...

  9. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  10. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  11. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  12. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  13. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  14. Early word learning through communicative inference

    E-Print Network [OSTI]

    Frank, Michael C., Ph. D. Massachusetts Institute of Technology

    2010-01-01T23:59:59.000Z

    How do children learn their first words? Do they do it by gradually accumulating information about the co-occurrence of words and their referents over time, or are words learned via quick social inferences linking what ...

  15. Microsoft Word - Document7 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    - Document7 Microsoft Word - Document7 More Documents & Publications Excess Uranium Inventory Management Plan 2008 Microsoft Word - 25 May Vienna GTR Fact SheetFINAL 1 .doc...

  16. Microsoft Word - appa.docx

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    A7. Transportation sector key indicators and delivered energy consumption (continued) Key indicators and consumption Reference case Annual growth 2011-2040 (percent) 2010 2011 2020...

  17. Working Words: New Approaches to Japanese Studies

    E-Print Network [OSTI]

    Sand , Jordan; Tansman, Alan; Washburn, Dennis

    2011-01-01T23:59:59.000Z

    Wide Web, digital keyword searches replace the idiosyncratic and historically layered relationship between readers and words

  18. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  19. Microsoft Word - Wind Industry Work Order Information Flow Survey...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Jame MUIR DAT dust ation ems W a Natio es Parle, Jona 1 TA SYSTEMS try W n Flo Wind E onal La athan Gibson 1042013 S, INC. Wor ow Energy aborato n, Chad Reese rk O Sur y...

  20. Microsoft Word - MPR-3181 Survey of HTGR Process Energy Applications...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    process, coal gasification, electricity and steam for steel mills and aluminum refining, district heating and desalination. 3. For the longer term, GA has studied methanol...

  1. Microsoft Word - User Survey Summary_2014-Oct.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aging mass spectrometry instruments, we are in the process of acquiring a Thermo Fusion mass spectrometer that should come online by the end of FY2015. We have also partnered with...

  2. Microsoft Word - User Survey Summary_2014-Apr.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Capability Leads to evaluate as part of our annual capital planning. For example, in response to user community demand, we are in the process of purchasing a GC...

  3. Microsoft Word - UserSurvey08results.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1 SECTION A. Revised: April 3,  T T r r a a v8 ALCF

  4. Microsoft Word - UserSurvey09results.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1 SECTION A. Revised: April 3,  T T r r a a v8

  5. Indexing contamination surveys

    SciTech Connect (OSTI)

    Brown, R.L.

    1998-02-06T23:59:59.000Z

    The responsibility for safely managing the Tank Farms at Hanford belongs to Lockheed Martin Hanford Corporation which is part of the six company Project Hanford Management Team led by Fluor Daniel Hanford, Inc.. These Tank Farm Facilities contain numerous outdoor contamination areas which are surveyed at a periodicity consistent with the potential radiological conditions, occupancy, and risk of changes in radiological conditions. This document describes the survey documentation and data tracking method devised to track the results of contamination surveys this process is referred to as indexing. The indexing process takes a representative data set as an indicator for the contamination status of the facility. The data are further manipulated into a single value that can be tracked and trended using standard statistical methodology. To report meaningful data, the routine contamination surveys must be performed in a manner that allows the survey method and the data collection process to be recreated. Three key criteria are necessary to accomplish this goal: Accurate maps, consistent documentation, and consistent consolidation of data meeting these criteria provides data of sufficient quality to be tracked. Tracking of survey data is accomplished by converting the individual survey results into a weighted value, corrected for the actual number of survey points. This information can be compared over time using standard statistical analysis to identify trends. At the Tank Farms, the need to track and trend the facility`s radiological status presents unique challenges. Many of these Tank Farm facilities date back to the second world war. The Tank Farm Facilities are exposed to weather extremes, plant and animal intrusion, as well as all of the normal challenges associated with handling radiological waste streams. Routine radiological surveys did not provide a radiological status adequate for continuing comparisons.

  6. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  7. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  8. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  9. Key Distribution Mechanisms for Wireless Sensor Networks: a Survey

    E-Print Network [OSTI]

    Bystroff, Chris

    of physical attacks to unattended sensors. Moreover, in some deployment sce- narios sensor nodes need, Computer Science Department, Lally 310, 110 8th Street, Troy, NY 12180-3590. Technical Report TR-05

  10. Key Distribution Mechanisms for Wireless Sensor Networks: a Survey

    E-Print Network [OSTI]

    Bystroff, Chris

    of physical attacks to unattended sensors. Moreover, in some deployment sce­ narios sensor nodes need, Computer Science Department, Lally 310, 110 8th Street, Troy, NY 12180­3590. Technical Report TR­05

  11. The birth of a word

    E-Print Network [OSTI]

    Roy, Brandon C. (Brandon Cain)

    2013-01-01T23:59:59.000Z

    A hallmark of a child's first two years of life is their entry into language, from first productive word use around 12 months of age to the emergence of combinatorial speech in their second year. What is the nature of early ...

  12. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  13. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  14. Microsoft Word - figure_03.doc

    U.S. Energy Information Administration (EIA) Indexed Site

    Report"; state agencies; Form EIA-23, "Annual Survey of Domestic Oil and Gas Reserves"; LCI; Ventyx; and the Bureau of Safety and Environmental Enforcement, and...

  15. Microsoft Word - IGCA Inventory Sub Guide 031611 | Department...

    Office of Environmental Management (EM)

    Word - IGCA Inventory Sub Guide 031611 Microsoft Word - IGCA Inventory Sub Guide 031611 Microsoft Word - IGCA Inventory Sub Guide 031611 More Documents & Publications OFFICE OF...

  16. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  17. Words in the brain: lexical determinants of word-induced brain activity

    E-Print Network [OSTI]

    Coulson, Seana

    Words in the brain: lexical determinants of word-induced brain activity Lee Osterhout*, Mark Allen Abstract Many studies have shown that open- and closed-class words elicit different patterns of brain. Introduction Is the brain response to words determined primarily by their linguistic functions

  18. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  19. A Survey of Systemic Risk Analytics

    E-Print Network [OSTI]

    Bisias, Dimitrios

    We provide a survey of 31 quantitative measures of systemic risk in the economics and finance literature, chosen to span key themes and issues in systemic risk measurement and management. We motivate these measures from ...

  20. Microsoft Word - LS310.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    designated to be the beam axis. Using modern survey technology one can establish a control reference system with point accuracies of 150 to 300 m depending on the size of...

  1. JOURNAL AUTHORS SURVEY Prepared by

    E-Print Network [OSTI]

    Stevenson, Paul

    JISC/OSI JOURNAL AUTHORS SURVEY Report Prepared by Key Perspectives Ltd 48 Old Coach Road, Playing behind its development 4 2.2 Models and definitions of open access 8 2.2.1 Open access journals 8 2 4.1 Respondent profiles 18 4.2 Awareness of open access journals 18 4.2.1 Extent and longevity

  2. Microsoft Word - LLNLHRPfinal062606.doc

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 atthe DistrictIndependentDepartment of Energy Microsoft Word -HUMAN

  3. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  4. BUSINESSES AS ONE OF THE KEY ELEMENTS OF A REGION'S SUSTAINABLE DEVELOPMENT

    E-Print Network [OSTI]

    BUSINESSES AS ONE OF THE KEY ELEMENTS OF A REGION'S SUSTAINABLE DEVELOPMENT of sustainable development should be taken into account by these actors. Businesses (especially SMEs) whose aim-words : sustainable development, territory, businesses, governance, stakeholders Mots-clés : développement durable

  5. KWOC (Key-Word-Out-of-Context) index of nuclear energy standards

    SciTech Connect (OSTI)

    Jennings, S.D.

    1990-05-01T23:59:59.000Z

    One major task of the Nuclear Standards Program funded by the Department of Energy (DOE)-Nuclear Energy (NE) Technology Support Programs is to promote and support the use of standards by providing line managers and standards coordinators with data that facilitates their ability to utilize standards requirements. To meet this task, the Performance Assurance Project Office (PAPO) administers a Performance Assurance Information Program. The task is carried out in accordance with the principle set forth in DOE Order 1300.2, Department of Energy Standards Program,'' December 18, 1980, and DOE memorandum, Implementation of DOE Orders on Quality Assurance, Standards, and Unusual Occurrence Reporting for Nuclear Energy Programs,'' March 3, 1982, and with guidance from the DOE-NE Technology Support Programs. The purpose of this information program is to collect, compile, and distribute program-related information, reports, and publications for the benefit of the DOE-NE program participants.

  6. Booklet, DOE Subject Area Indicators and Key Word List for RD...

    Broader source: Energy.gov (indexed) [DOE]

    information that is potentially classified as Restricted Data (RD) or Formerly Restricted Data (FRD). This book is particularly helpful to document reviewers conducting...

  7. DEFINITIONS / KEY WORDS POSSIBLE DUTIES EXAMPLE TITLE NAMES A person who works to someone else's

    E-Print Network [OSTI]

    Baltisberger, Jay H.

    these types of jobs are identified using only Custodian, Janitor, Housekeeper, etc. 1,2 Apprentice Apprentice Woodworker, Apprentice Weaver, Apprentice Blacksmith, etc 1,2 Office / Admin. Manage ment assist in training an apprentice or managing other workers. A highly skilled workman, artisan

  8. Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyandapproximately 10|BlueFireBoilerBoltonHooperOctober

  9. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  10. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  11. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  12. Microsoft Word - Final Sample Participant Profile November 2008...

    Office of Environmental Management (EM)

    Final Sample Participant Profile November 2008.doc Microsoft Word - Final Sample Participant Profile November 2008.doc More Documents & Publications Microsoft Word -...

  13. Microsoft Word - q109.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighandSWPA / SPRA / USACE625Data ShowC -9 First Quarter 2009 Key Findings

  14. Microsoft Word - q110.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighandSWPA / SPRA / USACE625Data ShowC -9 First Quarter 2009 Key

  15. Microsoft Word - q202.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighandSWPA / SPRA / USACE625Data ShowC -9 First Quarter 2009 Key2

  16. Microsoft Word - q209.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighandSWPA / SPRA / USACE625Data ShowC -9 First Quarter 2009 Key2Second

  17. Magic Words: How Language Augments Human Computation 

    E-Print Network [OSTI]

    Clark, Andy

    1998-01-01T23:59:59.000Z

    Of course, words aren’t magic. Neither are sextants, compasses, maps, slide rules and all the other paraphenelia which have accreted around the basic biological brains of homo sapiens. In the case of these other tools and ...

  18. Words and rules in the brain

    E-Print Network [OSTI]

    Rhee, Jaemin, 1972-

    2001-01-01T23:59:59.000Z

    The Words-and-Rules theory (WR) posits that different mental processes underlie regular and irregular past tense formation: regular forms are rule-generated ('add -ed'), whereas irregular forms are retrieved from memory. ...

  19. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  20. Save PDF files as Word documents You can save a PDF file as a Word document, even if the file was originally created in a

    E-Print Network [OSTI]

    Segraves, Kari A.

    Save PDF files as Word documents You can save a PDF file as a Word document, even if the file to save. 2. Choose File > Save As > Microsoft Word > Word Document. The Word Document command saves File > Save As > Microsoft Word > Word 97-2003 Document to save a DOC file. Tip: If you want to save

  1. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  2. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  3. Mapping the geographical diffusion of new words

    E-Print Network [OSTI]

    Eisenstein, Jacob; Smith, Noah A; Xing, Eric P

    2012-01-01T23:59:59.000Z

    Language in social media is rich with linguistic innovations, most strikingly in the new words and spellings that constantly enter the lexicon. Despite assertions about the power of social media to connect people across the world, we find that many of these neologisms are restricted to geographically compact areas. Even for words that become ubiquituous, their growth in popularity is often geographical, spreading from city to city. Thus, social media text offers a unique opportunity to study the diffusion of lexical change. In this paper, we show how an autoregressive model of word frequencies in social media can be used to induce a network of linguistic influence between American cities. By comparing the induced network with the geographical and demographic characteristics of each city, we can measure the factors that drive the spread of lexical innovation.

  4. 2010 Employee Survey Acknowledgements

    E-Print Network [OSTI]

    Eisen, Michael

    conducted for Postdocs and Operations employees; this year's survey was a Lab-wide survey of the Lab2010 Employee Survey May 2010 #12;Acknowledgements TheBerkeleyLab Survey Team consisted Associates has conducted a number of large-scale surveys for organizations in higher education, including MIT

  5. Word Order Variables in Patzun Kaqchikel

    E-Print Network [OSTI]

    Kim, Sok-Ju

    2011-10-03T23:59:59.000Z

    clauses as in (1), transitive clauses with two DPs show SVO, VOS, and VSO word order. Consider the following sentences. (2) a. ri acin x-u-p’en ri c’aket def man com-3sE-make def chair...+statement In (2), the possibility of statement and question interpretations depends on SVO, VOS, and VSO word orders. In (2a), both statements and questions are possible in SVO clauses. In the verb- initial clauses as in (2b-c), if two DPs are definite...

  6. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  7. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  8. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  9. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  10. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  11. Literature survey

    SciTech Connect (OSTI)

    Pillay, K.K.S. (Los Alamos National Lab., Los Alamos, NM (US))

    1988-07-01T23:59:59.000Z

    The residential amount(s) of fissionable materials remaining in process equipment after the runout of bulk materials processed is referred to as ''Process Holdup of Special Nuclear Materials.'' Locating regions of holdup and estimating the quantity of fissile materials remaining as holdup are important not only to materials accountability but also to process safety. Holdup is often referred to as a ''Hidden Inventory.'' In materials accounting terminology, hidden inventories are part of ''Materials Unaccounted For'' (MUF) or ''Inventory Difference'' (ID). MUF or ID could be construed as ''Loss'' or ''Diversion''. From a safeguards perspective, all these designations are undesirable. Another terminology that is relevant to holdup is ''In-Process Inventory.'' During process operations and temporary shutdown, the holdup within the facility is also known as the in-process inventory. Estimating this inventory is just as challenging as residuals after process runout. The role of hidden inventories, or holdup, as a safeguards problem is now recognized by almost everyone interested in establishing effective safeguards for special nuclear materials. As part of this effort to organize the first INMM-sponsored Technical Workshop on Process Holdup of Special Nuclear Materials, an attempt was made to update an earlier survey of open literature publications of relevance to holdup. An attempt was made to exclude from this list those documents recognized as internal documents, progress reports, preliminary reports, abstracts, etc.

  12. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  13. Context Effects in Bi-alphabetical Word

    E-Print Network [OSTI]

    ,tt Claudia Carello,ttt and L. Katztt The Serbo-Croatian language is transcribed in two partially overlapping of Serbo-Croatian word recognition. The Serbo-Croatian language is written with two partially overlapping native speakers/hearers of Serbo-Croatian are presented phonologically ambiguous letter strings in either

  14. Grammatical Information Effects in Auditory Word Recognition*

    E-Print Network [OSTI]

    reaction times to a spoken stimulus. Words in the Serbo-Croatian language were used; each stimulus course. INTRODUCTION The principal language of Yugoslavia, Serbo-Croatian, has prOVided a useful vehicle the Serbo-Croatian language. elaborate that perspective but are, additionally, concerned with a generality

  15. Copositive Programming – a Survey

    E-Print Network [OSTI]

    2010-11-01T23:59:59.000Z

    Copositive Programming – a Survey. Mirjam Dür ... The purpose of this survey is to introduce the ...... Methods of Operations Research 62(1990): 45–52.

  16. Microsoft Word - Holt Cemetery Report _LIVE_

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Survey at the Holt Cemetery at the Portsmouth Gaseous Diffusion Plant, Piketon, Ohio This document has been approved for public release. Henry H. Thomas (Signature on File) 81810...

  17. The SNAP Strong Lens Survey

    E-Print Network [OSTI]

    Phil Marshall; Roger Blandford; Masao Sako

    2005-01-17T23:59:59.000Z

    Basic considerations of lens detection and identification indicate that a wide field survey of the types planned for weak lensing and Type Ia SNe with SNAP are close to optimal for the optical detection of strong lenses. Such a ``piggy-back'' survey might be expected even pessimistically to provide a catalogue of a few thousand new strong lenses, with the numbers dominated by systems of faint blue galaxies lensed by foreground ellipticals. After sketching out our strategy for detecting and measuring these galaxy lenses using the SNAP images, we discuss some of the scientific applications of such a large sample of gravitational lenses: in particular we comment on the partition of information between lens structure, the source population properties and cosmology. Understanding this partitioning is key to assessing strong lens cosmography's value as a cosmological probe.

  18. A patient-based national survey on postoperative pain management in France reveals significant achievements and persistent challenges

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A patient-based national survey on postoperative pain management in France reveals significant.1016/j.pain.2008.02.026 #12; Abstract (249 words) We carried out a national survey on postoperative pain (POP) management in a representative sample (public/private, teaching/non teaching, size) of 76

  19. ON HIGHLY PALINDROMIC WORDS STEPAN HOLUB AND KALLE SAARI

    E-Print Network [OSTI]

    Holub, Stepan

    ON HIGHLY PALINDROMIC WORDS STEP´AN HOLUB AND KALLE SAARI Abstract. We study some properties SAARI Length Minimal Palindromic Words 1 0 2 01 3 011, 001 4 0011, 5 00011, 00101, 00111, 01011 6 001011

  20. Robotic Surveying

    SciTech Connect (OSTI)

    Suzy Cantor-McKinney; Michael Kruzic

    2007-03-01T23:59:59.000Z

    ZAPATA ENGINEERING challenged our engineers and scientists, which included robotics expertise from Carnegie Mellon University, to design a solution to meet our client's requirements for rapid digital geophysical and radiological data collection of a munitions test range with no down-range personnel. A prime concern of the project was to minimize exposure of personnel to unexploded ordnance and radiation. The field season was limited by extreme heat, cold and snow. Geographical Information System (GIS) tools were used throughout this project to accurately define the limits of mapped areas, build a common mapping platform from various client products, track production progress, allocate resources and relate subsurface geophysical information to geographical features for use in rapidly reacquiring targets for investigation. We were hopeful that our platform could meet the proposed 35 acres per day, towing both a geophysical package and a radiological monitoring trailer. We held our breath and crossed our fingers as the autonomous Speedrower began to crawl across the playa lakebed. We met our proposed production rate, and we averaged just less than 50 acres per 12-hour day using the autonomous platform with a path tracking error of less than +/- 4 inches. Our project team mapped over 1,800 acres in an 8-week (4 days per week) timeframe. The expertise of our partner, Carnegie Mellon University, was recently demonstrated when their two autonomous vehicle entries finished second and third at the 2005 Defense Advanced Research Projects Agency (DARPA) Grand Challenge. 'The Grand Challenge program was established to help foster the development of autonomous vehicle technology that will some day help save the lives of Americans who are protecting our country on the battlefield', said DARPA Grand Challenge Program Manager, Ron Kurjanowicz. Our autonomous remote-controlled vehicle (ARCV) was a modified New Holland 2550 Speedrower retrofitted to allow the machine-actuated functions to be controlled by an onboard computer. The computer-controlled Speedrower was developed at Carnegie Mellon University to automate agricultural harvesting. Harvesting tasks require the vehicle to cover a field using minimally overlapping rows at slow speeds in a similar manner to geophysical data acquisition. The Speedrower had demonstrated its ability to perform as it had already logged hundreds of acres of autonomous harvesting. This project is the first use of autonomous robotic technology on a large-scale for geophysical surveying.

  1. aids word recognition: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    perspective on handwriting recognition paradigms, analytical methods, reading theory, pattern recognition. 1 INTRODUCTION HANDWRITTEN Word responses on forms, and...

  2. Word learning, phonological short-term memory, phonotactic probability and

    E-Print Network [OSTI]

    Gupta, Prahlad

    for thinking about various types of studies of word learning. We then review a number of themes that in recent as a useful organizing scheme for thinking about various types of studies of word learning. In §2, we reviewWord learning, phonological short-term memory, phonotactic probability and long-term memory

  3. Word Prediction in Hebrew Preliminary and Surprising Results

    E-Print Network [OSTI]

    Elhadad, Michael

    Word Prediction in Hebrew ­ Preliminary and Surprising Results Abstract As part of an effort to develop NLP-based tools for Hebrew AAC users, we investigate the task of word prediction. Previous work on word prediction shows that statistical methods are not sufficiently precise for languages with highly

  4. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  5. STEP Participant Survey Report

    Broader source: Energy.gov [DOE]

    STEP Participant Survey Report, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  6. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  7. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  8. Chemistry Add-In for Word

    E-Print Network [OSTI]

    Townsend, Joseph A

    2011-07-05T23:59:59.000Z

    The Add-In (.NET) links a semantic chemistry engine (.NUMBO) through a command interface (CID) to a chemistry zone. Chemistry zones are textual or graphic renderings within a Word document (DOCX). All content and relationships are bound to CML... OOXML + CML •Data publication difficult and unsupported •Insufficient data to fully support research •Data preparation integrated into user workflow •Open Standards promote Open Semantic Science Domain aware software and semantic data allows...

  9. Weighted Logics for Nested Words and Algebraic Formal Power Series

    E-Print Network [OSTI]

    Mathissen, Christian

    2010-01-01T23:59:59.000Z

    Nested words, a model for recursive programs proposed by Alur and Madhusudan, have recently gained much interest. In this paper we introduce quantitative extensions and study nested word series which assign to nested words elements of a semiring. We show that regular nested word series coincide with series definable in weighted logics as introduced by Droste and Gastin. For this we establish a connection between nested words and the free bisemigroup. Applying our result, we obtain characterizations of algebraic formal power series in terms of weighted logics. This generalizes results of Lautemann, Schwentick and Therien on context-free languages.

  10. MAS Media Arts and Studies KEY: # = new course * = course changed = course dropped

    E-Print Network [OSTI]

    MacAdam, Keith

    MAS Media Arts and Studies KEY: # = new course * = course changed = course dropped University TO MEDIA AND CULTURE. (3) This course focuses on the study of electronic mass media. It surveys media, culture, and power. MAS 201 COMMUNICATION TECHNOLOGIES AND SOCIETY. (3

  11. E-Business Value Creation in Jordanian Banking Services Industry: An Empirical Analysis of Key Factors

    E-Print Network [OSTI]

    E-Business Value Creation in Jordanian Banking Services Industry: An Empirical Analysis of Key an extended conceptual research model for assessing the value of e-business at the bank level environment) that may affect value creation of carrying out e- business in Jordanian banking sector. Survey

  12. HOME OF THE ILLINOIS STATE SCIENTIFIC SURVEYS Illinois Natural History Survey Illinois State Archaeological Survey Illinois State

    E-Print Network [OSTI]

    Bashir, Rashid

    Archaeological Survey · Illinois State Geological Survey · Illinois State Water Survey · Illinois Sustainable

  13. A Survey on Mining Software Survey Presentation

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    ­ Effort Estimation ­ Mining Aspects · Papers at a glance · Related Workshop · Available Resources of mining software archives to support, ­ the maintenance of software systems, ­ improve software designA Survey on Mining Software Archives Survey Presentation Jin Ung, Oh ­ 2007.07.11 #12;Contents

  14. Microsoft Word - ElectrocatH20

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Splitting The conversion of solar energy and water to hydrogen is a key element to a renewable fuel infrastructure, in which such "renewable hydrogen" can be utilized in fuel...

  15. NEPA Litigation Surveys

    Broader source: Energy.gov [DOE]

    CEQ publishes surveys on NEPA litigation on an annual basis. These surveys identify the number of cases involving a NEPA based cause of action, Federal agencies that were identified as a lead...

  16. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  17. Fossil Energy Word Find | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2: FinalOffers3.pdf0-45.pdf0 Budget Fossil Energy FY 2010 Budget FossilThird Quarter,Word

  18. Microsoft Word - EMSSABChairs conference call 022113 Final

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft WordEnergyWestEERELa18, 2012

  19. Microsoft Word - MPP_ Application.doc

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 atthe DistrictIndependentDepartment of Energy Microsoft Word -HUMAN0

  20. Microsoft Word - BRC Charter | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOffice ofARRAModelWAS.docMicrosoft Word -of U.S.Microsoft

  1. Microsoft Word - FAL2004-05.doc

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOfficeNOTICE:InspectionsMicrosoft Word - FAL2004-03.doc

  2. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  3. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  4. PNNL: A Supervised Maximum Entropy Approach to Word Sense Disambiguation

    SciTech Connect (OSTI)

    Tratz, Stephen C.; Sanfilippo, Antonio P.; Gregory, Michelle L.; Chappell, Alan R.; Posse, Christian; Whitney, Paul D.

    2007-06-23T23:59:59.000Z

    In this paper, we described the PNNL Word Sense Disambiguation system as applied to the English All-Word task in Se-mEval 2007. We use a supervised learning approach, employing a large number of features and using Information Gain for dimension reduction. Our Maximum Entropy approach combined with a rich set of features produced results that are significantly better than baseline and are the highest F-score for the fined-grained English All-Words subtask.

  5. Environmental Survey preliminary report

    SciTech Connect (OSTI)

    Not Available

    1988-04-01T23:59:59.000Z

    This report presents the preliminary findings from the first phase of the Environmental Survey of the United States Department of Energy (DOE) Sandia National Laboratories conducted August 17 through September 4, 1987. The objective of the Survey is to identify environmental problems and areas of environmental risk associated with Sandia National Laboratories-Albuquerque (SNLA). The Survey covers all environmental media and all areas of environmental regulation. It is being performed in accordance with the DOE Environmental Survey Manual. This phase of the Survey involves the review of existing site environmental data, observations of the operations carried on at SNLA, and interviews with site personnel. 85 refs., 49 figs., 48 tabs.

  6. Key word:Daylight Factor Window Wall Ratio Pendentive dome Lighting design Tropical region Architecture and Interior design

    E-Print Network [OSTI]

    Mehrdad Mazloomi

    Abstract: Daylighting design plays important role in architecture of religious buildings such as churches and mosques where pendentive dome construction is frequently used. In daylighting design, many designers face difficulty in estimating the interior share of light which is usually expressed by daylight factor due to complexity of interior form. This study aims to provide designers with a rather high precision rule of thumb for average daylight factor in pendentive dome building. Thus, it investigates the Daylight Factor [DF] distribution of such buildings with reference to the tropics. It takes the Window Wall Ratio [WWR] into account and seeks its influence on daylight factor. By a 12 X 12 points grid, it examines five different ratios including 0.1, 0.2, 0.3, 0.4 and 0.5 on DF of the floor beneath the dome. The results endorse the direct relation of WWR and DF. The least WWR equal to 0.1 yields an average DF of 0.55 % while the greatest WWR of 0.5 yields in average DF of 2.56%. The intermediate WWR in steps of 0.2, 0.3 and 0.4 correspond to 1.04, 1.56 and 2.07 percent respectively. As a relatively precise rule of thumb, any increment in consequent steps of WWR with 0.1 intervals results in 0.5 % increase in DF. This can be employed by architects and interior designers for lighting design of pendentive dome buildings in tropical region.

  7. ANNALS OF GEOPHYSICS, VOL. 48, N. 4/5, August/October 2005 Key words diffusion silicate melts volatiles

    E-Print Network [OSTI]

    Long, Bernard

    ­ volatiles ­ water ­ carbon dioxide ­ sulfur ­ fluorine ­ chlorine ­ melt inclusion ­ igneous processes 1 in silicate magmas provides the frame- work necessary for the understanding of process- es such as bubble equations for water, carbon dioxide, sulfur, flu- orine, and chlorine in silicate melts similar

  8. Communiquer dans un monde de normes l 125 Key words : management standards ; communication of influence ; communicational study of

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    and controlled in organizations. The processes of international industrial standardization apply not only This proposal presents a communicational analysis of international management standards in the field of private the international standardization of societal security. The aim of this project is to study management standards

  9. Microsoft Word - GSP_Charter.doc | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    U.S. Department of Energy Geospatial Sciences Program (GSP) Charter Microsoft Word - GSPCharter.doc More Documents & Publications Geospatial Science Program Mananagemnt Office...

  10. auditory word recognition: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (normally reading children), and immatureimpaired (young readers with developmental dyslexia) word-recognition systems. Results revealed similar response times (and error rates)...

  11. Learning to See Words Brian A. Wandell,1

    E-Print Network [OSTI]

    Wandell, Brian A.

    -4308/12/0110-0031$20.00 Keywords reading, visual word form area, dyslexia, visual field maps, diffusion tensor imaging (DTI), f DYSLEXIA . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Good and Poor Readers

  12. Multi-rate HMMs for Word Alignment Elif Eyigoz

    E-Print Network [OSTI]

    Gildea, Daniel

    people who sell eyeglasses gözlükçülerimizden Figure 1: Turkish word aligned to an English phrase. der

  13. 2009 Operations Employee Climate Survey

    E-Print Network [OSTI]

    2009 Operations Employee Climate Survey March 2009 #12;Acknowledgements TheBerkeleyLab Survey Team Associates has conducted a number of large-scale surveys for organizations in higher education, including MIT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Survey

  14. Infrared Surveys for AGN

    E-Print Network [OSTI]

    Harding E. Smith

    2002-03-06T23:59:59.000Z

    From the earliest extragalactic infrared studies AGN have shown themselves to be strong infrared sources and IR surveys have revealed new populations of AGN. I briefly review current motivations for AGN surveys in the infrared and results from previous IR surveys. The Luminous Infrared Galaxies, which in some cases house dust-enshrouded AGN, submillimeter surveys, and recent studies of the cosmic x-ray and infrared backgrounds suggest that there is a population of highly-obscured AGN at high redshift. ISO Surveys have begun to resolve the infrared background and may have detected this obscured AGN population. New infrared surveys, particularly the SIRTF Wide-area Infrared Extragalactic Legacy Survey (SWIRE), will detect this population and provide a platform for understanding the evolution of AGN, Starbursts and passively evolving galaxies in the context of large-scale structure and environment.

  15. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  16. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  17. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  18. Methods of defining ontologies, word disambiguation methods, computer systems, and articles of manufacture

    DOE Patents [OSTI]

    Sanfilippo, Antonio P [Richland, WA; Tratz, Stephen C [Richland, WA; Gregory, Michelle L [Richland, WA; Chappell, Alan R [Seattle, WA; Whitney, Paul D [Richland, WA; Posse, Christian [Seattle, WA; Baddeley, Robert L [Richland, WA; Hohimer, Ryan E [West Richland, WA

    2011-10-11T23:59:59.000Z

    Methods of defining ontologies, word disambiguation methods, computer systems, and articles of manufacture are described according to some aspects. In one aspect, a word disambiguation method includes accessing textual content to be disambiguated, wherein the textual content comprises a plurality of words individually comprising a plurality of word senses, for an individual word of the textual content, identifying one of the word senses of the word as indicative of the meaning of the word in the textual content, for the individual word, selecting one of a plurality of event classes of a lexical database ontology using the identified word sense of the individual word, and for the individual word, associating the selected one of the event classes with the textual content to provide disambiguation of a meaning of the individual word in the textual content.

  19. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  20. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  1. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  2. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  3. On abelian and additive complexity in infinite words

    E-Print Network [OSTI]

    Ardal, Hayri; Jungi?, Veselin; Sahasrabudhe, Julian

    2011-01-01T23:59:59.000Z

    The study of the structure of infinite words having bounded abelian complexity was initiated by G. Richomme, K. Saari, and L. Q. Zamboni. In this note we define bounded additive complexity for infinite words over a finite subset of Z^m. We provide an alternative proof of one of the results of Richomme, Saari, and Zamboni.

  4. Accurate Visual Word Construction using a Supervised Approach

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    comparison with the standard K-means algorithm on the PASCAL VOC-2007 dataset is carried out. The results of the bag of visual words models are used to resorting to clustering techniques such as the K-means- ered as visual words. They are usually extracted by K-means based-algorithms [1, 3] even though other

  5. When word recognition goes wrong: Acquired dyslexia: brain damage (strokes).

    E-Print Network [OSTI]

    O'Reilly, Randall C.

    1 Dyslexia When word recognition goes wrong: Acquired dyslexia: brain damage (strokes). ­ Surface dyslexia: can't read irregular words (yacht). ­ Phonological dyslexia: can't read nonwords (nust). ­ Deep dyslexia: semantic errors (orchestra = symphony) Developmental dyslexia: this is most common and poorly

  6. A Fuzzy Clustering Approach to Word Sense Discrimination

    E-Print Network [OSTI]

    Sahay, Sundeep

    areas of pattern recognition as image processing and computer vision. However, we argue that fuzzy1 A Fuzzy Clustering Approach to Word Sense Discrimination ERIK VELLDAL This paper describes are construed as fuzzy sets, and the words are assigned varying degrees of membership with respect to the vari

  7. Microsoft Word - User Survey Summary_2013-Oct_Redacted.r0.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (micro-spectroscopy) Nucleation at low temperatures MALDI-TOF Triple TOF Mass Spectrometer Q Exactives Plus Hybrid Quadrupole-Orbitrap High temperature...

  8. Microsoft Word - User Survey Summary_2012-Oct_Redacted.r0.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    USERS Additional SEMs More microbial growth facilities CyTOF flow cytometry mass spectrometer, Accuri flow cytometer and simple fluorescent microscopes. ...

  9. Microsoft Word - Wind Industry Work Order Information Flow Survey__WithSNLMarkings_Final.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighandSWPA / SPRA / USACE625Data Show Filtration8, 2011Hanford Blog?A In

  10. Microsoft Word - 2009 EIA-782ab surveys reference guide 1.doc

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24,High824 2.839 2.835 2.826 2.823011

  11. Microsoft Word - 2012 Survey Results_v5i_D.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your HomeOverviewCleanupShipping Form3 A LCF U ser S urvey R

  12. ORISE: Characterization surveys

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extent of radiological contamination at sites scheduled for decontamination and decommissioning (D&D). A fundamental aspect of all D&D projects, characterization surveys provide...

  13. User Survey Results | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    have accessed computing resources during the prior year. The results of the most recent survey are posted here with management responses to concerns or issues identified by our...

  14. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  15. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  16. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  17. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  18. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  19. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  20. Exporting to Word, PDF or Excel v4 1 myPublications: Exporting to Word, PDF or Excel

    E-Print Network [OSTI]

    Oakley, Jeremy

    Exporting to Word, PDF or Excel v4 1 myPublications: Exporting to Word, PDF or Excel You can export applications and other documents. Links to export lists of elements in a range of formats are shown on a range can be chosen. · Publications lists, where you can choose to export all your publications, or mark

  1. Strong words or moderate words: A comparison of the reliability and validity of responses on attitude scales

    E-Print Network [OSTI]

    Frey, Bruce B.; Edwards, Lisa M.

    2011-01-01T23:59:59.000Z

    statistically significant difference was found between one pair of validity coefficients (r = 0.69; r = 0.15; Z = 2.60, p [less than or equal to] 0.01) and that was in the direction opposite from expected, favoring moderately worded items over strongly worded...

  2. Microsoft Word - Graphics A-76 Post - MEO VV Review Report _F...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Microsoft Word - Graphics A-76 Post - MEO VV Review Report F.doc Microsoft Word - Graphics A-76 Post - MEO VV Review Report F.doc Microsoft Word - Graphics A-76 Post - MEO VV...

  3. Microsoft Word - NNSA Logistics A-76 Post - MEO VV Review Report...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Word - NNSA Logistics A-76 Post - MEO VV Review Report 111.doc Microsoft Word - NNSA Logistics A-76 Post - MEO VV Review Report 111.doc Microsoft Word - NNSA...

  4. Occupancy by key transcription factors is a more accurate predictor...

    Office of Scientific and Technical Information (OSTI)

    USDOE Country of Publication: United States Language: English Subject: functional genomics; gene regulation; TAL1; GATA1; histone modifications; enhancer assay Word Cloud More...

  5. XSEDE Cloud Survey Report

    E-Print Network [OSTI]

    Walter, M.Todd

    XSEDE Cloud Survey Report David Lifka, Cornell Center for Advanced Computing Ian Foster, ANL, ANL and The University of Chicago A National Science Foundation-sponsored cloud user survey was conducted from September 2012 to April 2013 by the XSEDE Cloud Integration Investigation Team to better

  6. Building Technologies Residential Survey

    SciTech Connect (OSTI)

    Secrest, Thomas J.

    2005-11-07T23:59:59.000Z

    Introduction A telephone survey of 1,025 residential occupants was administered in late October for the Building Technologies Program (BT) to gather information on residential occupant attitudes, behaviors, knowledge, and perceptions. The next section, Survey Results, provides an overview of the responses, with major implications and caveats. Additional information is provided in three appendices as follows: - Appendix A -- Summary Response: Provides summary tabular data for the 13 questions that, with subparts, comprise a total of 25 questions. - Appendix B -- Benchmark Data: Provides a benchmark by six categories to the 2001 Residential Energy Consumption Survey administered by EIA. These were ownership, heating fuel, geographic location, race, household size and income. - Appendix C -- Background on Survey Method: Provides the reader with an understanding of the survey process and interpretation of the results.

  7. 2013 REPORT ILLINOIS NATURAL HISTORY SURVEY

    E-Print Network [OSTI]

    Bashir, Rashid

    2013 REPORT ILLINOIS NATURAL HISTORY SURVEY ILLINOIS STATE ARCHAEOLOGICAL SURVEY ILLINOIS STATE State Geological Survey Illinois State Water Survey Illinois Sustainable Technology Center Awards GEOLOGICAL SURVEY ILLINOIS STATE WATER SURVEY ILLINOIS SUSTAINABLE TECHNOLOGY CENTER #12;#12;PRAIRIE RESEARCH

  8. Designing Firewalls: A Survey Angelos D. Keromytis and Vassilis Prevelakis

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    Chapter 3 Designing Firewalls: A Survey Angelos D. Keromytis and Vassilis Prevelakis 3 in the network topology to perform this filtering. One key assumption under this model is that everyone we control all traffic that enters or leaves the internal network. However, as the speed

  9. Security in Wireless Data Networks: A Survey Paper

    E-Print Network [OSTI]

    Jain, Raj

    Security in Wireless Data Networks: A Survey Paper Abdel-Karim R. Al Tamimi abdelkarim.tamimi@gmail.com Abstract Both security and wireless communication will remain an interesting subject for years to come jeopardizing the communicated content. This paper illustrates the key concepts of security, wireless networks

  10. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  11. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  12. Conducting a Motor Survey: Key Step for Establishing a Motor Management Policy

    E-Print Network [OSTI]

    Miller, R. B.

    Roughly 70% of the energy consumed by manufacturing processes is used by electric motors. According to the U.S. Department of Energy, greater attention to motor systems management can reduce motor-related energy costs by 18%. Establishing a motor...

  13. Fact #666: March 14, 2011 Survey says Electric Vehicle Prices are Key |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport in RepresentativeDepartment of EnergyEnergyWesternofEstimates

  14. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  15. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  16. Estimating density of Florida Key deer

    E-Print Network [OSTI]

    Roberts, Clay Walton

    2006-08-16T23:59:59.000Z

    for this species since 1968; however, a need to evaluate the precision of existing and alternative survey methods (i.e., road counts, mark-recapture, infrared-triggered cameras [ITC]) was desired by USFWS. I evaluated density estimates from unbaited ITCs and road...

  17. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  18. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  19. Parents Provide Children with Social Cues for Word Learning

    E-Print Network [OSTI]

    Kyger, Mariel F.

    2013-01-01T23:59:59.000Z

    and gender-adjusted MCDI percentile was calculated based onwith child’s MCDI percentile. All correlations from thisMCDI score, child MCDI percentile, and child words per line

  20. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  1. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  2. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  3. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  4. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  5. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  6. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  7. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  8. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  9. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  10. Memory blocking and recovery for affect word lists

    E-Print Network [OSTI]

    Moynan, Sarah Catherine

    2013-02-22T23:59:59.000Z

    MEMORY BLOCKING AND RECOVERY FOR AFFECT WORD LISTS A Senior Honors Thesis by SARAH CATHERINE MOYNAN Submitted to the Office of Honors Programs k, Academic Scholarships Texas ARM University in partial fulfillment of the requirements... of the UNIVERSITY UNDERGRADUATE RESEARCH FELLOWS April 2004 Major: Psychology MEMORY BLOCKING AND RECOVERY FOR AFFECT WORD LISTS A Senior Honors Thesis by SARAH CATHERINE MOYNAN Submitted to the Office of Honors Programs & Acadenuc Scholarships Texas A...

  11. What is the National Forest Inventory? The National Forest Inventory is a record of key information about forests

    E-Print Network [OSTI]

    What is the National Forest Inventory? The National Forest Inventory is a record of key information is the information gathered? Data for the National Forest Inventory is being collected using ground surveys, aerial representative picture of the state of Britain's forests and woodland. National Forest Inventory #12;Has

  12. Dark Energy Survey

    ScienceCinema (OSTI)

    Roodman, Aaron; Nord, Brian; Elliot, Ann

    2014-08-12T23:59:59.000Z

    Members of the Dark Energy Survey collaboration explain what they hope to learn by studying the southern sky with the world's most advanced digital camera, mounted on a telescope in Chile.

  13. NEPA COMPLIANCE SURVEY

    Broader source: Energy.gov (indexed) [DOE]

    of the State?" D D Any action that has potential impacts on Waters of the State' or wetland areas will require a separate NEPA Compliance Survey. Will the project area...

  14. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  15. BASF's Energy Survey Methodology

    E-Print Network [OSTI]

    Theising, T. R.

    2005-01-01T23:59:59.000Z

    and cost breakdowns by utility types are identified to further analyze trends. Consideration is given to the review of the various energy supply contracts for alternative options that may exist. The consumption history is used to create a distribution...BASF?s Energy Survey Methodology Thomas R. Theising BASF Corporation operates several dozen manufacturing Sites within NAFTA and periodically conducts Energy Surveys at each Site. Although these manufacturing sites represent a variety...

  16. Benchmarking survey for recycling.

    SciTech Connect (OSTI)

    Marley, Margie Charlotte; Mizner, Jack Harry

    2005-06-01T23:59:59.000Z

    This report describes the methodology, analysis and conclusions of a comparison survey of recycling programs at ten Department of Energy sites including Sandia National Laboratories/New Mexico (SNL/NM). The goal of the survey was to compare SNL/NM's recycling performance with that of other federal facilities, and to identify activities and programs that could be implemented at SNL/NM to improve recycling performance.

  17. TRANSPORTATION TOMORROW SURVEY DESIGN AND CONDUCT OF THE SURVEY

    E-Print Network [OSTI]

    Toronto, University of

    OF THE SURVEY Prepared for the Transportation Information Steering Committee by the Data Management Group Bernard Farrol Toronto Transit Commission Allen Reid Town of Orangeville The survey was managedTRANSPORTATION TOMORROW SURVEY 2001 DESIGN AND CONDUCT OF THE SURVEY #12;TRANSPORTATION TOMORROW

  18. SURVEY LEADERSHIP The Manager's Guide to Survey Feedback & Action Planning

    E-Print Network [OSTI]

    Squire, Larry R.

    SURVEY LEADERSHIP The Manager's Guide to Survey Feedback & Action Planning A guide designed to help is subject to change without notice. #12;Morehead Associates Page 2 of 115 Manager's Guide to Survey Feedback;Morehead Associates Page 3 of 115 Manager's Guide to Survey Feedback and Action Planning Action Planning

  19. STEP Participant Survey Executive Summary

    Broader source: Energy.gov [DOE]

    STEP Participant Survey Executive Summary, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  20. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  1. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  2. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  3. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  4. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  5. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  6. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  7. The Dark Energy Survey

    E-Print Network [OSTI]

    The Dark Energy Survey Collaboration

    2005-10-12T23:59:59.000Z

    We describe the Dark Energy Survey (DES), a proposed optical-near infrared survey of 5000 sq. deg of the South Galactic Cap to ~24th magnitude in SDSS griz, that would use a new 3 sq. deg CCD camera to be mounted on the Blanco 4-m telescope at Cerro Telolo Inter-American Observatory (CTIO). The survey data will allow us to measure the dark energy and dark matter densities and the dark energy equation of state through four independent methods: galaxy clusters, weak gravitational lensing tomography, galaxy angular clustering, and supernova distances. These methods are doubly complementary: they constrain different combinations of cosmological model parameters and are subject to different systematic errors. By deriving the four sets of measurements from the same data set with a common analysis framework, we will obtain important cross checks of the systematic errors and thereby make a substantial and robust advance in the precision of dark energy measurements.

  8. Alternating register automata on finite words and trees

    E-Print Network [OSTI]

    Figueira, Diego

    2012-01-01T23:59:59.000Z

    We study alternating register automata on data words and data trees in relation to logics. A data word (resp. data tree) is a word (resp. tree) whose every position carries a label from a finite alphabet and a data value from an infinite domain. We investigate one-way automata with alternating control over data words or trees, with one register for storing data and comparing them for equality. This is a continuation of the study started by Demri, Lazic and Jurdzinski. From the standpoint of register automata models, this work aims at two objectives: (1) simplifying the existent decidability proofs for the emptiness problem for alternating register automata; and (2) exhibiting decidable extensions for these models. From the logical perspective, we show that (a) in the case of data words, satisfiability of LTL with one register and quantification over data values is decidable; and (b) the satisfiability problem for the so-called forward fragment of XPath on XML documents is decidable, even in the presence of DT...

  9. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  10. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  11. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  12. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  13. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  14. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  15. Hi-GAL: the Herschel infrared Galactic Plane Survey

    E-Print Network [OSTI]

    Molinari, S

    2015-01-01T23:59:59.000Z

    Hi-GAL, the Herschel infrared Galactic Plane Survey, is an Open Time Key Project of the Herschel Space Observatory. It will make an unbiased photometric survey of the inner Galactic Plane by mapping a two-degree wide strip in the longitude range |l|medium. The resulting representative samples will yield the variation of source temperature, luminosity, mass and age in a wide range of Galactic environments at all scales from massive YSOs in protoclusters to entire spiral arms, providing an evolutionary sequence for the formation of intermediate and high-mass stars. This information is essential to the formulation of a predictive global model of the ...

  16. Operations Improvement Surveys

    E-Print Network [OSTI]

    Guide, J. J.; O'Brien, W. J.

    1984-01-01T23:59:59.000Z

    Exxon Chemical Company developed unique site-wide energy optimization technology in the mid1970's. This technology was applied by means of site energy surveys which were carried out at every major Exxon facility throughout the world during the 1976...

  17. Solar Site Survey Toolkit

    Broader source: Energy.gov [DOE]

    After a couple outings, a principal technologist at Sandia National Laboratories saw a need for a travel kit that would have the necessary tools to make the task of site surveys more manageable and safer. They have had great success using the kit in the field already.

  18. Microsoft Word - al94-19.doc | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment3311,Official File UnitedToOn4.doc Microsoft Word 93-4Microsoft Word

  19. Microsoft Word - AL2005-03.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOffice of Small.doc Microsoft Word2.doc Microsoft Word

  20. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  1. Lake Survey DETROIT, MICH.

    E-Print Network [OSTI]

    . DEPARTMENT OF' COMMERCE National Ouanic and Atmospheric Admlnl,trltion National OeUII SUI"II, Great Lakes Ice ................. .... ............. . $l'.iUllary ice charts ..............·.......·................. Area ice charts - winter 1971-72 ......... . ,, Table Tabl e l.--Ice 2.--Key to ice chart sy

  2. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  3. Updated distribution and reintroduction of the Lower Keys marsh rabbit

    E-Print Network [OSTI]

    Faulhaber, Craig Alan

    2005-02-17T23:59:59.000Z

    that might function as local populations. Surveys included 228 patches of occupied and potential habitat, 102 of which were occupied by rabbits. Patches were arranged in 56 occupied and 88 potential populations. Surveys revealed new patches of both occupied...

  4. A new well surveying tool 

    E-Print Network [OSTI]

    Haghighi, Manuchehr Mehdizabeh

    1966-01-01T23:59:59.000Z

    Bore Surveying Instrument TABLES . . . 17 1. Comparison of Measured Angles and Angles Indicated by Surveying Device for S 20 W and 13 , N 22 W and 51 . . . . . . . . . . . . . . . . . . . . 20 2. Comparison of Measured Angles and Angles Indicated... by Surveying Device for S and 19 , N and 41 . 21 3. Comparison of Measured Angles and Angles Indicated by Surveying Device for NE snd 9 , W and 45 . . . . . . . ~ 22 ABSTRNl T Ever since the advent of rotary drilling the petroleum industry has been...

  5. Pro-Trade Democrats Go AWOL (NYT) 639 words

    E-Print Network [OSTI]

    Lopez-Carr, David

    Pro-Trade Democrats Go AWOL (NYT) 639 words Published: June 13, 2005 Back in 1993, Vice President Al Gore went on prime-time television to debate Ross Perot, a foe of free trade, in a clash Mr. Gore is widely believed to have won. The debate helped propel supporters of the North American Free Trade

  6. The Weight of Words Construction and Implications of

    E-Print Network [OSTI]

    New Hampshire, University of

    The Weight of Words Construction and Implications of Genocide Discourse in Bosnia and Sudan #12 Genocide 1975-1979 - 2,000,000 Deaths Rwanda 1994 - 800,000 Deaths Bosnia Genocide 1992-1995 - 200 INEVITABLITY #12;Bosnia- background #12;"Ethnic Cleansing" Massacres Plundering of villages Rape Camps #12

  7. Regular Expressions for Data Words Leonid Libkin and Domagoj Vrgoc

    E-Print Network [OSTI]

    Libkin, Leonid

    a renewed interest in them due to applications in querying and reasoning about data models with complex structural properties, notably XML, and more recently, graph databases. Logical formalisms designed. As the automaton model, we take register automata, which are a natural analog of NFAs for data words. We first

  8. ON HIGHLY PALINDROMIC WORDS AN HOLUB AND KALLE SAARI

    E-Print Network [OSTI]

    Holub, Stepan

    ON HIGHLY PALINDROMIC WORDS Ÿ ST Ÿ EP â?? AN HOLUB AND KALLE SAARI Abstract. We study some properties by the Finnish Academy under grant 8206039. 1 #12; 2 Ÿ ST Ÿ EP â?? AN HOLUB AND KALLE SAARI Length Minimal

  9. Learning words from sights and sounds: a computational model

    E-Print Network [OSTI]

    Learning words from sights and sounds: a computational model Deb K. Roy*, Alex P. Pentland MIT.: 1-617-253-0596; fax: 1-617-253-8874. E-mail address: dkroy@media.mit.edu (D.K. Roy). http

  10. AUTOMATIC LABELING OF CONTRASTIVE WORD PAIRS FROM SPONTANEOUS SPOKEN ENGLISH

    E-Print Network [OSTI]

    Edinburgh, University of

    and ICCS for funding. in a section of the Switchboard corpus ([1]). (1) is an example (of what hereafter we, duration, energy and spectral balance cepstral coefficients), Part-Of-Speech, and a semantic similarity mea- sure computed by using both WordNet semantic lexicon and corpora statistics. Symmetric contrast differs

  11. Using GeoWordNet for Geographical Information Retrieval

    E-Print Network [OSTI]

    Rosso, Paolo

    - ambiguated and assigned their coordinates on the world map. Documents are first searched for by means of a term-based search method, and then re-ranked according to the geographical information. The results knowledge at keyword level in the Lucene1 search engine, focusing on the use of the WordNet [3] ontology

  12. REFLECTIONS: PERSONAL ESSAYS ON EVOLUTION Use the Word Evolution

    E-Print Network [OSTI]

    Thompson, John N.

    REFLECTIONS: PERSONAL ESSAYS ON EVOLUTION Use the Word Evolution John N. Thompson Published online: 20 November 2007 # Springer Science + Business Media, LLC 2007 Examples of rapid evolution abound that evolution is a glacially slow process that is almost impossible for humans to observe. This disconnection

  13. ARM User Survey Report

    SciTech Connect (OSTI)

    Roeder, LR

    2010-06-22T23:59:59.000Z

    The objective of this survey was to obtain user feedback to, among other things, determine how to organize the exponentially growing data within the Atmospheric Radiation Measurement (ARM) Climate Research Facility, and identify users’ preferred data analysis system. The survey findings appear to have met this objective, having received approximately 300 responses that give insight into the type of work users perform, usage of the data, percentage of data analysis users might perform on an ARM-hosted computing resource, downloading volume level where users begin having reservations, opinion about usage if given more powerful computing resources (including ability to manipulate data), types of tools that would be most beneficial to them, preferred programming language and data analysis system, level of importance for certain types of capabilities, and finally, level of interest in participating in a code-sharing community.

  14. Mining Weak Lensing Surveys

    E-Print Network [OSTI]

    N. Padmanabhan; U. Seljak; U. L. Pen

    2002-10-21T23:59:59.000Z

    We present a survey of the cosmological applications of the next generation of weak lensing surveys, paying special attention to the computational challenges presented by the number of galaxies, $N_{gal} ~$ 10$^{5}$. We focus on optimal methods with no pixelization and derive a multigrid $P^3M$ algorithm that performs the relevant computations in $O(N_{gal} \\log N_{gal})$ time. We test the algorithm by studying three applications of weak lensing surveys - convergence map reconstruction, cluster detection and $E$ and $B$ power spectrum estimation using realistic 1 deg^{2} simulations derived from N-body simulations. The map reconstruction is able to reconstruct large scale features without artifacts. Detecting clusters using only weak lensing is difficult because of line of sight contamination and noise, with low completeness if one desires low contamination of the sample. A power spectrum analysis of the convergence field is more promising and we are able to reconstruct the convergence spectrum with no loss of information down to the smallest scales. The numerical methods used here can be applied to other data sets with same $O(N\\log N)$ scaling and can be generalised to a sphere.

  15. Eyes Wide Open - Optimising Cosmological Surveys in a Crowded Market

    E-Print Network [OSTI]

    Bruce A. Bassett

    2005-05-30T23:59:59.000Z

    Optimising the major next-generation cosmological surveys (such as {\\em SNAP, KAOS etc...}) is a key problem given our ignorance of the physics underlying cosmic acceleration and the plethora of surveys planned. We propose a Bayesian design framework which (1) maximises the discrimination power of a survey without assuming any underlying dark energy model, (2) finds the best niche survey geometry given current data and future competing experiments, (3) maximises the cross-section for serendipitous discoveries and (4) can be adapted to answer specific questions (such as `is dark energy dynamical?'). Integrated Parameter Space Optimisation (IPSO) is a design framework that integrates projected parameter errors over an entire dark energy parameter space and then extremises a figure of merit (such as Shannon entropy gain which we show is stable to off-diagonal covariance matrix perturbations) as a function of survey parameters using analytical, grid or MCMC techniques. We discuss examples where the optimisation can be performed analytically. IPSO is thus a general, model-independent and scalable framework that allows us to appropriately use prior information to design the best possible surveys.

  16. Social and Discourse Contributions to the Determination of Reference in Cross-Situational Word Learning

    E-Print Network [OSTI]

    Frank, Michael C.

    How do children infer the meanings of their first words? Even in infant-directed speech, object nouns are often used in complex contexts with many possible referents and in sentences with many other words. Previous work ...

  17. V-221: WordPress A Forms Plugin Cross-Site Request Forgery and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Request Forgery, and Information Disclosure Attacks T-597: WordPress Multiple Security Vulnerabilities V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks...

  18. V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am...

  19. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis Related Articles V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks T-597: WordPress Multiple Security Vulnerabilities T-693: Symantec Endpoint...

  20. Effects of Word Abstractness in a Connectionist Model of Deep Dyslexia

    E-Print Network [OSTI]

    Plaut, David C.

    Effects of Word Abstractness in a Connectionist Model of Deep Dyslexia David C. Plaut School with "concrete word dyslexia." Introduction Extensive work within cognitive neuropsychology sug- gests article, "Deep Dyslexia since 1980," Coltheart, Patterson & Marshall (1987) ar- guethat deepdyslexia

  1. SCHOOL OF ENGINEERING TECHNOLOGY Surveying Engineering

    E-Print Network [OSTI]

    Thomas, Andrew

    SCHOOL OF ENGINEERING TECHNOLOGY Surveying Engineering Technology practice FOCUSED WHY SURVEYING ENGINEERING TECHNOLOGY? Surveying engineering technology is a practice- focused program that provides students ENGINEERING TECHNOLOGY DEGREE? A graduate with a surveying engineering technology degree can work as a party

  2. United States Geological Survey yearbook, fiscal year 1980

    SciTech Connect (OSTI)

    Not Available

    1980-01-01T23:59:59.000Z

    The fiscal year 1980 Yearbook summarizes the activities of the US Geological Survey in response to its scientific and regulatory missions and its responsibility for exploration of the National Petroleum Reserve in Alaska. The main sections of this Yearbook are: (1) the year in review - a brief overview of the significant events of the Geological Survey during fiscal year 1980; (2) perspectives - essays focusing on specific events (rather than scientific topics) and programs involving multi-division participation; (3) missions, organization, and budget - a description of the Geological Survey's major duties and assignments and of the organizational structure that supports its missions; (4) division chapters - a description on the significant accomplishments (rather than a comprehensive program by program discussion) of each of the eight operating divisions and offices; and (5) appendices - provide supplementary information regarding key personnel, cooperators, and selected summary budgetary tables and an index.

  3. MOS: A critical tool for current and future radio surveys

    E-Print Network [OSTI]

    Smith, Daniel J B

    2015-01-01T23:59:59.000Z

    Since radio continuum observations are not affected by dust obscuration, they are of immense potential diagnostic power as cosmological probes and for studying galaxy formation and evolution out to high redshifts. However, the power-law nature of radio frequency spectra ensures that ancillary spectroscopic information remains critical for studying the properties of the faint radio sources being detected in rapidly-increasing numbers on the pathway to the Square Kilometre Array. In this contribution, I present some of the key scientific motivations for exploiting the immense synergies between radio continuum observations and multi-object spectroscopic surveys. I review some of the ongoing efforts to obtain the spectra necessary to harness the huge numbers of star-forming galaxies and AGN that current and future radio surveys will detect. I also touch on the WEAVE-LOFAR survey, which will use the WEAVE spectrograph currently being built for the William Herschel Telescope to target hundreds of thousands of low f...

  4. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  5. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  6. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  7. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  8. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  9. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  10. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  11. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  12. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  13. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  14. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  15. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  16. Microsoft Word - Funding Opportunity Announcement No. 2077 09142011...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Software applications are now available that track and analyze key building performance indicators. Tune-Ups and Enhanced O&M: Tuning up commercial building...

  17. Microsoft Word - FY 2015 SES Performance Appraisal System Guidance...

    Broader source: Energy.gov (indexed) [DOE]

    the Results Driven CE: 1. Leading Change (5% - 20%) o Develops and implements an organizational vision that integrates key organizational and program goals, priorities, values,...

  18. Microsoft Word - Federal Register Response _Jan09_.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to timely or successful technology transfer transactions with DOE Laboratories. The key CRADA and WFOs provisions presenting concern are those revolving around indemnification. For...

  19. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  20. Creation of Lexical Relations for IndoWordNet Ashish Narang

    E-Print Network [OSTI]

    Creation of Lexical Relations for IndoWordNet Ashish Narang CSED, Thapar University Patiala India.bhatia@thapar.edu Abstract WordNet is an electronic lexical database available on-line as a powerful resource to the researchers in the area of computational linguistics, text processing and other related areas. WordNet

  1. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  2. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  3. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  4. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  5. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  6. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  7. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  8. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  9. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  10. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  11. Southern Sky Redshift Survey

    SciTech Connect (OSTI)

    Da Costa, L.N.; Pellegrini, P.S.; Sargent, W.L.W.; Tonry, J.; Davis, M.

    1988-04-01T23:59:59.000Z

    The general characteristics of the space distribution of galaxies in the SSRS sample, covering the southern Galactic cap, are examined, and maps of the space distribution are presented. The sample consists of 2028 galaxies in an area of 1.75 sr with declination south of -17.5 deg and galactic latitude below -30 deg. The survey provides useful information on large-scale structure to a depth of 120/h Mpc. The galaxy distribution exhibits prominent filaments, sheets, and voids. Some large-scale structures are highly subclustered; others are much more diffuse. 21 references.

  12. Community Leaders Survey

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting theCommercialization and Innovation TheCommunicationsLeaders Survey Community

  13. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  14. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  15. A new well surveying tool

    E-Print Network [OSTI]

    Haghighi, Manuchehr Mehdizabeh

    1966-01-01T23:59:59.000Z

    A NEW WELL SURVEYING TOOL A Thesis By MANUCHEHR MEHDIZABEH HAGHIGHI Submitted to the Graduate College of the Texas ANM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Major Subject: PETROLEUM... by Surveying Device for S and 19 , N and 41 . 21 3. Comparison of Measured Angles and Angles Indicated by Surveying Device for NE snd 9 , W and 45 . . . . . . . ~ 22 ABSTRNl T Ever since the advent of rotary drilling the petroleum industry has been...

  16. Survey of ceramic machining in Japan

    SciTech Connect (OSTI)

    Bandyopadhyay, B.P. [North Dakota Univ., Grand Forks, ND (United States). Dept. of Mechanical Engineering] [North Dakota Univ., Grand Forks, ND (United States). Dept. of Mechanical Engineering; Blau, P.J. [Oak Ridge National Lab., TN (United States)] [Oak Ridge National Lab., TN (United States)

    1993-07-01T23:59:59.000Z

    This report is a compilation of four subcontract reports provided by B. P. Bandyopadhyay who, while a visiting professor at Toyohashi University in Japan, conducted a survey of ceramic machining technology in that country from January 1 through December 31, 1992. Various aspects of machining technology were surveyed: types of parts being produced, types of ceramic materials being used, the nature of current ceramic machining research and development, and types of machine tools. The four separate reports compiled here were originally provided in a narrative, chronological form, and some of the information has been reorganized into topical areas for this compilation. This report is organized into three sections: The first describes ten ceramic machining research and development organizations and provides a reference list of their current technical publications; the second, two major trade shows; and the third, several other products and commercial developments noted during the course of Bandyopadhyay`s stay in Japan. An Appendix lists key individuals who are currently conducting ceramic machining research in Japan.

  17. Find More Like This Table 1. Key dimensions of

    E-Print Network [OSTI]

    p, 1 chart, 1 diagram, 9 graphs Document Type: Article Subject Terms: *EMISSIONS trading CARBON of economic burdens among nations; Influence of emissions trading on policy costs. Full Text Word Count: 10068 the reductions attained, and how policy costs may be influenced by emissions trading. We explore the sensitivity

  18. Considerations for Implementation of MARSSIM/MARSAME Surface Radioactivity Surveys within FUSRAP - 12330

    SciTech Connect (OSTI)

    Hay, Scott S.; Winters, Michael S. [Cabrera Services, Inc., East Hartford, Connecticut (United States)

    2012-07-01T23:59:59.000Z

    Surveys for residual surface radioactivity support the release of buildings under MARSSIM and the release of materials and equipment under MARSAME consensus guidance. There are a multitude of factors and conditions that must be assessed and addressed when developing a defensible survey design. ISO-7503 addresses the most basic survey considerations with consistent terminology and defensible calculation methodologies recommended for program-wide implementation by the authors. A key point of interest is the ISO-7503 approach to determining the total efficiency of the measurement system that is promoted by the authors for adoption throughout FUSRAP. (authors)

  19. Microsoft Word - formeia8a_instructions_final

    U.S. Energy Information Administration (EIA) Indexed Site

    Burden: 1.0 Hours General Instructions: A. PURPOSE. This survey collects coal stocks data from U.S. coal brokers, coal traders and coal terminals. Information on coal stocks is...

  20. In this study I explore the relationship between modern energy and economically productive activities in rural Kenya. Research is based on surveys

    E-Print Network [OSTI]

    Kammen, Daniel M.

    productive activities in rural Kenya. Research is based on surveys done in Mpeketoni Village in Summer 2005-enterprises----- 3.3 Current rural electrification status and policy in Kenya--------------- 3.4 Key findings

  1. ????????????????????× - Optimization Online

    E-Print Network [OSTI]

    2009-03-08T23:59:59.000Z

    Key words. ?? ? ?? ?????¸ ? ? ? ?? ??? ¸. ?? ? ? ?. AMS subject classifications. ¼ ? ¼ ¾ ¸ ¼ ? ?¸ ? /font>.

  2. Multidimensional Pattern Matching: A Survey

    E-Print Network [OSTI]

    Amir, Amihood

    Multidimensional Pattern Matching: A Survey Amihood Amir \\Lambda GIT--CC--92/29 July 1992 Abstract for this survey is the problem of searching aerial photographs. The (ambitious) practical goal of this application is to input an aerial photograph and a template of some object (a pattern). The output is all locations

  3. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  4. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  5. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  6. Microsoft Word - Illinois State DOE Exec Summary.docx

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Window SHGC: .45 Heat Pump HSPF: 9.2 Heat Pump SEER: 17.8 Water Heater EF: .93 Key Statistics: Location: Normal, Illinois 2009 IECC Climate Zone: 5A Square Feet: 1,428 Number of...

  7. Microsoft Word - Energy Storage 092209 BAR.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ENERGY STORAGE-A KEY ENABLER OF THE SMART GRID Developed for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability by the National Energy Technology...

  8. Microsoft Word - ATLAS WS 2014 FS report fnl

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    arrays such as the X-Array are well suited for these measurements. Neutrinoless double beta decay experiments will be key to determine the Majorana or Dirac nature of the...

  9. Microsoft Word - APS10_Highlight_I-mode

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    unwanted confinement of particles. A key challenge in fusion energy is to confine the input heat long enough for the hot ionized hydrogen, fuel, or plasma, to fuse and produce...

  10. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  11. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  12. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  13. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  14. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  15. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  16. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  17. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  18. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  19. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  20. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  1. Electrical energy strategies; The survey

    SciTech Connect (OSTI)

    Golden, P. (Dranetz Technologies, Inc., Edison, NJ (US))

    1991-01-01T23:59:59.000Z

    This paper reports that, implementing an effective electrical energy reduction strategy requires a survey of the facility under consideration. The survey's main goals should be to identify where, when and how electricity is being used and to put into action methods to reduce and control costs. A number of important task can also result from this survey, such as the following: verification of building electrical drawing: electrical maintenance techniques; and analyses of electric utility rate schedules. The availability of up-to-date electrical drawing for a building may be nonexistent. The necessity to review and make corrections to these drawings will become evident in considering survey confident that all areas are properly surveyed and that the highest level of safety is maintained.

  2. PANELS AND OTHER SURVEY EXTENSIONS TO THE

    E-Print Network [OSTI]

    Toronto, University of

    PANELS AND OTHER SURVEY EXTENSIONS TO THE TRANSPORTATION TOMORROW SURVEY Data Management Group of Contents i List of Figures ii List of Tables ii 1. INTRODUCTION 1 2. THE TRANSPORTATION TOMORROW SURVEY (TTS) PROGRAM 3 3. PLANNING ISSUES WITHIN THE GTA 7 4. PANEL SURVEYS 10 5. OTHER SURVEY ISSUES

  3. Microsoft Word - Improvment Timeline 8-28-14

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122Commercial602 1,39732onMake Your NextHow EM AcronymsIQA memo10-6-08 Microsoft Word

  4. Microsoft Word - Policy Flash 2011-2 Attachment 2

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagement of the National NuclearRegulation;I I DAcquisitiMicrosoft Word

  5. Microsoft Word - Unconventional Resources Tech Adv Committee - signed

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagement of the National NuclearRegulation;I07 AnnualMicrosoft Word

  6. Microsoft Word - WA Parish_MAP_Final.docx

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagement of the National NuclearRegulation;I07 AnnualMicrosoft WordW.A.

  7. Microsoft Word - fal2004-04.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagement of the National 93-4 Acquisition RegulationMicrosoft Word -

  8. Microsoft Word - frm-070210-GO-EF-1_Form

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagement of the National 93-4 Acquisition RegulationMicrosoft Word

  9. Microsoft Word - FAL2004-01.doc | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions forCheneyNovember S. DEPARTMENTtheStatus of3-03R.doc Microsoft Word

  10. Word in the Square: Conversation Monitoring and Analysis Report

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric VehicleCenters | DepartmentKavita RaviValerie Reed WomenWomenWord in the

  11. Word in the Square: Conversation Monitoring and Analysis Report |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric VehicleCenters | DepartmentKavita RaviValerie Reed WomenWomenWord in

  12. Microsoft Word - APMS Report 24 Feb 2011 EMAB Meeting. FINAL

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft Word -0.doc MicrosoftINTERIM

  13. Microsoft Word - CCP-PO-012-Revision 15

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft Word -0.docBRC CharterPO-012

  14. Microsoft Word - CCP-QP-002-Revision 39

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft Word -0.docBRC

  15. Microsoft Word - CCP-QP-008-Revision 24

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft Word -0.docBRCQP-008 Revision 24

  16. Microsoft Word - DOE MEBA Storage letter.doc

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft WordEnergy Cover1-13)

  17. Microsoft Word - EERE PSRP 7 23 2010 | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft WordEnergyWestEERE PSRP 7 23

  18. Microsoft Word - EM QA Corporate Board Meeting Minutes - February 2014

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft WordEnergyWestEERE PSRP 7 th

  19. Microsoft Word - EM Roadmap Rev 0 Dec 17 2010.docx

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft WordEnergyWestEERE PSRP 7

  20. Microsoft Word - EM SSAB Fall 2010 Mtg Min.FINAL

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft WordEnergyWestEERE February

  1. Microsoft Word - EM SSAB Spring 2010 Mtg Min.063010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft WordEnergyWestEERE February

  2. Microsoft Word - EMAB 15 Sept 2010 Meeting Agenda.090710

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft WordEnergyWestEERELa Fonda on

  3. Microsoft Word - EMAB 17 Nov 2010 Meeting Agenda.102510

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft WordEnergyWestEERELa Fonda

  4. Microsoft Word - EMAB APMS Sept 2010 - FINAL Report.091010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft WordEnergyWestEERELa

  5. Microsoft Word - EMAB TWS Summary Report FINAL.docx

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft WordEnergyWestEERELa

  6. Microsoft Word - EMSSABChairs conferencecall Dec2 FINAL_cab_rev

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating Panel1.doc Microsoft WordEnergyWestEERELa18,

  7. Microsoft Word - Revised DOE M 460 -Mar 2006.doc

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating35.doc Microsoft Word -

  8. Microsoft Word - Sept 2010.MeetingMinutes.FINAL

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating35.doc Microsoft Word -Secretary of EnergyEnergyLa

  9. Microsoft Word - TWCB meeting minutes Aug12r1 web

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating35.doc Microsoft Word -Secretary ofUpdated

  10. Microsoft Word - WIPPCookoff_Hobbs_V3.docx

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating35.doc Microsoft Word -Secretary ofUpdated014

  11. Microsoft Word - ygjlenss_EMSSABChairs.conferencecall.August7.FINAL

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating35.doc Microsoft Word -Secretary6-12.doc8August 7, 2008

  12. Microsoft Word - April06.doc | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment3311, 3312),MicrogridDepartment ofBAppendix A_2006_JunMicrosoft Word

  13. Microsoft Word - al2007-11.doc | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment3311,Official File UnitedToOn4.doc Microsoft Word

  14. Microsoft Word - test2015_race_to_zero_team_template

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy ChinaofSchaeferApril 1,(EAC)TABLE OF CONTENTS 1of:Microsoft WordREMARKS

  15. Microsoft Word - FY09PropertyBSCContractor.doc

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 atthe DistrictIndependent Research Assessmentof 8Microsoft Word

  16. Microsoft Word - FY09PropertyBSCFed.doc

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 atthe DistrictIndependent Research Assessmentof 8Microsoft Word Personal

  17. Microsoft Word - FY10PropertyBSCContractor.doc

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 atthe DistrictIndependent Research Assessmentof 8Microsoft Word

  18. Microsoft Word - FY10PropertyBSCFed.doc

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 atthe DistrictIndependent Research Assessmentof 8Microsoft WordFederal

  19. Microsoft Word - Matrixpart1.doc | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 atthe DistrictIndependentDepartment of Energy Microsoft Word

  20. Microsoft Word - AL2005-01.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOffice of Small.doc Microsoft Word

  1. Microsoft Word - AL2005-07.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOffice of Small.doc Microsoft Word2.doc Microsoft7.doc

  2. Microsoft Word - AL2005-08.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOffice of Small.doc Microsoft Word2.doc

  3. Microsoft Word - AL2005-10.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOffice of Small.doc Microsoft Word2.doc10.doc Microsoft

  4. Microsoft Word - AL2005-11.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOffice of Small.doc Microsoft Word2.doc10.doc

  5. Microsoft Word - AL2005-12.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOffice of Small.doc Microsoft Word2.doc10.docMicrosoft

  6. Microsoft Word - AL2005-14.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOffice of Small.doc Microsoft4.doc Microsoft Word -

  7. Microsoft Word - AL2005-15.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOffice of Small.doc Microsoft4.doc Microsoft Word -5.doc

  8. Microsoft Word - AL2005-16.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOffice of Small.doc Microsoft4.doc Microsoft Word

  9. Microsoft Word - AL2006-01.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOffice of Small.doc Microsoft4.doc Microsoft Word1.doc

  10. Microsoft Word - AL2006-09.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOffice of Small.doc Microsoft4.doc9.doc Microsoft Word -

  11. Microsoft Word - APPALACHIAN_STATE_VolumeI-Submissionv2.docx

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOffice of Small.docALonEO13423Last.doc Microsoft Word

  12. Microsoft Word - FAC2005-19.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOfficeNOTICE:Inspections andMicrosoft WordMemorandum

  13. Microsoft Word - FOA cover sheet.doc | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOfficeNOTICE:InspectionsMicrosoft WordFFATA T hrough t

  14. Microsoft Word - FY07AnnualReport.doc

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartmentOfficeNOTICE:InspectionsMicrosoft WordFFATA TMicrosoft7

  15. Thermostat Interface and Usability: A Survey

    E-Print Network [OSTI]

    Meier, Alan

    2011-01-01T23:59:59.000Z

    Administration (EIA), 2005) No national survey is yetSurvey, from http://www.gotoemerson.com Energy Information Administration (EIA) (Survey: Preliminary Housing Characteristics Tables, 2009 Energy Information Administration (EIA) (

  16. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  17. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  18. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  19. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  20. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  1. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  2. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  3. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  4. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  5. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  6. The key word is "supplying." In a load center or panel board, the main circuit breaker supplies power to the internal

    E-Print Network [OSTI]

    Johnson, Eric E.

    power to the internal bus bars, as do any backfed circuit breakers supplying power from the PV inverters these numbers translate to a 3,840-watt (AC inverter output) PV system on a 100-amp panel and a 7,680-watt PV on the circuit breakers. Many common PV inverters are rated at 2,500 watts and 240 volts. The rated output

  7. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  8. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  9. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  10. Word aligned bitmap compression method, data structure, and apparatus

    DOE Patents [OSTI]

    Wu, Kesheng; Shoshani, Arie; Otoo, Ekow

    2004-12-14T23:59:59.000Z

    The Word-Aligned Hybrid (WAH) bitmap compression method and data structure is a relatively efficient method for searching and performing logical, counting, and pattern location operations upon large datasets. The technique is comprised of a data structure and methods that are optimized for computational efficiency by using the WAH compression method, which typically takes advantage of the target computing system's native word length. WAH is particularly apropos to infrequently varying databases, including those found in the on-line analytical processing (OLAP) industry, due to the increased computational efficiency of the WAH compressed bitmap index. Some commercial database products already include some version of a bitmap index, which could possibly be replaced by the WAH bitmap compression techniques for potentially increased operation speed, as well as increased efficiencies in constructing compressed bitmaps. Combined together, this technique may be particularly useful for real-time business intelligence. Additional WAH applications may include scientific modeling, such as climate and combustion simulations, to minimize search time for analysis and subsequent data visualization.

  11. Cosmic X-ray Surveys of Distant Active Galaxies: The Demographics, Physics, and Ecology of Growing Supermassive Black Holes

    E-Print Network [OSTI]

    Brandt, W N

    2015-01-01T23:59:59.000Z

    We review results from cosmic X-ray surveys of active galactic nuclei (AGNs) over the past ~ 15 yr that have dramatically improved our understanding of growing supermassive black holes (SMBHs) in the distant universe. First, we discuss the utility of such surveys for AGN investigations and the capabilities of the missions making these surveys, emphasizing Chandra, XMM-Newton, and NuSTAR. Second, we briefly describe the main cosmic X-ray surveys, the essential roles of complementary multiwavelength data, and how AGNs are selected from these surveys. We then review key results from these surveys on the AGN population and its evolution ("demographics"), the physical processes operating in AGNs ("physics"), and the interactions between AGNs and their environments ("ecology"). We conclude by describing some significant unresolved questions and prospects for advancing the field.

  12. Microsoft Word - T4_VEIC_TO2_ Sub3_Residential Retrofit Program...

    Office of Environmental Management (EM)

    ofitprogramdesignguide.pdf More Documents & Publications Microsoft Word - Horizon Wind Energy Comments.docx Reporting Pre-guidance Announcement 06-02-2011 Letter to SEP...

  13. Word learning in context : the role of lifetime language input and sentential context

    E-Print Network [OSTI]

    Borovsky, Arielle

    2008-01-01T23:59:59.000Z

    with  human  word?learning  simulations  on  adults  that Human simulations of vocabulary  learning.  Cognition, 73(these  simulations  were  exploring  object  learning 

  14. Ten Hundred and One word challenge | U.S. DOE Office of Science...

    Office of Science (SC) Website

    People's Choice Voting for the Ten Hundred and One Word Challenge Energy Frontier Research Centers (EFRCs) EFRCs Home Centers Research Science Highlights News & Events EFRC News...

  15. A Survey of Utility Experience with Real Time Pricing

    SciTech Connect (OSTI)

    Barbose, Galen; Goldman, Charles; Neenan, Bernie

    2004-12-01T23:59:59.000Z

    While more than 70 utilities in the U.S. have offered voluntary RTP tariffs on either a pilot or permanent basis, most have operated in relative obscurity. To bring this broad base of experience to bear on policymakers current efforts to stimulate price responsive demand, we conducted a survey of 43 voluntary RTP tariffs offered in 2003. The survey involved telephone interviews with RTP program managers and other utility staff, as well as a review of regulatory documents, tariff sheets, program evaluations, and other publicly available sources. Based on this review of RTP program experience, we identify key trends related to: utilities motivations for implementing RTP, evolution of RTP tariff design, program participation, participant price response, and program outlook. We draw from these findings to discuss implications for policymakers that are currently considering voluntary RTP as a strategy for developing price responsive demand.

  16. CONSULTANT REPORT APPLIANCE MARKET SURVEY

    E-Print Network [OSTI]

    found at retail/wholesale stores, Internet sites, and in catalogs. This report delineates the degree.....................................................................................................................5 Retail/Wholesale Store Surveys ..........................................................................................................5 Retail/Wholesale Store Site Selection ..................................

  17. A Survey of Automated Deduction 

    E-Print Network [OSTI]

    Bundy, Alan

    We survey research in the automation of deductive inference, from its beginnings in the early history of computing to the present day. We identify and describe the major areas of research interest and their applications. ...

  18. A survey of structures on

    E-Print Network [OSTI]

    Choi, Suhyoung

    Euclidean geometry Spherical geometry Manifolds with geometric structures: manifolds need some canonical canonical descriptions.. Manifolds with (real) projective structures Outline Survey: Classical geometries's philosphy) Spherical geometry: Greek astronomy, Gauss, Riemann Hyperbolic geometry: Bolyai, Lobachevsky

  19. The VLT-FLAMES survey of massive stars: rotation and nitrogen enrichment as the key to understanding massive star evolution

    E-Print Network [OSTI]

    I. Hunter; I. Brott; D. J. Lennon; N. Langer; P. L. Dufton; C. Trundle; S. J. Smartt; A. de Koter; C. J. Evans; R. S. I. Ryans

    2008-02-18T23:59:59.000Z

    Rotation has become an important element in evolutionary models of massive stars, specifically via the prediction of rotational mixing. Here, we study a sample of stars, including rapid rotators, to constrain such models and use nitrogen enrichments as a probe of the mixing process. Chemical compositions (C, N, O, Mg and Si) have been estimated for 135 early B-type stars in the Large Magellanic Cloud with projected rotational velocities up to ~300km/s using a non-LTE TLUSTY model atmosphere grid. Evolutionary models, including rotational mixing, have been generated attempting to reproduce these observations by adjusting the overshooting and rotational mixing parameters and produce reasonable agreement with 60% of our core hydrogen burning sample. We find (excluding known binaries) a significant population of highly nitrogen enriched intrinsic slow rotators vsini less than 50km/s incompatible with our models ~20% of the sample). Furthermore, while we find fast rotators with enrichments in agreement with the models, the observation of evolved (log g less than 3.7dex) fast rotators that are relatively unenriched (a further ~20% of the sample) challenges the concept of rotational mixing. We also find that 70% of our blue supergiant sample cannot have evolved directly from the hydrogen burning main-sequence. We are left with a picture where invoking binarity and perhaps fossil magnetic fields are required to understand the surface properties of a population of massive main sequence stars.

  20. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  1. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  2. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  3. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  4. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  5. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  6. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  7. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  8. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  9. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  10. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  11. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  12. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  13. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  14. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  15. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  16. Co-training and Self-training for Word Sense Disambiguation Rada Mihalcea

    E-Print Network [OSTI]

    Mihalcea, Rada

    Co-training and Self-training for Word Sense Disambiguation Rada Mihalcea Department of Computer the application of co- training and self-training to word sense disam- biguation. Optimal and empirical parameter se- lection methods for co-training and self-training are investigated, with various degrees of error

  17. WORD RECOGNITION WITH MIXED-ALPHABET FORMS Laurie Beth Feldman and Aleksandar Kostic+

    E-Print Network [OSTI]

    of visually- distorted Serbo-Croatian word s. Each word was repeated in several different distorted versions.g .. KMFJIA). While both of these al phabets are generall y used to transcribe Serbo-Croatian, they are never than mixed alphabet forms. It was concluded that for Serbo-Croatian, mixed alphabet visual distortions

  18. Morphosemantic relations between verbs in Croatian WordNet Kresimir Sojat

    E-Print Network [OSTI]

    Morphosemantic relations between verbs in Croatian WordNet Kresimir Sojat Faculty of Humanities, Croatia msrebaci@unizg.hr Abstract This paper deals with morphosemantic rela- tions between Croatian verbs and discusses their inclusion in Croatian WordNet. Mor- phosemantic relations refer to semantic rela- tions

  19. THE WEIGHTED WORDS COLLECTOR JEREMIE DU BOISBERRANGER, DANI`ELE GARDY, AND YANN PONTY

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    THE WEIGHTED WORDS COLLECTOR J´ER´EMIE DU BOISBERRANGER, DANI`ELE GARDY, AND YANN PONTY Abstract. Motivated by applications in bioinformatics, we consider the word collector problem, i.e. the expected is obtained. The originality of this instance of the non-uniform coupon collector lies in the, potentially

  20. Assisting Web Search Using Query Suggestion Based on Word Similarity Measure and Query Modification

    E-Print Network [OSTI]

    Ng, Yiu-Kai Dennis

    . For example, when the word "Tiger" is entered by a user, current web search engines are mostly focusedAssisting Web Search Using Query Suggestion Based on Word Similarity Measure and Query Modification search engines is query suggestion (QS), which assists users in formulating keyword queries by suggesting

  1. Recognition and Scanning Recognition is deciding if a word is in a language or not

    E-Print Network [OSTI]

    Waterloo, University of

    Scanning Recognition and Scanning · Recognition is deciding if a word is in a language or not · we know how to do this for regular languages · Scanning is the process of splitting a string into tokens · each token will be a word in the language · use recognition to identify the tokens 1 #12;Scanning

  2. What is Wrong with this Word? Dyseggxia: a Game for Children with Dyslexia

    E-Print Network [OSTI]

    What is Wrong with this Word? Dyseggxia: a Game for Children with Dyslexia Luz Rello Clara Bayarri Dyseggxia, a game application with word exer- cises for children with dyslexia. We design the content are (i) designing exercises by using the analysis of errors written by people with dyslexia and (i

  3. DNA Word Design Strategy for Creating Sets of Non-interacting Oligonucleotides for DNA Microarrays

    E-Print Network [OSTI]

    DNA Word Design Strategy for Creating Sets of Non-interacting Oligonucleotides for DNA Microarrays-interacting DNA oligonucleotides for applications in DNA arrays and biosensors is demonstrated. This strategy mismatches with the complements of all the other members in the set. These "DNA word" sets are denoted as nbm

  4. A Comparison of LSA, WordNet and PMI-IR for Predicting User Click Behavior

    E-Print Network [OSTI]

    Hornof, Anthony

    A Comparison of LSA, WordNet and PMI-IR for Predicting User Click Behavior Ishwinder Kaur. This paper discusses a comparison of three semantic systems--LSA, WordNet and PMI-IR--to evaluate their performance in predicting the link that people would select given an information goal and a webpage. PMI

  5. Using WordNet to Extend FrameNet Coverage Richard Johansson and Pierre Nugues

    E-Print Network [OSTI]

    Nugues, Pierre

    Using WordNet to Extend FrameNet Coverage Richard Johansson and Pierre Nugues Department to address the prob- lem of sparsity in the FrameNet lexical database. The first method is based on the idea using a WordNet- based variant of the Lesk metric. The sec- ond method uses the sequence of synsets

  6. The neural correlates of statistical learning in a word segmentation task: An fMRI study

    E-Print Network [OSTI]

    Aslin, Richard N.

    history: Available online xxxx Keywords: fMRI Statistical learning Word segmentation Artificial language of this statistical learning mechanism in the do- main of language acquisition (see also Saffran, Aslin, & NewportThe neural correlates of statistical learning in a word segmentation task: An fMRI study Elisabeth

  7. COUNTING DESCENTS, RISES, AND LEVELS, WITH PRESCRIBED FIRST ELEMENT, IN WORDS

    E-Print Network [OSTI]

    Kitaev, Sergey

    COUNTING DESCENTS, RISES, AND LEVELS, WITH PRESCRIBED FIRST ELEMENT, IN WORDS Sergey Kitaev1 the distribution of descents, levels, and rises according to whether the first letter of the descent, rise 0654060 1 #12;2 COUNTING DESCENTS, RISES, AND LEVELS, WITH PRESCRIBED FIRST ELEMENT, IN WORDS Subsequently

  8. Climate Survey Original TemplateClimate Survey Original TemplateClimate Survey Original TemplateClimate Survey Original Template The Chair of the Department of DEPT NAME, NAME, is dedicated to improving workplace climate in your office. As part

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Climate Survey Original TemplateClimate Survey Original TemplateClimate Survey Original TemplateClimate Survey Original Template The Chair of the Department of DEPT NAME, NAME, is dedicated to improving Survey Original TemplateClimate Survey Original TemplateClimate Survey Original TemplateClimate Survey

  9. Paleo-highs may be key to deeper oil production

    SciTech Connect (OSTI)

    Davis, H.G.

    1989-03-01T23:59:59.000Z

    The Illinois basin is primarily a Paleozoic epeirogenic and epicratonic basin located in the east-central United States. Hydrocarbons have been commercially produced from this basin for more than a century, having reached cumulative production of more than 3.2 billion bbl of oil, with relatively little gas. Pursuing this production, more than 72 million feet of exploratory footage, a considerable sum, have been drilled. Taken at face value, these facts have created a commonly held impression throughout the oil and gas industry that the Illinois basin is in a very mature stage of exploration, In other words, the prejudice is that not many reserves remain to be found.

  10. Microsoft Word - 140815_NPR3_DOE_to_Consulting_Parties_Attachment...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    No. 3 Teapot Dome Class II Sampling University of Denver (D. Wells, C Carey, W Cough, Allan P. Olson); Archaeological Survey and the Wyoming Archaeological Survey,...

  11. Mon. Not. R. Astron. Soc. 402, 895902 (2010) doi:10.1111/j.1365-2966.2009.15973.x HST/NICMOS Paschen-Survey of the Galactic Centre: Overview

    E-Print Network [OSTI]

    Schneider, Glenn

    formation and its impact on the nuclear environment of galax- ies. Because of its proximity, the GC can-sensitivity panoramic view of stars and photoionized gas in the nuclear environment of the Galaxy. We detect with its environment. Key words: circumstellar matter ­ stars: formation ­ Galaxy: centre ­ infrared: stars

  12. Mon. Not. R. Astron. Soc. 385, 948956 (2008) doi:10.1111/j.1365-2966.2008.12888.x Multibeam maser survey of methanol and excited OH in the Magellanic

    E-Print Network [OSTI]

    Ward-Thompson, Derek

    2008-01-01T23:59:59.000Z

    formation, heavy metal abundance and the abundance of complex molecules. The LMC maser popula- tions of 45, whilst hydroxyl and water masers are a factor of 10 less abundant than our Galaxy. Key words. Initially, ground-state hydroxyl (OH) and wa- E-mail: james.green@postgrad.manchester.ac.uk Deceased 2006

  13. WESF natural phenomena hazards survey

    SciTech Connect (OSTI)

    Wagenblast, G.R., Westinghouse Hanford

    1996-07-01T23:59:59.000Z

    A team of engineers conducted a systematic natural hazards phenomena (NPH) survey for the 225-B Waste Encapsulation and Storage Facility (WESF). The survey is an assessment of the existing design documentation to serve as the structural design basis for WESF, and the Interim Safety Basis (ISB). The lateral force resisting systems for the 225-B building structures, and the anchorages for the WESF safety related systems were evaluated. The original seismic and other design analyses were technically reviewed. Engineering judgment assessments were made of the probability of NPH survival, including seismic, for the 225-B structures and WESF safety systems. The method for the survey is based on the experience of the investigating engineers,and documented earthquake experience (expected response) data.The survey uses knowledge on NPH performance and engineering experience to determine the WESF strengths for NPH resistance, and uncover possible weak links. The survey, in general, concludes that the 225-B structures and WESF safety systems are designed and constructed commensurate with the current Hanford Site design criteria.

  14. Social Networks and Online Privacy Concerns Survey The Social Networks and Online Privacy Concerns Survey

    E-Print Network [OSTI]

    Kaiser, Gail E.

    Social Networks and Online Privacy Concerns Survey The Social Networks and Online Privacy Concerns Survey The Social Networks and Online Privacy Concerns Survey is part of a research project survey #12;0% 100% Yes Unsure No Yes Unsure No Social Networks and Online Privacy Concerns Survey

  15. UT MPH STUDENT SURVEY (2013) 1 Master of Public Health Student Survey (2013)

    E-Print Network [OSTI]

    Tennessee, University of

    2013-01-01T23:59:59.000Z

    Planning & Administration will be referred to by its new title, Health Policy and Management. SurveyUT MPH STUDENT SURVEY (2013) 1 Master of Public Health Student Survey (2013) The University of Tennessee An anonymous electronic survey of MPH students was completed in April 2013. The survey

  16. VISUAL WORDS, TEXT ANALYSIS CONCEPTS FOR COMPUTER VISION Wang-Juh Chen, Hoi Tin Kong, Minah Oh,

    E-Print Network [OSTI]

    VISUAL WORDS, TEXT ANALYSIS CONCEPTS FOR COMPUTER VISION By Wang-Juh Chen, Hoi Tin Kong, Minah Oh Report: Visual Words, Text Analysis Concepts for Computer Vision Wang-Juh Chen Hoi Tin Kong Minah Oh

  17. Target Selection for the LBTI Exozodi Key Science Program

    E-Print Network [OSTI]

    Weinberger, Alycia J; Kennedy, Grant M; Roberge, Aki; Defrère, Denis; Hinz, Philip M; Millan-Gabet, Rafael; Rieke, George; Bailey, Vanessa P; Danchi, William C; Haniff, Chris; Mennesson, Bertrand; Serabyn, Eugene; Skemer, Andrew J; Stapelfeldt, Karl R; Wyatt, Mark C

    2015-01-01T23:59:59.000Z

    The Hunt for Observable Signatures of Terrestrial planetary Systems (HOSTS) on the Large Binocular Telescope Interferometer will survey nearby stars for faint emission arising from ~300 K dust (exozodiacal dust), and aims to determine the exozodiacal dust luminosity function. HOSTS results will enable planning for future space telescopes aimed at direct spectroscopy of habitable zone terrestrial planets, as well as greater understanding of the evolution of exozodiacal disks and planetary systems. We lay out here the considerations that lead to the final HOSTS target list. Our target selection strategy maximizes the ability of the survey to constrain the exozodi luminosity function by selecting a combination of stars selected for suitability as targets of future missions and as sensitive exozodi probes. With a survey of approximately 50 stars, we show that HOSTS can enable an understanding of the statistical distribution of warm dust around various types of stars and is robust to the effects of varying levels ...

  18. Facility Approvals, Security Surveys, and Nuclear Materials Surveys

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-02-03T23:59:59.000Z

    To establish the Department of Energy (DOE) requirements for granting facility approvals prior to permitting safeguards and security interests on the premises and the conduct of on-site security and/or nuclear material surveys of facilities with safeguards and security interests. Cancels DOE O 5630.7 and DOE O 5634.1. Canceled by DOE 5634.1B.

  19. Facility Approvals, Security Surveys, and Nuclear Materials Surveys

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-09-15T23:59:59.000Z

    To establish Department of Energy (DOE) requirements for granting facility approvals prior to permitting safeguards and security interests on the premises and the conduct of insite security and/or nuclear material surveys of facilities with safeguards and security interests. Cancels DOE 5634.1A. Canceled by DOE O 470.1 dated 9-28-95.

  20. Student Survey Items (Survey names listed in blue)

    E-Print Network [OSTI]

    Baltisberger, Jay H.

    by Topical Area: Admissions Berea-Specific Entering Survey, Fall Term First-Year Students and New Transfers community? Cooperative Institutional Research Program (CIRP), Entering Fall Term Students 2010 transfer students) Education Opportunity Center Educational Talent Search Upward Bound Upward Bound

  1. Microsoft Word - 1056311word

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem Not Found Item Not Found TheHot electron dynamics in807 DE899 06enginomix Integrated

  2. Discrete Mathematics and Theoretical Computer Science DMTCS vol. (subm.), by the authors, 11 The weighted words collector

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ­1 The weighted words collector J´er´emie du Boisberranger1 and Dani`ele Gardy1 and Yann Ponty2 1 Universit´e de collector problem, i.e. the expected number of calls to a random weighted generator before all the words collector lies in the, potentially large, multiplicity of the words/coupons of a given probability

  3. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  4. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  5. Hazards Survey and Hazards Assessments

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-08-21T23:59:59.000Z

    This volume is to assist DOE Operations/Field Offices and operating contractors in complying with the DOE O 151.1 requirement that Hazards Surveys and facility-specific Hazards Assessments be prepared, maintained, and used for emergency planning purposes. Canceled by DOE G 151.1-2.

  6. Considerations for PV Site Surveys

    E-Print Network [OSTI]

    Johnson, Eric E.

    array. #12;Conductor Routing & Inverter Location The location of the inverter in relation to the PV of the conductors between the PV array and the inverter, and between the inverter and the AC load centerConsiderations for PV Site Surveys John Wiles Sponsored by the U.S. Department of Energy this loss

  7. Life Choices Student Survey Items

    E-Print Network [OSTI]

    Baltisberger, Jay H.

    by Topical Area: Life Choices Berea-Specific Entering Survey, Fall Term First-Year Students and New Transfers for life-long learning Cooperative Institutional Research Program (CIRP), Entering Fall Term Students 2012, Historical Trends) Please indicate the extent to which each of the following describe you Searching

  8. Radiological Habits Survey, Chapelcross, 2005

    E-Print Network [OSTI]

    ;2 #12;3 SUMMARY 6 1. BACKGROUND 6 1.1 Regulation of radioactive waste discharges 6 1.2 The critical pipeline #12;4 TABLES Table 1. Typical food groups used in habits surveys Table 2. Adult consumption rates

  9. A Survey of Geometric Algebra

    E-Print Network [OSTI]

    Harrington, J. Patrick

    A Survey of Geometric Algebra and Geometric Calculus c Alan Macdonald Luther College, Decorah, IA is always available at my web page.) The principal argument for the adoption of geometric algebra and Geometric Algebra: http://faculty.luther.edu/~macdonal/laga/ Vector and Geometric Calculus: http

  10. SURVEY 2013 June 6, 2014

    E-Print Network [OSTI]

    Rosen, Jay

    AND STRATEGY Ithaka S+R Faculty Survey: five triennial cycles of national needs tracking. Ithaka S+R Library. Is there a sustainable role for the library in support of discovery? 3. Should libraries move from collections libraries transition to e-only acquisitions for books? 2. Is there a sustainable role for the library

  11. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  12. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  13. Automatic generation of stop word lists for information retrieval and analysis

    DOE Patents [OSTI]

    Rose, Stuart J

    2013-01-08T23:59:59.000Z

    Methods and systems for automatically generating lists of stop words for information retrieval and analysis. Generation of the stop words can include providing a corpus of documents and a plurality of keywords. From the corpus of documents, a term list of all terms is constructed and both a keyword adjacency frequency and a keyword frequency are determined. If a ratio of the keyword adjacency frequency to the keyword frequency for a particular term on the term list is less than a predetermined value, then that term is excluded from the term list. The resulting term list is truncated based on predetermined criteria to form a stop word list.

  14. Characterizing Walk Trips in communities by Using Data from 2009 National Household Travel Survey, American Community Survey, and Other Sources

    SciTech Connect (OSTI)

    Hwang, Ho-Ling [ORNL] [ORNL; Reuscher, Tim [Macrosys] [Macrosys; Wilson, Daniel W [ORNL] [ORNL; Murakami, Elaine [FHWA USDOT] [FHWA USDOT

    2013-01-01T23:59:59.000Z

    Non-motorized travel (i.e. walking and bicycling) are of increasing interest to the transportation profession, especially in context with energy consumption, reducing vehicular congestion, urban development patterns, and promotion of healthier life styles. This research project aimed to identify factors impacting the amount of travel for both walk and bike trips at the Census block group or tract level, using several public and private data sources. The key survey of travel behavior is the 2009 National Household Travel Survey (NHTS) which had over 87,000 walk trips for persons 16 and over, and over 6000 bike trips for persons 16 and over. The NHTS, in conjunction with the Census Bureau s American Community Survey, street density measures using Census Bureau TIGER, WalkScore , Nielsen Claritas employment estimates, and several other sources were used for this study. Stepwise Logistic Regression modeling techniques as well as Discriminant Analysis were applied using the integrated data set. While the models performed reasonably well for walk trips, travel by bike was abandoned due to sparseness of data. This paper discusses data sources utilized and modeling processes conducted under this study. It also presents a summary of findings and addresses data challenges and lesson-learned from this research effort.

  15. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  16. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  17. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  18. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  19. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  20. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  1. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  2. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  3. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  4. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  5. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  6. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  7. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  8. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  9. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  10. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  11. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  12. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  13. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  14. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  15. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  16. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  17. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  18. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  19. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  20. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  1. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  2. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  3. INTRODUCTION The annual Travel Survey completed its sixth year in 2012 and has become an extremely valuable database

    E-Print Network [OSTI]

    Blennerhassett, Peter

    Campus Development Control Plan. Survey results and trends are also key inputs to further planning Campus Population (Mon-Fri) Bicycles Linear Trends #12;PRIVATE MOTOR VEHICLES (CAR DRIVER, CAR PASSENGER,000 2007 2008 2009 2010 2011 2012 METHOD OF TRAVEL Figure 1 shows the changing trends in the method

  4. The ESSENCE Supernova Survey: Survey Optimization, Observations, and Supernova Photometry

    SciTech Connect (OSTI)

    Miknaitis, Gajus; Pignata, G.; Rest, A.; Wood-Vasey, W.M.; Blondin, S.; Challis, P.; Smith, R.C.; Stubbs, C.W.; Suntzeff, N.B.; Foley, R.J.; Matheson, T.; Tonry, J.L.; Aguilera, C.; Blackman, J.W.; Becker, A.C.; Clocchiatti, A.; Covarrubias, R.; Davis, T.M.; Filippenko, A.V.; Garg, A.; Garnavich, P.M.; /Fermilab /Chile U., Catolica /Cerro-Tololo

    2007-01-08T23:59:59.000Z

    We describe the implementation and optimization of the ESSENCE supernova survey, which we have undertaken to measure the equation of state parameter of the dark energy. We present a method for optimizing the survey exposure times and cadence to maximize our sensitivity to the dark energy equation of state parameter w = P/{rho}c{sup 2} for a given fixed amount of telescope time. For our survey on the CTIO 4m telescope, measuring the luminosity distances and redshifts for supernovae at modest redshifts (z {approx} 0.5 {+-} 0.2) is optimal for determining w. We describe the data analysis pipeline based on using reliable and robust image subtraction to find supernovae automatically and in near real-time. Since making cosmological inferences with supernovae relies crucially on accurate measurement of their brightnesses, we describe our efforts to establish a thorough calibration of the CTIO 4m natural photometric system. In its first four years, ESSENCE has discovered and spectroscopically confirmed 102 type Ia SNe, at redshifts from 0.10 to 0.78, identified through an impartial, effective methodology for spectroscopic classification and redshift determination. We present the resulting light curves for the all type Ia supernovae found by ESSENCE and used in our measurement of w, presented in Wood-Vasey et al. (2007).

  5. CNR GRADUATION SURVEY RESULTS Fall, 2001

    E-Print Network [OSTI]

    CNR GRADUATION SURVEY RESULTS Fall, 2001 Received 79 completed surveys out of 126 students who graduated in Dec, 2001 21 (27%) Have fulltime positions (9 temporary and 12 permanent) 3 (4

  6. MINNESOTA GEOLOGICAL SURVEY Harvey Thorleifson, Director

    E-Print Network [OSTI]

    for geologic carbon sequestration in the Midcontinent Rift System in Minnesota, Minnesota Geological Survey IN THE MIDCONTINENT RIFT SYSTEM OF MINNESOTA : ASSESSMENT OF POTENTIAL FOR DEEP GEOLOGIC SEQUESTRATION OF CARBONMINNESOTA GEOLOGICAL SURVEY Harvey Thorleifson, Director POTENTIAL CAPACITY FOR GEOLOGIC CARBON

  7. Residential Energy Consumption Survey Results: Total Energy Consumptio...

    Open Energy Info (EERE)

    Residential Energy Consumption Survey Results: Total Energy Consumption, Expenditures, and Intensities (2005) The Residential Energy Consumption Survey (RECS) is a national survey...

  8. State Geological Survey Contributions to the National Geothermal...

    Broader source: Energy.gov (indexed) [DOE]

    Washington State Department of Natural Resources Wisconsin Geological and Natural History Survey West Virginia Geological and Economic Survey Wyoming State Geological Survey...

  9. Survey Research Methodology in Management Information Systems: An Assessment

    E-Print Network [OSTI]

    Pinsonneault, Alain; Kraemer, Kenneth L.

    1993-01-01T23:59:59.000Z

    Management. 181-186. A survey. Management the impact onskill requirements: A survey. Management Information SystemsManagement Information Systems Research Challenge: Survey

  10. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  11. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  12. STEP Non-Participant Survey Report

    Broader source: Energy.gov [DOE]

    STEP Non-Participant Survey Report, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  13. What is a blog? The word "blog," a contraction of "web log," is an informational web

    E-Print Network [OSTI]

    Zhou, Pei

    What is a blog? The word "blog," a contraction of "web log," is an informational web page's log, blogs on the web tend to maintain an ordered chronology, although they often unfold in reverse

  14. Individual minds create universal patterns Exploring word order universals using an artificial language learning experiment 

    E-Print Network [OSTI]

    Spätgens, Tessa

    2011-11-23T23:59:59.000Z

    In recent years, the interest of language universals for researchers of language evolution has been pointed out in various publications. Word order universals are particularly robust examples, and the present dissertation ...

  15. Children's learning of number words in an indigenous farming-foraging group

    E-Print Network [OSTI]

    Piantadosi, Steven Thomas

    We show that children in the Tsimane', a farming-foraging group in the Bolivian rain-forest, learn number words along a similar developmental trajectory to children from industrialized countries. Tsimane' children successively ...

  16. Contributions of Prosodic and Distributional Features of Caregivers' Speech in Early Word Learning

    E-Print Network [OSTI]

    Vosoughi, Soroush

    How do characteristics of caregiver speech contribute to a child's early word learning? We explore the relationship between a single child's vocabulary growth and the distributional and prosodic characteristics of the ...

  17. Interactions of caregiver speech and early word learning in the Speechome corpus : computational explorations

    E-Print Network [OSTI]

    Vosoughi, Soroush

    2010-01-01T23:59:59.000Z

    How do characteristics of caregiver speech contribute to a child's early word learning? What is the relationship between a child's language development and caregivers' speech? Motivated by these general questions, this ...

  18. Linguistically-motivated sub-word modeling with applications to speech recognition

    E-Print Network [OSTI]

    Choueiter, Ghinwa F., 1980-

    2009-01-01T23:59:59.000Z

    Despite the proliferation of speech-enabled applications and devices, speech-driven human-machine interaction still faces several challenges. One of theses issues is the new word or the out-of-vocabulary (OOV) problem, ...

  19. AdWords and Generalized On-line Matching Aranyak Mehta

    E-Print Network [OSTI]

    Vazirani, Umesh

    AdWords and Generalized On-line Matching Aranyak Mehta Amin Saberi Umesh Vazirani Vijay Vazirani University, saberi@stanford.edu. Supported by NSF Career Award and a gift from Google. Computer Science Dept

  20. Word Sense Disambiguation via Human Computation Nitin Seemakurty, Jonathan Chu, Luis von Ahn, Anthony Tomasic

    E-Print Network [OSTI]

    Murphy, Robert F.

    bass. The word bass refers to a low-frequency tone in one sentence while it refers to a type of fish. Take, for example, the following two sentences [4]: (a) I can hear bass sounds. (b) They like grilled

  1. Back to Basics for Monolingual Alignment: Exploiting Word Similarity and Contextual Evidence

    E-Print Network [OSTI]

    Back to Basics for Monolingual Alignment: Exploiting Word Similarity and Contextual Evidence Md. Amid a variety of problem formulations and ingenious approaches to alignment, we take a step back

  2. Microsoft Word - GRS Review_OMB White Paper - Real Property Right...

    Office of Environmental Management (EM)

    GRS ReviewOMB White Paper - Real Property Right-sizing and Carbon Reduction August 7 2009 2.docx Microsoft Word - GRS ReviewOMB White Paper - Real Property Right-sizing and...

  3. Letter Fluency in Motor Neurone Disease: Is there a specific action word deficit? 

    E-Print Network [OSTI]

    Fawns-Ritchie, Chloe

    2013-03-13T23:59:59.000Z

    Recent studies have demonstrated that there is a specific verb, or action word, deficit in patients with a comorbid diagnosis of Motor Neurone Disease (MND) and dementia of the frontotemporal type. However, there has been less research examining...

  4. Modernizing historical Slovene words with character-based SMT Yves Scherrer

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Modernizing historical Slovene words with character-based SMT Yves Scherrer ALPAGE Université Paris- cently, character-based statistical machine trans- lation (C-SMT) (Vilar et al., 2007; Tiedemann, 2009

  5. ESS seminar: "Highlights in Survey Research"

    E-Print Network [OSTI]

    instruments. Based on the Total Survey Error approach (Groves et al., 2004), six quality standards were to successfully implementing a high quality survey in a single nation, mono language context in terms.S. titled "The Future of Survey Research." #12;"Measurement Quality in the Social Sciences Standards

  6. Radiation Protection Surveys in Clinical Areas

    E-Print Network [OSTI]

    Jia, Songtao

    Radiation Protection Surveys in Clinical Areas Procedure: 7.521 Created: 4/23/2014 Version: 1 as low as reasonably achievable (ALARA) it is necessary to perform routine radiation protection surveys minute (DPM) or below. Results should be recorded in DPM. a. Survey Areas #12;Radiation Protection

  7. MINNESOTA GEOLOGICAL SURVEY Harvey Thorleifson, Director

    E-Print Network [OSTI]

    CARBONATION AS A CARBON SEQUESTRATION METHOD IN MINNESOTA L. H. Thorleifson, Minnesota Geological Survey carbonation as a carbon sequestration method in Minnesota: Minnesota Geological Survey Open-File Report 11: Minnesota Geological Survey 2 #12;POTENTIAL FOR IMPLEMENTATION OF MINERAL CARBONATION AS A CARBON

  8. CNR GRADUATION SURVEY RESULTS Fall, 2002

    E-Print Network [OSTI]

    (38% are employed or attending grad school) #12;Natural Resource Management (17 completed surveys) 4CNR GRADUATION SURVEY RESULTS Fall, 2002 Received 73 completed surveys out of 79 students or are planning to attend graduate school after graduation $21,710 Average salary of the students who indicated

  9. North Sea Whitefish Survey: 2010 Prepared by

    E-Print Network [OSTI]

    ;Executive summary The North Sea Whitefish (NSW) survey sailed on 31 May 2010, fishing operations began on 1North Sea Whitefish Survey: 2010 Prepared by Chris Darby, Danny Normandale, Matthew Parker the first two surveys are encouraging. The NSW recorded a good range of ages for all target species in all

  10. North Sea Whitefish Survey: 2011 Prepared by

    E-Print Network [OSTI]

    ;Executive summary The North Sea Whitefish (NSW) survey sailed on 11 June 2011, fishing operations beganNorth Sea Whitefish Survey: 2011 Prepared by Chris Darby, Danny Normandale, Matthew Parker the three NSW surveys are starting to provide a valuable evaluation of the dynamics of the three target

  11. North Sea Whitefish Survey: 2012 Prepared by

    E-Print Network [OSTI]

    ;2 Executive summary The North Sea Whitefish (NSW) survey sailed on 03 June 2012, fishing operations beganNorth Sea Whitefish Survey: 2012 Prepared by Chris Darby, Danny Normandale, Marta Soffker, Samantha samples were collected from cod, haddock and whiting for age determination. In 2009, throughout the survey

  12. Rural electric cooperatives IRP survey

    SciTech Connect (OSTI)

    Garrick, C. [Garrick and Associates, Morrison, CO (United States)

    1995-11-01T23:59:59.000Z

    This report summarizes the integrated resource planning (IRP) practices of US rural electric cooperatives and the IRP policies which influence these practices. It was prepared by the National Renewable Energy Laboratory (NREL) and its subcontractor Garrick and Associates to assist the US Department of Energy (DOE) in satisfying the reporting requirements of Title 1, Subtitle B, Section 111(e)(3) of the Energy Policy Act of 1992 (EPAct), which states: (e) Report--Not later than 2 years after the date of the enactment of this Act, the Secretary (of the US Department of Energy) shall transmit a report to the President and to the Congress containing--(the findings from several surveys and evaluations, including:); (3) a survey of practices and policies under which electric cooperatives prepare IRPs, submit such plans to REA, and the extent to which such integrated resource planning is reflected in rates charged to customers.

  13. Models for Multiband IR Surveys

    E-Print Network [OSTI]

    Cong Xu; Carol J. Lonsdale; David L. Shupe; JoAnn O'Linger; Frank Masci

    2001-07-08T23:59:59.000Z

    Empirical 'backward' galaxy evolution models for IR-bright galaxies are constrained using multiband IR surveys. A new Monte-Carlo algorithm is developed for this task. It exploits a large library of realistic Spectral Energy Distributions (SEDs) of 837 local IR galaxies (IRAS 25$\\mu m$ selected) from the UV (1000{\\AA}) to the radio (20cm), including ISO-measured 3--13$\\mu m$ unidentified broad features (UIBs). The basic assumption is that the local correlation between SEDs and Mid-Infrared (MIR) luminosities can be applied to earlier epochs of the Universe. Three populations of IR sources are considered in the evolution models. These include (1) starburst galaxies, (2) normal late-type galaxies, and (3) galaxies with AGN. A set of models so constructed are compared with data from the literature. Predictions for number counts, confusion limits, redshift distributions, and color-color diagrams are made for multiband surveys using the upcoming SIRTF satellite.

  14. Wikipedia is a Practical Alternative to the Web for measuring Co-occurrence based Word Association

    E-Print Network [OSTI]

    Damani, Om P.

    the the popular word association measure PMI [2]. It is defined as: PMI(x, y) = log p(x, y) p(x)p(y) where p interested in relative rank- ings of word-pairs and not in their absolute PMI values. Hence, as discussed. Therefore, we redefine PMI as: PMI(x, y) = log n(x, y) n(x)n(y) where n(x, y), n(x), n(y) are the counts

  15. SURVEY RESEARCH LABORATORY UNIVERSITY OF ILLINOIS AT CHICAGO Conference on Health Survey Research Methods

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    SURVEY RESEARCH LABORATORY · UNIVERSITY OF ILLINOIS AT CHICAGO 10th Conference on Health Survey Research Methods April 8­11, 2011 CALL FOR PAPERS The Tenth Conference on Health Survey research methods that improve the quality of health survey data. The CHSRM will bring together researchers

  16. Identity and Access Management: Access Management Survey 1 Access Management Survey Questions

    E-Print Network [OSTI]

    Maroncelli, Mark

    Identity and Access Management: Access Management Survey 1 Access Management Survey Questions has developed a survey to solicit your input for Access Management. Please take a moment to complete be submitted by Friday May 14, 2010. #12;Identity and Access Management: Access Management Survey 2 Group

  17. The Sloan Digital Sky Survey

    E-Print Network [OSTI]

    Bruce Margon

    1998-08-19T23:59:59.000Z

    The Sloan Digital Sky Survey is an ambitious, multi-institutional project to create a huge digital imaging and spectroscopic data bank of 25% of the celestial sphere, approximately 10,000 deg^2 centred on the north galactic polar cap. The photometric atlas will be in 5 specially-chosen colours, covering the pi ster of the Survey area to a limiting magnitude of r~23.1, on 0.4" pixels, resulting in a 1 Tpixel map. This data base will be automatically analysed to catalog the photometric and astrometric properties of 10^8 stellar images, 10^8 galaxies, and 10^6 colour-selected QSO candidates; the galaxy data will in addition include detailed morphological data. The photometric data are used to autonomously and homogeneously select objects for the spectroscopic survey, which will include spectra of 10^6 galaxies, 10^5 QSOs, and 10^5 unusual stars. Although the project was originally motivated by the desire to study Large Scale Structure, we anticipate that these data will impact virtually every field of astronomy, from Earth-crossing asteroids to QSOs at z>6. In particular, the ~12 TByte multi-colour, precision calibrated imaging archive should be a world resource for many decades of the next century.

  18. International Experience with Key Program Elements of IndustrialEnergy Efficiency or Greenhouse Gas Emissions Reduction Target-SettingPrograms

    SciTech Connect (OSTI)

    Price, Lynn; Galitsky, Christina; Kramer, Klaas Jan

    2008-02-02T23:59:59.000Z

    Target-setting agreements, also known as voluntary ornegotiated agreements, have been used by a number of governments as amechanism for promoting energy efficiency within the industrial sector. Arecent survey of such target-setting agreement programs identified 23energy efficiency or GHG emissions reduction voluntary agreement programsin 18 countries. International best practice related to target-settingagreement programs calls for establishment of a coordinated set ofpolicies that provide strong economic incentives as well as technical andfinancial support to participating industries. The key program elementsof a target-setting program are the target-setting process,identification of energy-saving technologies and measures usingenergy-energy efficiency guidebooks and benchmarking as well as byconducting energy-efficiency audits, development of an energy-savingsaction plan, development and implementation of energy managementprotocols, development of incentives and supporting policies, monitoringprogress toward targets, and program evaluation. This report firstprovides a description of three key target-setting agreement programs andthen describes international experience with the key program elementsthat comprise such programs using information from the three keytarget-setting programs as well as from other international programsrelated to industrial energy efficiency or GHG emissionsreductions.

  19. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  20. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...