Powered by Deep Web Technologies
Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Spion Kop | Open Energy Information  

Open Energy Info (EERE)

Spion Kop Spion Kop Jump to: navigation, search Name Spion Kop Facility Spion Kop Sector Wind energy Facility Type Commercial Scale Wind Facility Status In Service Owner NorthWestern Energy Developer Compass Wind Energy Purchaser NorthWestern Energy Location Geyser MT Coordinates 47.339673°, -110.635933° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":47.339673,"lon":-110.635933,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

2

SLUDGE TREATMENT PROJECT KOP CONCEPTUAL DESIGN CONTROL DECISION REPORT  

SciTech Connect

This control decision addresses the Knock-Out Pot (KOP) Disposition KOP Processing System (KPS) conceptual design. The KPS functions to (1) retrieve KOP material from canisters, (2) remove particles less than 600 {micro}m in size and low density materials from the KOP material, (3) load the KOP material into Multi-Canister Overpack (MCO) baskets, and (4) stage the MCO baskets for subsequent loading into MCOs. Hazard and accident analyses of the KPS conceptual design have been performed to incorporate safety into the design process. The hazard analysis is documented in PRC-STP-00098, Knock-Out Pot Disposition Project Conceptual Design Hazard Analysis. The accident analysis is documented in PRC-STP-CN-N-00167, Knock-Out Pot Disposition Sub-Project Canister Over Lift Accident Analysis. Based on the results of these analyses, and analyses performed in support of MCO transportation and MCO processing and storage activities at the Cold Vacuum Drying Facility (CVDF) and Canister Storage Building (CSB), control decision meetings were held to determine the controls required to protect onsite and offsite receptors and facility workers. At the conceptual design stage, these controls are primarily defined by their safety functions. Safety significant structures, systems, and components (SSCs) that could provide the identified safety functions have been selected for the conceptual design. It is anticipated that some safety SSCs identified herein will be reclassified based on hazard and accident analyses performed in support of preliminary and detailed design.

CARRO CA

2010-03-09T23:59:59.000Z

3

SLUDGE TREATMENT PROJECT KOP DISPOSITION - THERMAL AND GAS ANALYSIS FOR THE COLD VACUUM DRYING FACILITY  

DOE Green Energy (OSTI)

The purpose of this document is to present conceptual design phase thermal process calculations that support the process design and process safety basis for the cold vacuum drying of K Basin KOP material. This document is intended to demonstrate that the conceptual approach: (1) Represents a workable process design that is suitable for development in preliminary design; and (2) Will support formal safety documentation to be prepared during the definitive design phase to establish an acceptable safety basis. The Sludge Treatment Project (STP) is responsible for the disposition of Knock Out Pot (KOP) sludge within the 105-K West (KW) Basin. KOP sludge consists of size segregated material (primarily canister particulate) from the fuel and scrap cleaning process used in the Spent Nuclear Fuel process at K Basin. The KOP sludge will be pre-treated to remove fines and some of the constituents containing chemically bound water, after which it is referred to as KOP material. The KOP material will then be loaded into a Multi-Canister Overpack (MCO), dried at the Cold Vacuum Drying Facility (CVDF) and stored in the Canister Storage Building (CSB). This process is patterned after the successful drying of 2100 metric tons of spent fuel, and uses the same facilities and much of the same equipment that was used for drying fuel and scrap. Table ES-l present similarities and differences between KOP material and fuel and between MCOs loaded with these materials. The potential content of bound water bearing constituents limits the mass ofKOP material in an MCO load to a fraction of that in an MCO containing fuel and scrap; however, the small particle size of the KOP material causes the surface area to be significantly higher. This relatively large reactive surface area represents an input to the KOP thermal calculations that is significantly different from the calculations for fuel MCOs. The conceptual design provides for a copper insert block that limits the volume available to receive KOP material, enhances heat conduction, and functions as a heat source and sink during drying operations. This use of the copper insert represents a significant change to the thermal model compared to that used for the fuel calculations. A number of cases were run representing a spectrum of normal and upset conditions for the drying process. Dozens of cases have been run on cold vacuum drying of fuel MCOs. Analysis of these previous calculations identified four cases that provide a solid basis for judgments on the behavior of MCO in drying operations. These four cases are: (1) Normal Process; (2) Degraded vacuum pumping; (3) Open MCO with loss of annulus water; and (4) Cool down after vacuum drying. The four cases were run for two sets of input parameters for KOP MCOs: (1) a set of parameters drawn from safety basis values from the technical data book and (2) a sensitivity set using parameters selected to evaluate the impact of lower void volume and smaller particle size on MCO behavior. Results of the calculations for the drying phase cases are shown in Table ES-2. Cases using data book safety basis values showed dry out in 9.7 hours and heat rejection sufficient to hold temperature rise to less than 25 C. Sensitivity cases which included unrealistically small particle sizes and corresponding high reactive surface area showed higher temperature increases that were limited by water consumption. In this document and in the attachment (Apthorpe, R. and M.G. Plys, 2010) cases using Technical Databook safety basis values are referred to as nominal cases. In future calculations such cases will be called safety basis cases. Also in these documents cases using parameters that are less favorable to acceptable performance than databook safety values are referred to as safety cases. In future calculations such cases will be called sensitivity cases or sensitivity evaluations Calculations to be performed in support of the detailed design and formal safety basis documentation will expand the calculations presented in this document to include: additional features of th

SWENSON JA; CROWE RD; APTHORPE R; PLYS MG

2010-03-09T23:59:59.000Z

4

SKA Key science project: Radio observations of cosmic reionization and first light  

E-Print Network (OSTI)

I update the SKA key science program (KSP) on first light and cosmic reionization. The KSP has two themes: (i) Using the 21cm line of neutral hydrogen as the most direct probe into the evolution of the neutral intergalactic medium during cosmic reionization. Such HI 21cm studies are potentially the most important new window on cosmology since the discovery of the CMB. (ii) Observing the gas, dust, star formation, and dynamics, of the first galaxies and AGN. Observations at cm and mm wavelengths, provide an unobscured view of galaxy formation within 1 Gyr of the Big Bang, and are an ideal complement to the study of stars, ionized gas, and AGN done using near-IR telescopes. I summarize HI 21cm signals, challenges, and telescopes under construction. I also discuss the prospects for studying the pre-galactic medium, prior to first light, using a low frequency telescope on the Moon. I then review the current status of mm and cm observations of the most known distant galaxies (z > 6). I make the simple argument that even a 10% SKA-high demonstrator will have a profound impact on the study of the first galaxies. In particular, extending the SKA to the 'natural' atmospheric limit (set by the O_2 line) of 45 GHz, increases the effective sensitivity to thermal emission by another factor four.

C. L. Carilli

2008-02-12T23:59:59.000Z

5

Key Outcomes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INDIAN COUNTRY ENERGY AND INFRASTRUCTURE WORKING GROUP ICEIWG Key Points & Action Items Inaugural Meeting Thursday, August 25, 2011 Renaissance Denver Hotel Denver, Colorado...

6

KEY PERSONNEL  

National Nuclear Security Administration (NNSA)

APPENDIX J KEY PERSONNEL 07032013 TITLE NAME President Christopher C. Gentile Vice President, Operations Robin Stubenhofer Director, Sr. Program Management Rick Lavelock...

7

Key Documents  

Science Conference Proceedings (OSTI)

AOCS by-laws, code of ethics and anti trust policy established during our 100+ legacy. Key Documents AOCS History and Governance about us aocs committees contact us division council fats governing board history oils professionals science value cen

8

Key Outcomes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Points & Action Items Key Points & Action Items Inaugural Meeting Thursday, August 25, 2011 Renaissance Denver Hotel Denver, Colorado Participants Tracey LeBeau, Director, Pilar Thomas, Deputy Director, and Brandt Petrasek, Special Assistant, Department of Energy, Office of Indian Energy Policy and Programs; Vice Chairman Ronald Suppah and Jim Manion, Confederated Tribes of the Warm Springs Reservation of Oregon; William Micklin, Ewiiaapaayp Band of Kumeyaay Indians; Councilman Barney Enos, Jr., Jason Hauter, Gila River Indian Community; Mato Standing High, Rosebud Sioux Tribe; R. Allen Urban, Yocha Dehe Wintun Nation; Glen Andersen, Scott Hendrick, Brooke Oleen, Jacquelyn Pless, Jim Reed and Julia Verdi, National Conference of State Legislatures-staff

9

Retrieval of Key Aerosol Optical Parameters from Spectral Direct and Diffuse Irradiances Observed by a Radiometer with Nonideal Cosine Response Characteristic  

Science Conference Proceedings (OSTI)

The spectral direct and diffuse irradiances observed by a radiometer with a horizontal surface detector have been frequently used to study aerosol optical parameters, such as aerosol optical thickness (?aer) and single scattering albedo (?). Such ...

Pradeep Khatri; Tamio Takamura; Akihiro Yamazaki; Yutaka Kondo

2012-05-01T23:59:59.000Z

10

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... A Framework for Designing Cryptographic Key Management Systems ... A Framework for Designing Cryptographic Key Management Systems ...

2013-08-13T23:59:59.000Z

11

BUDGET KEY DATES  

Science Conference Proceedings (OSTI)

BUDGET KEY DATES. For Immediate Release: December 15, 2009. Contact: Diane Belford 301-975-8400. Budget Key Dates.

2013-06-16T23:59:59.000Z

12

Group key management  

SciTech Connect

This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

Dunigan, T.; Cao, C.

1997-08-01T23:59:59.000Z

13

Two key questions about color superconductivity.  

E-Print Network (OSTI)

??We pose two key questions about color superconductivity: What are the effects of the large strange quark mass, and what are the observable consequences of (more)

Kundu, Joydip, 1977-

2004-01-01T23:59:59.000Z

14

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... responsible to executive-level management (eg, the Chief Information Officer) for the ... entity information, keys, and metadata into a database used by ...

2013-08-15T23:59:59.000Z

15

The Key Agreement Schemes  

Science Conference Proceedings (OSTI)

... The three key derivation functions include KDF in Counter Mode, KDF in Feedback Mode, and KDF in Double-Pipeline Iteration Mode. ...

2013-04-23T23:59:59.000Z

16

Cryptographic Key Management Workshop 2010  

Science Conference Proceedings (OSTI)

Cryptographic Key Management Workshop 2010. Purpose: ... Related Project(s): Cryptographic Key Management Project. Details: ...

2013-08-01T23:59:59.000Z

17

Optical key system  

Science Conference Proceedings (OSTI)

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, K.G.; Clough, R.E.

2000-04-25T23:59:59.000Z

18

Optical key system  

DOE Patents (OSTI)

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

2000-01-01T23:59:59.000Z

19

SR Key Facts  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Facts Savannah River Site Budget FY 2011 Budget Summary FY 2011 SRS EM Program Budget Summary FY 2012 Presidential Budget Request for SRS FY 2014 SRS EM Budget Presentation...

20

Key masking using biometry  

Science Conference Proceedings (OSTI)

We construct an abstract model based on a fundamental similarity property, which takes into account parametric dependencies and reflects a specific collection of requirements. We consider a method for masking a cryptographic key using biometry, which ...

A. L. Chmora

2011-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Key Emergency Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Emergency Information What to Do if an Emergency Arises DOE is committed to public safety in the event an emergency arises. You will likely be made aware that an emergency is...

22

ARM - Key Science Questions  

NLE Websites -- All DOE Office Websites (Extended Search)

govScienceKey Science Questions govScienceKey Science Questions Science Research Themes Research Highlights Journal Articles Collaborations Atmospheric System Research (ASR) ARM Science Team Meetings User Meetings Annual Meetings of the Atmospheric System Research (ASR) Science Team and Fall Working Groups Accomplishments Read about the 20 years of accomplishments (PDF, 696KB) from the ARM Program and user facility. Performance Metrics ASR Metrics 2009 2008 2007 2006 Key Science Questions The role of clouds and water vapor in climate change is not well understood; yet water vapor is the largest greenhouse gas and directly affects cloud cover and the propagation of radiant energy. In fact, there may be positive feedback between water vapor and other greenhouse gases. Carbon dioxide and other gases from human activities slightly warm the

23

Two key questions about color superconductivity  

E-Print Network (OSTI)

We pose two key questions about color superconductivity: What are the effects of the large strange quark mass, and what are the observable consequences of color superconductivity? Motivated by the first question, we study ...

Kundu, Joydip, 1977-

2004-01-01T23:59:59.000Z

24

Key Research Results Achievement  

E-Print Network (OSTI)

daylighting options for specific spaces with sample design layouts · Various HVAC system types that achieve%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvanced school in Greensburg, Kansas, used many of the energy efficiency measures outlined in the Advanced Energy

25

AP Key Accomplishments  

NLE Websites -- All DOE Office Websites (Extended Search)

Recent Key Accomplishments Recent Key Accomplishments Reduction of Carbon Dioxide Mechanistic insight into CO2 hydrogenation Rapid Transfer of Hydride Ion from a Ruthenium Complex to C1 Species in Water Reversible Hydrogen Storage using CO2 and a Proton-Switchable Iridium Catalyst in Aqueous Media Nickel(II) Macrocycles: Highly Efficient Electrocatalysts for the Selective Reduction of CO2 to CO Calculation of Thermodynamic Hydricities and the Design of Hydride Donors for CO2 Reduction Mechanisms for CO Production from CO2 Using Re(bpy)(CO)3X Catalysts Hydrogen Production Biomass-derived electrocatalytic composites for hydrogen evolution Hydrogen-Evolution Catalysts Based on NiMo Nitride Nanosheets Water Oxidation Enabling light-driven water oxidation via a low-energy RuIV=O intermediate

26

Cryptographic Key Management Workshop 2012  

Science Conference Proceedings (OSTI)

Cryptographic Key Management Workshop 2012. Purpose: NIST is conducting a two-day Key Management Workshop on September 10-11. ...

2013-08-01T23:59:59.000Z

27

Exploring the context : a small hotel in Key West  

E-Print Network (OSTI)

This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

VanBeuzekom, Edrick

1984-01-01T23:59:59.000Z

28

p38 mitogen-activated protein kinase plays a key role in regulating MAPKAPK2 expression  

Science Conference Proceedings (OSTI)

One of three major families of the mitogen-activated kinases (MAPK), p38 as well as JNK, has been shown to transduce extracellular stress stimuli into cellular responses by phospho-relay cascades. Among p38 families, p38{alpha} is a widely characterized isoform and the biological phenomena are explained by its kinase activity regulating functions of its downstream substrates. However, its specific contributions to each phenomenon are yet not fully elucidated. For better understanding of the role of MAPKs, especially p38{alpha}, we utilized newly established mouse fibroblast cell lines originated from a p38{alpha} null mouse, namely, a parental cell line without p38{alpha} gene locus, knockout of p38{alpha} (KOP), Zeosin-resistant (ZKOP), revertant of p38{alpha} (RKOP), and Exip revertant (EKOP). EKOP is smaller in size but grows faster than the others. Although comparable amounts of ERK and JNK are expressed in each cell line, ERK is highly phosphorylated in EKOP even in normal culture conditions. Serum stimulation after serum starvation led to ERK phosphorylation in RKOP and ZKOP, but not in EKOP as much. On the contrary, relative phosphorylation level of JNK to total JNK in response to UV was low in RKOP. And its phosphorylation as well as total JNK is slightly lower in EKOP. RKOP is less sensitive to UV irradiation as judged by the survival rate. Stress response upon UV or sorbitol stimuli, leading to mitogen activate protein kinase activated kinase 2 (MAPKAPK2) phosphorylation, was only observed in RKOP. Further experiments reveal that MAPKAPK2 expression is largely suppressed in ZKOP and EKOP. Its expression was recovered by re-introduction of p38{alpha}. The loss of MAPKAPK2 expression accompanied by the defect of p38{alpha} is confirmed in an embryonic extract prepared from p38{alpha} null mice. These data demonstrate that p38 signal pathway is regulated not only by phosphorylation but also by modulation of the expression of its component. Together, we have established cell lines that can be used in analyzing the functions of MAPKs, especially p38{alpha}, and show that p38 is indispensable for MAPKAPK2 expression.

Sudo, Tatsuhiko [Antibiotics Laboratory and Bioarchitect Research Group, DRI, RIKEN, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan)]. E-mail: sudo@riken.jp; Kawai, Kayoko [Antibiotics Laboratory and Bioarchitect Research Group, DRI, RIKEN, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Graduate School of Science and Engineering, Saitama University, 255 Shimo-okubo, Saitama, Saitama 338-8570 (Japan); Matsuzaki, Hiroshi [Graduate School of Science and Engineering, Saitama University, 255 Shimo-okubo, Saitama, Saitama 338-8570 (Japan); Osada, Hiroyuki [Antibiotics Laboratory and Bioarchitect Research Group, DRI, RIKEN, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Graduate School of Science and Engineering, Saitama University, 255 Shimo-okubo, Saitama, Saitama 338-8570 (Japan)

2005-11-18T23:59:59.000Z

29

Complementarity, distillable secret key, and distillable entanglement  

E-Print Network (OSTI)

We consider controllability of two conjugate observables Z and X by two parties with classical communication. The ability is specified by two alternative tasks, (i) agreement on Z and (ii) preparation of an eigenstate of X with use of an extra communication channel. We prove that their feasibility is equivalent to that of key distillation if the extra channel is quantum, and to that of entanglement distillation if it is classical. This clarifies the distinction between two entanglement measures, distillable key and distillable entanglement.

Masato Koashi

2007-04-27T23:59:59.000Z

30

Background on Quantum Key Distribution  

Science Conference Proceedings (OSTI)

... Background on Quantum Key Distribution. ... If someone, referred to by cryptographers as Eve, tries to eavesdrop on the transmission, she will not ...

2011-08-02T23:59:59.000Z

31

Partnership in key exchange protocols  

Science Conference Proceedings (OSTI)

In this paper, we investigate the notion of partnership as found in security models for key exchange protocols. Several different approaches have been pursued to define partnership, with varying degrees of success. We aim to provide an overview and criticism ... Keywords: key exchange, partnership, session identifier

Kazukuni Kobara; Seonghan Shin; Mario Strefler

2009-03-01T23:59:59.000Z

32

Key Activities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Activities Key Activities Key Activities The Water Power Program conducts work in four key areas at the forefront of water power research. The Program is structured to help the United States meet its growing energy demands sustainably and cost-effectively by developing innovative renewable water power technologies, breaking down market barriers to deployment, building the infrastructure to test new technologies, and assessing water power resources for integration into our nation's grid. Research and Development Introduce and advance new marine and hydrokinetic technologies to provide sustainable and cost-effective renewable energy from the nation's waves, tides, currents, and ocean thermal gradients. Research and develop innovative hydropower technologies to sustainably tap our country's diverse water resources including rivers,

33

Key China Energy Statistics 2011  

NLE Websites -- All DOE Office Websites (Extended Search)

1 Title Key China Energy Statistics 2011 Publication Type Chart Year of Publication 2012 Authors Levine, Mark D., David Fridley, Hongyou Lu, and Cecilia Fino-Chen Date Published...

34

Key China Energy Statistics 2012  

NLE Websites -- All DOE Office Websites (Extended Search)

2 Title Key China Energy Statistics 2012 Publication Type Chart Year of Publication 2012 Authors Levine, Mark D., David Fridley, Hongyou Lu, and Cecilia Fino-Chen Date Published...

35

EPAct Transportation Regulatory Activities: Key Terms  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Terms Key Terms to someone by E-mail Share EPAct Transportation Regulatory Activities: Key Terms on Facebook Tweet about EPAct Transportation Regulatory Activities: Key Terms on Twitter Bookmark EPAct Transportation Regulatory Activities: Key Terms on Google Bookmark EPAct Transportation Regulatory Activities: Key Terms on Delicious Rank EPAct Transportation Regulatory Activities: Key Terms on Digg Find More places to share EPAct Transportation Regulatory Activities: Key Terms on AddThis.com... Home About Covered Fleets Compliance Methods Alternative Fuel Petitions Resources Guidance Documents Statutes & Regulations Program Annual Reports Fact Sheets Newsletter Case Studies Workshops Tools Key Terms FAQs Key Terms The Energy Policy Act (EPAct) includes specific terminology related to

36

EPAct Transportation Regulatory Activities: Key Federal Statutes  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Key Federal Statutes to someone by E-mail Share EPAct Transportation Regulatory Activities: Key Federal Statutes on Facebook Tweet about EPAct Transportation Regulatory Activities: Key Federal Statutes on Twitter Bookmark EPAct Transportation Regulatory Activities: Key Federal Statutes on Google Bookmark EPAct Transportation Regulatory Activities: Key Federal Statutes on Delicious Rank EPAct Transportation Regulatory Activities: Key Federal Statutes on Digg Find More places to share EPAct Transportation Regulatory Activities: Key Federal Statutes on AddThis.com... Home About Contacts Covered Fleets Compliance Methods Alternative Fuel Petitions Resources Key Federal Statutes These are excerpts from federal statutes that established key Energy Policy Act (EPAct) transportation regulatory activities.

37

Key Workplace Documents Federal Publications  

E-Print Network (OSTI)

, the Administration in 2007 concluded agreements with China on toys, food and feed, drugs and medical devicesKey Workplace Documents Federal Publications Cornell University ILR School Year 2008 China/498 #12;Order Code RL33536 China-U.S. Trade Issues Updated March 7, 2008 Wayne M. Morrison Specialist

38

KIDS: keyed intrusion detection system  

Science Conference Proceedings (OSTI)

Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to mimic normal payload, and so avoid detection if the anomaly detection method ... Keywords: Kerckhoffs' principle, anomaly detection, keyed IDS, network intrusion detection, word model

Sasa Mrdovic; Branislava Drazenovic

2010-07-01T23:59:59.000Z

39

Key technology trends - Satellite systems  

Science Conference Proceedings (OSTI)

This paper is based on material extracted from the WTEC Panel Report Global Satellite Communications Technology and Systems, December 1998. It presents an overview of key technology trends in communications satellites in the last few years. After the ... Keywords: Communications satellites, Satellite communications, Satellite technology overview

Charles W. Bostian; William T. Brandon; Alfred U. Mac Rae; Christoph E. Mahle; Stephen A. Townes

2000-08-01T23:59:59.000Z

40

Rotating Plasma Finding is Key for ITER  

NLE Websites -- All DOE Office Websites (Extended Search)

Plasma Finding is Key for ITER Rotating Plasma Finding is Key for ITER PlasmaTurbulenceCSChang.png Tokamak turbulence showing inward-propagating streamers from normalized...

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Vehicle Technologies Office: Key Activities in Vehicles  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities in Key Activities in Vehicles to someone by E-mail Share Vehicle Technologies Office: Key Activities in Vehicles on Facebook Tweet about Vehicle Technologies Office: Key Activities in Vehicles on Twitter Bookmark Vehicle Technologies Office: Key Activities in Vehicles on Google Bookmark Vehicle Technologies Office: Key Activities in Vehicles on Delicious Rank Vehicle Technologies Office: Key Activities in Vehicles on Digg Find More places to share Vehicle Technologies Office: Key Activities in Vehicles on AddThis.com... Key Activities Mission, Vision, & Goals Plans, Implementation, & Results Organization & Contacts National Laboratories Budget Partnerships Key Activities in Vehicles We conduct work in four key areas to develop and deploy vehicle technologies that reduce the use of petroleum while maintaining or

42

Fuel Cell Technologies Office: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities to Key Activities to someone by E-mail Share Fuel Cell Technologies Office: Key Activities on Facebook Tweet about Fuel Cell Technologies Office: Key Activities on Twitter Bookmark Fuel Cell Technologies Office: Key Activities on Google Bookmark Fuel Cell Technologies Office: Key Activities on Delicious Rank Fuel Cell Technologies Office: Key Activities on Digg Find More places to share Fuel Cell Technologies Office: Key Activities on AddThis.com... Key Activities Plans, Implementation, & Results Accomplishments Organization Chart & Contacts Quick Links Hydrogen Production Hydrogen Delivery Hydrogen Storage Fuel Cells Technology Validation Manufacturing Codes & Standards Education Systems Analysis Contacts Key Activities The Fuel Cell Technologies Office conducts work in several key areas to

43

Algorithms for dynamic multicast key distribution  

Science Conference Proceedings (OSTI)

We study the problem of multicast key distribution for group security. Secure group communication systems typically rely on a group key, which is a secret shared among the members of the group. This key is used to provide privacy by encrypting all group ... Keywords: Dynamic key distribution, experimental algorithms, multicast

Justin Goshi; Richard E. Ladner

2007-02-01T23:59:59.000Z

44

Multiparty quantum key agreement with single particles  

Science Conference Proceedings (OSTI)

Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. ... Keywords: Quantum cryptography, Quantum information, Quantum key agreement

Bin Liu; Fei Gao; Wei Huang; Qiao-Yan Wen

2013-04-01T23:59:59.000Z

45

SunShot Initiative: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities Key Activities Printable Version Share this resource Send a link to SunShot Initiative: Key Activities to someone by E-mail Share SunShot Initiative: Key Activities on Facebook Tweet about SunShot Initiative: Key Activities on Twitter Bookmark SunShot Initiative: Key Activities on Google Bookmark SunShot Initiative: Key Activities on Delicious Rank SunShot Initiative: Key Activities on Digg Find More places to share SunShot Initiative: Key Activities on AddThis.com... Concentrating Solar Power Photovoltaics Systems Integration Balance of Systems Key Activities Under the SunShot Initiative, the DOE Solar Office issues competitive solicitations that fund selective research projects aimed at transforming the ways the United States generates, stores, and utilizes solar energy.

46

Alternative Fuels Data Center: Key Federal Legislation  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Key Federal Key Federal Legislation to someone by E-mail Share Alternative Fuels Data Center: Key Federal Legislation on Facebook Tweet about Alternative Fuels Data Center: Key Federal Legislation on Twitter Bookmark Alternative Fuels Data Center: Key Federal Legislation on Google Bookmark Alternative Fuels Data Center: Key Federal Legislation on Delicious Rank Alternative Fuels Data Center: Key Federal Legislation on Digg Find More places to share Alternative Fuels Data Center: Key Federal Legislation on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Key Federal Legislation The information below includes a brief chronology and summaries of key federal legislation related to alternative fuels and vehicles, air quality,

47

Renewable Energy Community: Key Elements  

NLE Websites -- All DOE Office Websites (Extended Search)

of Energy of Energy Office of Energy Efficiency & Renewable Energy National Renewable Energy Laboratory Innovation for Our Energy Future A Renewable Energy Community: Key Elements A reinvented community to meet untapped customer needs for shelter and transportation with minimal environmental impacts, stable energy costs, and a sense of belonging N. Carlisle, J. Elling, and T. Penney Technical Report NREL/TP-540-42774 January 2008 NREL is operated by Midwest Research Institute ● Battelle Contract No. DE-AC36-99-GO10337 National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov Operated for the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy by Midwest Research Institute * Battelle

48

Answering Key Fuel Cycle Questions  

Science Conference Proceedings (OSTI)

The Advanced Fuel Cycle Initiative (AFCI) program has both outcome and process goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the energy future. Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: What are the AFCI program goals? Which potential waste disposition approaches do we plan for? What are the major separations, transmutation, and fuel options? How do we address proliferation resistance? Which potential energy futures do we plan for? What potential external triggers do we plan for? Should we separate uranium? If we separate uranium, should we recycle it, store it or dispose of it? Is it practical to plan to fabricate and handle hot fuel? Which transuranic elements (TRU) should be separated and transmuted? Of those TRU separated, which should be transmuted together? Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? Should we separate and/or transmute very long-lived Tc and I isotopes? Which separation technology? What mix of transmutation technologies? What fuel technology best supports the above decisions?

Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

2003-10-01T23:59:59.000Z

49

Proactive key management protocol for multicast services  

Science Conference Proceedings (OSTI)

A group key management is essential scheme guaranteeing data confidentiality in multicast. To provide the strict secrecy in group communication, the rekeying delay has to be minimized. In this paper, we propose a new group key management protocol, called ...

Dong-Hyun Je; Seung-Woo Seo

2009-06-01T23:59:59.000Z

50

On multi-column foreign key discovery  

Science Conference Proceedings (OSTI)

A foreign/primary key relationship between relational tables is one of the most important constraints in a database. From a data analysis perspective, discovering foreign keys is a crucial step in understanding and working with the data. Nevertheless, ...

Meihui Zhang; Marios Hadjieleftheriou; Beng Chin Ooi; Cecilia M. Procopiuc; Divesh Srivastava

2010-09-01T23:59:59.000Z

51

Cryptographic Key Managment Workshop 2012-A Draft ...  

Science Conference Proceedings (OSTI)

... Specify the key generation methods used Specify the random number generators used Specify ... primary and backup facilities ...

2012-09-11T23:59:59.000Z

52

Group-Based Authentication and Key Agreement  

Science Conference Proceedings (OSTI)

This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes ... Keywords: Authentication and key agreement, Group key, Roaming, Security, Wireless network

Yu-Wen Chen; Jui-Tang Wang; Kuang-Hui Chi; Chien-Chao Tseng

2012-02-01T23:59:59.000Z

53

DOE M 200.1-1 Chapter 9, Public Key Cryptography and Key Management  

Directives, Delegations, and Requirements

The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key ...

2000-02-15T23:59:59.000Z

54

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

55

Unifying classical and quantum key distillation  

E-Print Network (OSTI)

Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ?ABE. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate, i.e., the number of key bits that can be extracted per copy of ?ABE. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eves side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eves memory are important in order to determine the correct security threshold in QKD. 1

Matthias Christ; Renato Renner

2008-01-01T23:59:59.000Z

56

Comment on "Quantum dense key distribution"  

E-Print Network (OSTI)

In this Comment we question the security of recently proposed by Degiovanni et al. [Phys. Rev. A 69 (2004) 032310] scheme of quantum dense key distribution.

Antoni Wojcik

2004-05-07T23:59:59.000Z

57

Cryptographic Key Management Workshop 2009 - A Holistic ...  

Science Conference Proceedings (OSTI)

... policies Board of Directors CEO Protect critical data CSO/CISO CIO We aren't ... Encrypted Database Management Encrypted Tape Key Management ...

2012-05-07T23:59:59.000Z

58

CODATA Key Values for Thermodynamics - TMS  

Science Conference Proceedings (OSTI)

Feb 8, 2007 ... This site includes internationally agreed upon values for thermodynamic properties of key chemical substances established by the Committee...

59

Nanomechanics: New Test Measures Key Properties of ...  

Science Conference Proceedings (OSTI)

Nanomechanics: New Test Measures Key Properties of ... Tests using the wrinkle-crack method, however, show ... to the longest duration tested, 10 days ...

2012-10-18T23:59:59.000Z

60

Quantum key distribution network with wavelength addressing  

E-Print Network (OSTI)

Most traditional applications of quantum cryptography are point-to-point communications, in which only two users can exchange keys. In this letter, we present a network scheme that enable quantum key distribution between multi-user with wavelength addressing. Considering the current state of wavelength division multiplexing technique, dozens or hundreds of users can be connected to such a network and directly exchange keys with each other. With the scheme, a 4-user demonstration network was built up and key exchanges were performed.

Mo, X F; Han, Z F; Xu, F X; Zhang, T; Guo, Guang-Can; Han, Zheng-Fu; Mo, Xiao-Fan; Xu, Fang-Xing; Zhang, Tao

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

New Quantum Key System Combines Speed, Distance  

Science Conference Proceedings (OSTI)

... a prototype high-speed quantum key distribution (QKD) system ... a theoretically unbreakable one-time pad encryption, transmission and decryption ...

2013-07-08T23:59:59.000Z

62

Schedules of Key Environmental Impact Statements  

Energy.gov (U.S. Department of Energy (DOE))

This document graphically displays the milestone dates and projected schedules of key Environmental Impact Statements (updated monthly).This chart represents anticipated activity and is not a...

63

BIASED RANDOM-KEY GENETIC ALGORITHMS WITH ...  

E-Print Network (OSTI)

Handbook of Metaheuristics. Kluwer. Academic Publishers, 2003. J.F. Gonalves and M.G.C. Resende. Biased random-key genetic algorithms for combinatorial...

64

Design and Analysis of Key Comparisons  

Science Conference Proceedings (OSTI)

... new methods, and make statistically best practices available ... to Key Comparisons such as data reporting and ... In the big picture, with the lowering ...

2010-11-18T23:59:59.000Z

65

Identity-based authenticated asymmetric group key agreement protocol  

Science Conference Proceedings (OSTI)

In identity-based public-key cryptography, an entity's public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key ... Keywords: asymmetric group key agreement, bilinear map, group key agreement, identity-based public-key cryptography

Lei Zhang; Qianhong Wu; Bo Qin; Josep Domingo-Ferrer

2010-07-01T23:59:59.000Z

66

Unifying classical and quantum key distillation  

E-Print Network (OSTI)

Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

2006-08-25T23:59:59.000Z

67

General model of quantum key distribution  

E-Print Network (OSTI)

A general mathematical framework for quantum key distribution based on the concepts of quantum channel and Turing machine is suggested. The security for its special case is proved. The assumption is that the adversary can perform only individual (in essence, classical) attacks. For this case an advantage of quantum key distribution over classical one is shown.

A. S. Trushechkin; I. V. Volovich

2005-04-20T23:59:59.000Z

68

General quantum key distribution in higher dimension  

E-Print Network (OSTI)

We study a general quantum key distribution protocol in higher dimension. In this protocol, quantum states in arbitrary g+1 (1?g?d) out of all d+1 mutually unbiased bases in a d-dimensional system can be used for the key ...

Shi, Han-Duo

69

Robust key extraction from physical uncloneable functions  

Science Conference Proceedings (OSTI)

Physical Uncloneable Functions (PUFs) can be used as a cost-effective means to store key material in an uncloneable way. Due to the fact that the key material is obtained by performing measurements on a physical system, noise is inevitably present in ... Keywords: authentication, challenge-response pair, error correction, noise, physical uncloneable function, speckle pattern

B. kori?; P. Tuyls; W. Ophey

2005-06-01T23:59:59.000Z

70

residential sector key indicators | OpenEI  

Open Energy Info (EERE)

residential sector key indicators residential sector key indicators Dataset Summary Description This dataset is the 2009 United States Residential Sector Key Indicators and Consumption, part of the Source EIA Date Released March 01st, 2009 (5 years ago) Date Updated Unknown Keywords AEO consumption EIA energy residential sector key indicators Data application/vnd.ms-excel icon 2009 Residential Sector Key Indicators and Consumption (xls, 55.3 KiB) Quality Metrics Level of Review Peer Reviewed Comment Temporal and Spatial Coverage Frequency Annually Time Period License License Open Data Commons Public Domain Dedication and Licence (PDDL) Comment http://www.eia.gov/abouteia/copyrights_reuse.cfm Rate this dataset Usefulness of the metadata Average vote Your vote Usefulness of the dataset Average vote Your vote

71

Fuel Cell Technologies Office: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities Key Activities The Fuel Cell Technologies Office conducts work in several key areas to advance the development and commercialization of hydrogen and fuel cell technologies. Research, Development, and Demonstration Key areas of research, development, and demonstration (RD&D) include the following: Fuel Cell R&D, which seeks to improve the durability, reduce the cost, and improve the performance of fuel cell systems, through advances in fuel cell stack and balance of plant components Hydrogen Fuel R&D, which focuses on enabling the production of low-cost hydrogen fuel from diverse renewable pathways and addressing key challenges to hydrogen delivery and storage Manufacturing R&D, which works to develop and demonstrate advanced manufacturing technologies and processes that will reduce the cost of fuel cell systems and hydrogen technologies

72

Captured key electrical safety lockout system  

DOE Patents (OSTI)

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

Darimont, Daniel E. (Aurora, IL)

1995-01-01T23:59:59.000Z

73

Make Observations  

NLE Websites -- All DOE Office Websites (Extended Search)

and public perceptions and preferences, help improve our understanding of risk, vulnerability, resilience, and adaptive capacity. How does USGCRP make observations? USGCRP...

74

Observations - CECM  

E-Print Network (OSTI)

May 10, 1999 ... A broad range of observations were made, culled from the various sources mentioned. Those bearing directly on the participatory process are...

75

Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions  

Science Conference Proceedings (OSTI)

Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed ... Keywords: Fuzzy extractor, Helper data algorithm, Intrinsic PUF, Key distribution, LC-PUFs, Physical unclonable functions, SRAMs, Sensor nodes

Jorge Guajardo; Boris kori?; Pim Tuyls; Sandeep S. Kumar; Thijs Bel; Antoon H. Blom; Geert-Jan Schrijen

2009-03-01T23:59:59.000Z

76

Composite keys? | OpenEI Community  

Open Energy Info (EERE)

Composite keys? Composite keys? Home > Groups > Databus Does DataBus support using composite keys in a Table definition? If not, is there a way to automatically generate a unique value for each entry that is uploaded? Submitted by Hopcroft on 5 September, 2013 - 17:13 1 answer Points: 0 At this time, no, and no way to generate unique key either right now. You can submit a feature request for this though on github. thanks, Dean Deanhiller on 6 September, 2013 - 06:58 Groups Menu You must login in order to post into this group. Recent content Go to My Databus->Data Streams... yes, it is done the same way y... Update rows? How to use streaming chart? if you are an administrator, s... more Group members (6) Managers: Deanhiller Recent members: Hopcroft Vikasgoyal Ksearight NickL

77

Password based key exchange with mutual authentication  

Science Conference Proceedings (OSTI)

A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [17] and later by Gennaro and Lindell [13]. However, these protocols do not support mutual authentication ...

Shaoquan Jiang; Guang Gong

2004-08-01T23:59:59.000Z

78

Cryptographic Key Management Project - Comments on the ...  

Science Conference Proceedings (OSTI)

... planned digital signature lifetime (based on the key strength ... Will the CAVP provide a standalone DH test that ... for about an eighth of the cost of 2.5 ...

2012-05-07T23:59:59.000Z

79

Jurisdiction Members Contact Info Key Staffers  

E-Print Network (OSTI)

Relevant Jurisdiction Members Contact Info Key Staffers House Science, Space, and Technology, aeronautics, civil aviation, environment, and marine science · America COMPETES · Energy labs · National Science Foundation, including NCAR · National Aeronautics and Space Administration · National Weather

80

Some key Y-12 General Foremen remembered  

NLE Websites -- All DOE Office Websites (Extended Search)

expanded from K-25 to Y-12 and X-10, they brought their management style with them. Clark Center was a key individual. Clark Center Park, still known by old timers as "Carbide...

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Quantum Key Distribution Using Quantum Faraday Rotators  

E-Print Network (OSTI)

We propose a new quantum key distribution (QKD) protocol based on the fully quantum mechanical states of the Faraday rotators. The protocol is unconditionally secure against eavesdropping for single-photon source on a noisy environment and robust against impersonation attacks. It also allows for unconditionally secure key distribution for multiphoton source up to two photons. The protocol could be implemented experimentally with the current spintronics technology on semiconductors.

Choi, T; Choi, Mahn-Soo; Choi, Taeseung

2006-01-01T23:59:59.000Z

82

Multipartite secret key distillation and bound entanglement  

Science Conference Proceedings (OSTI)

Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

2009-10-15T23:59:59.000Z

83

High Efficient Secret Key Distillation for Long Distance Continuous Variable Quantum Key Distribution  

E-Print Network (OSTI)

The continuous variable quantum key distribution is expected to provide high secret key rate without single photon source and detector, but the lack of the secure and effective key distillation method makes it unpractical. Here, we present a secure single-bit-reverse-reconciliation protocol combined with secret information concentration and post-selection, which can distill the secret key with high efficiency and low computational complexity. The simulation results show that this protocol can provide high secret key rate even when the transmission fiber is longer than 150km, which may make the continuous variable scheme to outvie the single photon one.

Yi-bo Zhao; Zheng-fu Han; Jin-jian Chen; You-zhen Gui; Guang-can Guo

2006-03-08T23:59:59.000Z

84

NIST Special Publication 800-57, Recommendation for Key ...  

Science Conference Proceedings (OSTI)

... keying material from key backup or archive. ... term random number generator (RNG) is ... Deterministic Random Bit Generators (DRBGs), sometimes ...

2012-07-10T23:59:59.000Z

85

ITL Bulletin Generating Secure Cryptographic Keys: A Critical ...  

Science Conference Proceedings (OSTI)

... KEYS: A CRITICAL COMPONENT OF CRYPTOGRAPHIC ... relies upon two basic components: an algorithm (or ... and of keys for symmetric algorithms. ...

2013-04-16T23:59:59.000Z

86

A secure multiple-agent cryptographic key recovery system  

Science Conference Proceedings (OSTI)

Symmetric cryptography uses the same session key for message encryption and decryption. Without having it, the encrypted message will never be revealed. In case the session key is unavailable or government authorities need to inspect suspect messages, ... Keywords: key recovery, key recovery agent, key recovery center, secret sharing, session key

Kanokwan Kanyamee; Chanboon Sathitwiriyawong

2009-08-01T23:59:59.000Z

87

STGWG Key Outcomes for May 3, 2010  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Outcomes-Nashville 2010 Page 1 Key Outcomes-Nashville 2010 Page 1 State and Tribal Government Working Group (STGWG) Nashville, Tennessee - May 3, 2010 KEY OUTCOMES OVERVIEW Members appreciated the participation of all DOE officials at the STGWG meeting in Nashville, and are especially appreciative of the participation of high-level DOE management, such as Sky Gallegos, Deputy Assistant Secretary of the Office of Congressional and Intergovernmental Affairs, and Frank Marcinowski, Acting Chief Technical Officer and Deputy Assistant Secretary for Technical and Regulatory Support. Such participation demonstrates a continuing commitment to improve interaction with tribes and states. STGWG looks forward to our next Intergovernmental meeting with DOE in the fall. FULL STGWG ISSUES

88

Composite keys? | OpenEI Community  

Open Energy Info (EERE)

Composite keys? Home > Groups > Databus Does DataBus support using composite keys in a Table definition? If not, is there a way to automatically generate a unique value for each entry that is uploaded? Submitted by Hopcroft on 5 September, 2013 - 17:13 1 answer Points: 0 At this time, no, and no way to generate unique key either right now. You can submit a feature request for this though on github. thanks, Dean Deanhiller on 6 September, 2013 - 06:58 Groups Menu You must login in order to post into this group. Recent content Go to My Databus->Data Streams... yes, it is done the same way y... Update rows? How to use streaming chart? if you are an administrator, s... more Group members (7) Managers: Deanhiller Recent members: Bradmin Hopcroft Vikasgoyal Ksearight

89

Public key infrastructure for DOE security research  

SciTech Connect

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

90

Nonorthogonal decoy-state Quantum Key Distribution  

E-Print Network (OSTI)

In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and heavy loss in transmission line. Decoy states method and nonorthogonal encoding protocol are two important weapons to combat these effects. Here, we combine these two methods and propose a efficient method that can substantially improve the performance of QKD. We find a 79 km increase in transmission distance over the prior record using decoy states method.

Li, J B; Li, Jing-Bo; Fang, Xi-Ming

2005-01-01T23:59:59.000Z

91

Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate  

E-Print Network (OSTI)

We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bru

2013-03-14T23:59:59.000Z

92

Basics about CIM technology and key  

E-Print Network (OSTI)

Basics about CIM® technology and key applications Ales Strancar March, 2011 #12;Leaders in Monolith monolithic technology (CIM®). 4 USA patents granted including their foreign equivalents, more pending. #12;Important Milestones · 2002: First Drug Master File (DMF) for CIM® DEAE supports. · 2002: Pass first FDA

Lebendiker, Mario

93

Key issues of RFID reader network system  

Science Conference Proceedings (OSTI)

RFID system is used widely in different applications and comes in a myriad of forms today. It is doomed to be concerned by people and still be the hot spot of research in the next few years. In this paper, Key issues of RFID reader network system are ... Keywords: RFID, WSN, anti-collision algorithm, taxonomy

Leian Liu; Dashun yan; Jiapei Wu; Hongjiang Wang

2009-09-01T23:59:59.000Z

94

Key Management Challenges in Smart Grid  

Science Conference Proceedings (OSTI)

Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

Sheldon, Frederick T [ORNL; Duren, Mike [Sypris Electronics, LLC

2012-01-01T23:59:59.000Z

95

Family of Finite Geometry Low-Density Parity-Check Codes for Quantum Key Expansion  

E-Print Network (OSTI)

We consider a quantum key expansion (QKE) protocol based on entanglement-assisted quantum error-correcting codes (EAQECCs). In these protocols, a seed of a previously shared secret key is used in the post-processing stage of a standard quantum key distribution protocol like the Bennett-Brassard 1984 protocol, in order to produce a larger secret key. This protocol was proposed by Luo and Devetak, but codes leading to good performance have not been investigated. We look into a family of EAQECCs generated by classical finite geometry (FG) low-density parity-check (LDPC) codes, for which very efficient iterative decoders exist. A critical observation is that almost all errors in the resulting secret key result from uncorrectable block errors that can be detected by an additional syndrome check and an additional sampling step. Bad blocks can then be discarded. We make some changes to the original protocol to avoid the consumption of the preshared key when the protocol fails. This allows us to greatly reduce the bit error rate of the key at the cost of a minor reduction in the key production rate, but without increasing the consumption rate of the preshared key. We present numerical simulations for the family of FG LDPC codes, and show that this improved QKE protocol has a good net key production rate even at relatively high error rates, for appropriate choices of these codes.

Kung-Chuan Hsu; Todd A. Brun

2013-03-07T23:59:59.000Z

96

Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure  

Science Conference Proceedings (OSTI)

Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in Certificate Authorities (CAs), resilience against attacks, communication overhead (bandwidth and latency) for setting up an SSL/TLS connection, and availability ... Keywords: accountability, certificate validation, public log servers, public-key infrastructure, ssl, tls

Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perring, Collin Jackson, Virgil Gligor

2013-05-01T23:59:59.000Z

97

Leakage resilient strong key-insulated signatures in public channel  

Science Conference Proceedings (OSTI)

Key-insulation aims at minimizing (i.e., compartmentalizing) the damage of users from key exposures, and traditionally requires a private channel of communication between a user and a semi-trusted party called a helper to refresh the private keys. The ... Keywords: continual key leakage, key-insulation, public channel, signatures

Le Trieu Phong; Shin'ichiro Matsuo; Moti Yung

2010-12-01T23:59:59.000Z

98

Key Facts: Solyndra Solar | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » Key Facts: Solyndra Solar Key Facts: Solyndra Solar On September 1, 2011, Solyndra, a solar energy start-up and recipient of an Energy Department loan guarantee, declared bankruptcy. While this event is deeply disappointing, at the time the loan guarantee was issued, Solyndra was widely seen as a promising and innovative company: Solyndra was named one of the world's "50 Most Innovative Companies" in 2010 by MIT's Technology Review and included in the Wall Street Journal's "The Next Big Thing: Top 50 Venture Backed Companies." Private investors, after conducting their own careful review of Solyndra, put $1 billion of their own private capital behind the company. Solyndra reported sales growth of 40% from 2009 to 2010, from $100

99

Practical Decoy State for Quantum Key Distribution  

E-Print Network (OSTI)

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution. Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states--the vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.

X. Ma; B. Qi; Y. Zhao; H. -K. Lo

2005-03-01T23:59:59.000Z

100

Key Physical Mechanisms in Nanostructured Solar Cells  

DOE Green Energy (OSTI)

The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

Dr Stephan Bremner

2010-07-21T23:59:59.000Z

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Estimation of Convective Rainfall from Lightning Observations  

Science Conference Proceedings (OSTI)

The objective of this study is to develop a technique to use lightning observations for estimating convective rainfall. A framework for rainfall estimation is developed in which key elements are 1) the rainfalllightning ratio, that is, the ...

Alberto Tapia; James A. Smith; Michael Dixon

1998-11-01T23:59:59.000Z

102

Method for encryption and transmission of digital keying data  

DOE Patents (OSTI)

A method for the encryption, transmission, and subsequent decryption of digital keying data. The method utilizes the Data Encryption Standard and is implemented by means of a pair of apparatus, each of which is selectable to operate as either a master unit or remote unit. Each unit contains a set of key encryption keys which are indexed by a common indexing system. The master unit operates upon command from the remote unit to generate a data encryption key and encrypt the data encryption key using a preselected key encryption key. The encrypted data encryption key and an index designator are then downloaded to the remote unit, where the data encryption key is decrypted for subsequent use in the encryption and transmission data. Downloading of the encrypted data encryption key enables frequent change of keys without requiring manual entry or storage of keys at the remote unit.

Mniszewski, Susan M. (Los Alamos, NM); Springer, Edward A. (Los Alamos, NM); Brenner, David P. (North Collins, NY)

1988-01-01T23:59:59.000Z

103

PKM: a pairwise key management scheme for wireless sensor networks  

Science Conference Proceedings (OSTI)

Sensor networks are characterized by strict resource limitations and large scalability. Many sensor network applications require secure communication, a crucial component, especially in harsh environments. Symmetric key cryptography is very attractive ... Keywords: key distribution, key management, security, sensor networks

F. An; X. Cheng; J. M. Rivera; J. Li; Z. Cheng

2005-08-01T23:59:59.000Z

104

Key Renewable Energy Opportunities for Oklahoma Tribes | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Renewable Energy Opportunities for Oklahoma Tribes Key Renewable Energy Opportunities for Oklahoma Tribes August 13, 2012 Oklahoma City, Oklahoma Cox Convention Center The...

105

Single, Key Gene Discovery Could Streamline Production of Biofuels...  

NLE Websites -- All DOE Office Websites (Extended Search)

Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

106

Vehicle Electrification is Key to Reducing Petroleum Dependency...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas Emission Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas...

107

Building Technologies Office: Key Activities in Energy Efficiency  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Efficiency to someone by E-mail Share Building Technologies Office: Key Activities in Energy Efficiency on Facebook Tweet about Building Technologies Office: Key Activities...

108

Energy: Critical Infrastructure and Key Resources Sector-Specific...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy: Critical Infrastructure and Key...

109

Energy Critical Infrastructure and Key Resources Sector-Specific...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy Critical Infrastructure and Key...

110

Technology Key to Harnessing Natural Gas Potential | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa Energy...

111

NIST SP 800-57, Recommendation for Key Management ...  

Science Conference Proceedings (OSTI)

... service use a hash function as a component of the ... mitigated by splitting the key into components that are ... a. When a symmetric key is used only for ...

2012-12-12T23:59:59.000Z

112

NERSC Played Key Role in Nobel Laureate's Discovery  

NLE Websites -- All DOE Office Websites (Extended Search)

Played Key Role in Nobel Laureate's Discovery NERSC Played Key Role in Nobel Laureate's Discovery NERSC, Berkeley Lab Now Centers for Computational Cosmology Community October 4,...

113

TEC Working Group Topic Groups Rail Key Documents Planning Subgroup...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Rail Key Documents Planning Subgroup TEC Working Group Topic Groups Rail Key Documents Planning Subgroup Planning Subgroup Rail Planning Timeline Benchmarking Project: AREVA Trip...

114

Variability of Absorption and Optical Properties of Key Aerosol Types Observed in Worldwide Locations  

Science Conference Proceedings (OSTI)

Aerosol radiative forcing is a critical, though variable and uncertain, component of the global climate. Yet climate models rely on sparse information of the aerosol optical properties. In situ measurements, though important in many respects, ...

Oleg Dubovik; Brent Holben; Thomas F. Eck; Alexander Smirnov; Yoram J. Kaufman; Michael D. King; Didier Tanr; Ilya Slutsker

2002-02-01T23:59:59.000Z

115

Many-core key-value store  

Science Conference Proceedings (OSTI)

Scaling data centers to handle task-parallel work-loads requires balancing the cost of hardware, operations, and power. Low-power, low-core-count servers reduce costs in one of these dimensions, but may require additional nodes to provide the required ... Keywords: 64-core Tilera TILEPro64, many-core key-value store, data centers, task-parallel workloads, low-core-count servers, low-power servers, under-utilizing memory, power consumption, high-core-count processor, clock rate, 4-core Intel Xeon L5520, 8-core AMD Opteron 6128 HE

M. Berezecki; E. Frachtenberg; M. Paleczny; K. Steele

2011-07-01T23:59:59.000Z

116

Quantum Key Distribution Highly Sensitive to Eavesdropping  

E-Print Network (OSTI)

We introduce a new quantum key distribution protocol that uses d-level quantum systems to encode an alphabet with c letters. It has the property that the error rate introduced by an intercept-and-resend attack tends to one as the numbers c and d increase. In dimension d=2, when the legitimate parties use a complete set of three mutually unbiased bases, the protocol achieves a quantum bit error rate of 57.1%. This represents a significant improvement over the 25% quantum bit error rate achieved in the BB84 protocol or 33% in the six-state protocol.

Brierley, Stephen

2009-01-01T23:59:59.000Z

117

Quantum Key Distribution Highly Sensitive to Eavesdropping  

E-Print Network (OSTI)

We introduce a new quantum key distribution protocol that uses d-level quantum systems to encode an alphabet with c letters. It has the property that the error rate introduced by an intercept-and-resend attack tends to one as the numbers c and d increase. In dimension d=2, when the legitimate parties use a complete set of three mutually unbiased bases, the protocol achieves a quantum bit error rate of 57.1%. This represents a significant improvement over the 25% quantum bit error rate achieved in the BB84 protocol or 33% in the six-state protocol.

Stephen Brierley

2009-10-14T23:59:59.000Z

118

Analysis and design of a secure key exchange scheme  

Science Conference Proceedings (OSTI)

We propose a new key exchange scheme where the secret key is obtained by multiplying the powers of block upper triangular matrices. After studying the cryptographic properties of these block matrices, the theoretical aspects of this scheme are analyzed, ... Keywords: Block matrices, Cryptography, Discrete logarithm problem, Key exchange scheme, Public key, Quick exponentiation, Security, Triangular matrices

Rafael lvarez; Leandro Tortosa; Jos-Fco Vicent; Antonio Zamora

2009-05-01T23:59:59.000Z

119

Vehicle Technologies Office: Key Activities in Vehicles  

NLE Websites -- All DOE Office Websites (Extended Search)

Activities in Vehicles Activities in Vehicles We conduct work in four key areas to develop and deploy vehicle technologies that reduce the use of petroleum while maintaining or improving performance, power, and comfort. Research and development (R&D); testing and analysis; government and community stakeholder support; and education help people access and use efficient, clean vehicles that meet their transportation needs. Researcher loads a sample mount of battery cathode materials for X-ray diffraction, an analysis tool for obtaining information on the crystallographic structure and composition of materials. Research and Development of New Technologies Develop durable and affordable advanced batteries as well as other forms of energy storage. Improve the efficiency of combustion engines.

120

Toolpusher is key to efficient rig operation  

Science Conference Proceedings (OSTI)

Toolpushers earn a higher salary, control more personnel, and are responsible for a more expensive operation than many graduate MBAs. As a result, toolpushers are key to improved rig efficiencies and reduced crew turnover. For example, by having its toolpushers in Libya implement a new managerial approach, Santa Fe Drilling Co. reduced labor turnover 30%, reduced the number of lost-time accidents 58%, and increased average rig inspection scores 6%. During the boom years of drilling, toolpushers complained often about the poor quality of roustabouts and roughnecks assigned to them. Many toolpushers held poor screening of personnel responsible, and felt justified in firing those who were slow to adapt. Few of them considered that they were directly responsible. Today's toolpusher must realize that he is responsible not only for the rig, its maintenance, and its drilling performance, but for training and development of the rig's personnel as well.

Fortney, K.

1983-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Key decisions near for Chad pipeline proposal  

Science Conference Proceedings (OSTI)

The World Bank is expected to play a key role in a proposed $3 billion development of oil fields in Chad and an export pipeline through Cameroon to the Atlantic Ocean. The project, which has been at least 4 years in the making, could see a breakthrough later this year. Esso Exploration and production Chad Inc. is operator for the consortium proposing the project. It holds a 40% interest, Ste. Shell Tchadienne de Recherches et d`Exploitation has 40%, and Elf Hydrocarbures Tchad has a 20% share it purchased from Chevron Corp. in 1993 (OGJ, February 1, 1993, p 25). The governments of Chad and Cameroon, which had approved a framework agreement for the pipeline in 1995, now are studying an assessment of the pipeline`s environmental impact. If they approve the plans, they are expected to apply to the World Bank for financing. The paper describes the Chad fields, the export pipeline, background information, and the Banks role.

Crow, P.

1997-05-12T23:59:59.000Z

122

Key Renewable Energy Opportunities for Oklahoma Tribes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TRIBAL LEADER FORUM SERIES TRIBAL LEADER FORUM SERIES KEY RENEWABLE ENERGY OPPORTUNITIES FOR OKLAHOMA TRIBES August 13, 2012 COX CONVENTION CENTER 100 West Sheridan Avenue, Oklahoma City, OK 73102 (405) 602-8500 The fifth in a series of planned U.S. DOE Office of Indian Energy-sponsored strategic energy development & investment forums, this forum is designed to give Oklahoma tribal leaders the opportunity to receive the latest updates on DOE's energy development efforts in Indian Country. The Forum will provide a venue for tribal leaders to discuss best practices in renewable energy development, including project development and finance, issues related to Oklahoma land ownership, and energy planning and energy markets. Tribal leaders will also have the opportunity to directly converse with each other by participating in a roundtable

123

Problems of Security Proofs and Fundamental Limit on Key Generation Rate in Quantum Key Distribution  

E-Print Network (OSTI)

It is pointed out that treatments of the error correcting code in current quantum key distribution protocols of the BB84 type are not correct under joint attack, and the general interpretation of the trace distance security criterion is also incorrect. With correct interpretation of the criterion as well as a correct treatment of the error correcting code and privacy amplification code, it is shown that even for an ideal system under just collective attack, the maximum tolerable quantum bit error rate is about 1.5% and a net key cannot actually be generated with practical error correcting codes even at such low rates, contrary to claims in the literature.

Horace P. Yuen

2012-05-16T23:59:59.000Z

124

Finite-key analysis of high-dimensional time-energy entanglement-based quantum key distribution  

E-Print Network (OSTI)

We present a security analysis against collective attacks for the recently proposed time-energy entanglement-based quantum key distribution protocol, given the practical constraints of single photon detector efficiency, channel loss, and finite-key considerations. We find a positive secure-key capacity when the key length increases beyond $10^4$ for eight-dimensional systems. The minimum key length required is reduced by the ability to post-select on coincident single-photon detection events. Including finite-key effects, we show the ability to establish a shared secret key over a 200 km fiber link.

Catherine Lee; Jacob Mower; Zheshen Zhang; Jeffrey H. Shapiro; Dirk Englund

2013-11-05T23:59:59.000Z

125

Compression station key to Texas pipeline project  

SciTech Connect

This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

NONE

1996-10-01T23:59:59.000Z

126

Searchlight Wind Energy Project FEIS Appendix E  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

E E Page | E 21B Appendix E: Visual Simulations and Contrast Rating Forms Form 8400-4 UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT VISUAL CONTRAST RATING WORKSHEET Date June 2, 2009 District Las Vegas Field Office Resource Area Activity (program) Proposed Wind Generation SECTION A. PROJECT INFORMATION 1. Project Name Searchlight Wind Project 4. Location Township 23S Range 63E Section 2 5. Location Sketch 2. Key Observation Point KOP 1 - Railroad Pass Hotel/Casino 3. VRM Class NA SECTION B. CHARACTERISTIC LANDSCAPE DESCRIPTION 1. LAND/WATER 2. VEGETATION 3. STRUCTURES FORM Gently rolling to flat valleys with angular and jagged mountainous features Pixilated and amorphous/patchy Vertical, horizontal, angular, cylindrical, and geometric

127

Efficient password-based authenticated key exchange without public information  

Science Conference Proceedings (OSTI)

Since the first password-based authenticated key exchange (PAKE) was proposed, it has enjoyed a considerable amount of interest from the cryptographic research community. To our best knowledge, most of proposed PAKEs based on Diffie-Hellman key exchange ...

Jun Shao; Zhenfu Cao; Licheng Wang; Rongxing Lu

2007-09-01T23:59:59.000Z

128

Implementation of Distributed Key Generation Algorithms using Secure Sockets  

Science Conference Proceedings (OSTI)

Distributed Key Generation (DKG) protocols are indispensable in the design of any cryptosystem used in communication networks. DKG is needed to generate public/private keys for signatures or more generally for encrypting/decrypting messages. One such ...

A. T. Chronopoulos; F. Balbi; D. Veljkovic; N. Kolani

2004-08-01T23:59:59.000Z

129

Key Ingredient: Change in Material Boosts Prospects of ...  

Science Conference Proceedings (OSTI)

Key Ingredient: Change in Material Boosts Prospects of Ultrafast Single-photon Detector. From NIST Tech Beat: June 30, 2011. ...

2011-10-14T23:59:59.000Z

130

Nano Changes Rise to Macro Importance in a Key Electronics ...  

Science Conference Proceedings (OSTI)

Nano Changes Rise to Macro Importance in a Key Electronics Material. From NIST Tech Beat: April 7, 2009. ...

2012-10-01T23:59:59.000Z

131

Better 'Photon Loops' May Be Key to Computer and Physics ...  

Science Conference Proceedings (OSTI)

Better 'Photon Loops' May Be Key to Computer and Physics Advances. From NIST Tech Beat: August 22, 2011. ...

2012-08-23T23:59:59.000Z

132

Energy Usage Data Standard for US Smart Grid Passes Key ...  

Science Conference Proceedings (OSTI)

Energy Usage Data Standard for US Smart Grid Passes Key Advisory Panel Vote. From NIST Tech Beat: March 1, 2011. ...

2011-03-01T23:59:59.000Z

133

ITL Bulletin - ITL Updates Glossary of Key Information Security ...  

Science Conference Proceedings (OSTI)

... ITL UPDATES GLOSSARY OF KEY INFORMATION SECURITY TERMS ... ITL plans to keep the glossary current by providing updates online. ...

2013-06-12T23:59:59.000Z

134

Quantum key distribution system clocked at 2 GHz  

E-Print Network (OSTI)

Quantum key distribution system clocked at 2 GHz Karen J. Gordon, Veronica Fernandez, Gerald S, Ireland http://www.phy.hw.ac.uk/resrev/photoncounting/index.html Abstract: An improved quantum key-based quantum key distribution test system performance in terms of transmission distance and quantum bit error

Buller, Gerald S.

135

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts November 29, 2011 - 4:34pm Addthis THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASENovember 29, 2011 President Obama Announces More Key Administration Posts WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Frederick "Rick" Barton - Assistant Secretary for Conflict and Stabilization Operations and Coordinator for Reconstruction and Stabilization, Department of State Arun Majumdar - Under Secretary of Energy, Department of Energy Marie F. Smith - Member, Social Security Advisory Board The President also announced his intent to appoint the following

136

Secret key distillation from shielded two-qubit states  

Science Conference Proceedings (OSTI)

The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

2010-05-15T23:59:59.000Z

137

Secret key distillation from shielded two-qubit states  

E-Print Network (OSTI)

The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

Joonwoo Bae

2008-03-03T23:59:59.000Z

138

EIA Data: 2011 United States Residential Sector Key Indicators and  

Open Energy Info (EERE)

Residential Sector Key Indicators and Residential Sector Key Indicators and Consumption Dataset Summary Description This dataset is the 2011 United States Residential Sector Key Indicators and Consumption, part of the Annual Energy Outlook that highlights changes in the AEO Reference case projections for key energy topics. Source EIA Date Released December 16th, 2010 (4 years ago) Date Updated Unknown Keywords consumption EIA energy residential sector key indicators Data application/vnd.ms-excel icon Residential Sector Key Indicators and Consumption (xls, 62.5 KiB) Quality Metrics Level of Review Peer Reviewed Comment Temporal and Spatial Coverage Frequency Annually Time Period License License Open Data Commons Public Domain Dedication and Licence (PDDL) Comment http://www.eia.gov/abouteia/copyrights_reuse.cfm

139

Security proof of practical quantum key distribution schemes  

E-Print Network (OSTI)

This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

Yodai Watanabe

2005-06-29T23:59:59.000Z

140

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts May 28, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Gordon Heddell, Inspector General, Department of Defense; Ellen Murray, Assistant Secretary for Resources and Technology, Department of Health and Human Services; Polly Trottenberg, Assistant Secretary for Transportation Policy, Department of Transportation; and James J. Markowsky, Assistant Secretary for Fossil Energy, Department of Energy. President Obama said, "Each of these individuals brings extensive expertise in their chosen fields, and they are joining my administration at a time

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts April 17, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Christine M. Griffin, Deputy Director of Office of Personnel Management; Kevin Concannon, Under Secretary for Food, Nutrition and Consumer Services, United States Department of Agriculture; Rajiv Shah, Under Secretary for Research, Education, and Economics, United States Department of Agriculture; Michael Nacht, Assistant Secretary of Defense (Global Strategic Affairs), Department of Defense; Mercedes Márquez, Assistant Secretary for Community Planning and Development, Department of Housing and

142

Florida Keys Electric Cooperative - Residential Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Florida Keys Electric Cooperative - Residential Rebate Program Florida Keys Electric Cooperative - Residential Rebate Program Florida Keys Electric Cooperative - Residential Rebate Program < Back Eligibility Residential Savings Category Home Weatherization Commercial Weatherization Sealing Your Home Heating & Cooling Commercial Heating & Cooling Cooling Insulation Design & Remodeling Windows, Doors, & Skylights Program Info State Florida Program Type Utility Rebate Program Rebate Amount Rebates $25 - $500, max $1000 per member Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a free home energy audit. An FKEC trained auditor will assess the home and make recommendations for

143

Natural Gas Markets: Recent Changes and Key Drivers  

U.S. Energy Information Administration (EIA)

U.S. Energy Information Administration Independent Statistics & Analysis www.eia.gov Natural Gas Markets: Recent Changes and Key Drivers for

144

NREL: News - NREL Fills Key Leadership Role for Energy Systems...  

NLE Websites -- All DOE Office Websites (Extended Search)

513 NREL Fills Key Leadership Role for Energy Systems Integration June 17, 2013 Bryan J. Hannegan will join the Energy Department's National Renewable Energy Laboratory on June 24...

145

Advanced Analysis Software Key to New, Energy-Efficient ...  

Advanced Analysis Software Key to New, Energy-Efficient Technologies Leveraging Scientific and Engineering Know-How to Advance Sources of Renewable En ...

146

EIA highlights key factors in new energy and financial markets ...  

U.S. Energy Information Administration (EIA)

Yesterday, EIA launched a new web-based assessment highlighting key factors that can affect crude oil prices called "Energy and Financial Markets: What Drives Crude ...

147

Overview of Indian Hydrogen Program and Key Safety Issues of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Energy Road Map - Initiatives - Target 2020 : GIFT - Programme in India - CNG - H 2 Programme - Partnership - Technology Development - Concerns & Challenges * Key...

148

Report Identifies Three Key R&D Priorities for Future ...  

Science Conference Proceedings (OSTI)

... Networking and Information Technology Research and Development Program. For more details, see Report Identifies Three Key R&D Priorities for ...

2011-07-18T23:59:59.000Z

149

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with...

150

Thailand-Key Results and Policy Recommendations for Future Bioenergy...  

Open Energy Info (EERE)

013 Country Thailand UN Region South-Eastern Asia References Thailand-Key Results and Policy Recommendations for Future Bioenergy Development1 Abstract "The Government of...

151

TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Radiation Monitoring Subgroup TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring Subgroup Radiation Monitoring Subgroup Draft Work Plan - February 4, 2008 More...

152

Knowledge, Skills, and Abilities for Key Radiation Protection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Notice No. 1 November 2007 DOE STANDARD KNOWLEDGE, SKILLS, AND ABILITIES FOR KEY RADIATION PROTECTION POSITIONS AT DOE FACILITIES U.S. Department of Energy FSC 6910...

153

Key Facts about the Mathematics and Computer Science Division...  

NLE Websites -- All DOE Office Websites (Extended Search)

Publications Documents Key Facts about the Mathematics and Computer Science Division Researchers in the Mathematics and Computer Science Division attack complex problems in four...

154

Advanced Analysis Software Key to New, Energy-Efficient ...  

Advanced Analysis Software Key to New, Energy-Efficient Technologies Leveraging Scientific and Engineering Know-How to Advance Sources of Renewable Energy

155

Fossil Energy Announces Addition of Three Key Staff Members ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

appointment of three key senior staff members to the Office of Fossil Energy - James F. Wood, Deputy Assistant Secretary for Clean Coal; Christopher A. Smith, Deputy Assistant...

156

DVD Production Process & Key Factors for Quality Discs  

Science Conference Proceedings (OSTI)

... wide market share for DVD +/- RW; #2 World-wide market share for CD ... Key factor - deep knowledge of forming thin metal film - optimization of ...

2006-01-20T23:59:59.000Z

157

TEC Working Group Topic Groups Rail Key Documents Intermodal...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Intermodal Subgroup TEC Working Group Topic Groups Rail Key Documents Intermodal Subgroup Intermodal Subgroup Draft Work Plan More Documents & Publications TEC Working Group Topic...

158

Big Coppitt Key, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Bureau 2005 Place to 2006 CBSA Retrieved from "http:en.openei.orgwindex.php?titleBigCoppittKey,Florida&oldid227749" Categories: Places Stubs Cities What links here...

159

Big Pine Key, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Bureau 2005 Place to 2006 CBSA Retrieved from "http:en.openei.orgwindex.php?titleBigPineKey,Florida&oldid227765" Categories: Places Stubs Cities What links here...

160

Building Technologies Office: Key Activities in Energy Efficiency  

NLE Websites -- All DOE Office Websites (Extended Search)

work in three key areas in order to continually develop innovative, cost-effective energy saving solutions. research and development (R&D), market stimulation, and building...

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Observational Tests of Modified Gravity  

E-Print Network (OSTI)

Modified gravity theories have richer observational consequences for large-scale structure than conventional dark energy models, in that different observables are not described by a single growth factor even in the linear regime. We examine the relationships between perturbations in the metric potentials, density and velocity fields, and discuss strategies for measuring them using gravitational lensing, galaxy cluster abundances, galaxy clustering/dynamics and the ISW effect. We show how a broad class of gravity theories can be tested by combining these probes. A robust way to interpret observations is by constraining two key functions: the ratio of the two metric potentials, and the ratio of the Gravitational ``constant'' in the Poisson equation to Newton's constant. We also discuss quasilinear effects that carry signatures of gravity, such as through induced three-point correlations. Clustering of dark energy can mimic features of modified gravity theories and thus confuse the search for distinct signatures of such theories. It can produce pressure perturbations and anisotropic stresses, which breaks the equality between the two metric potentials even in general relativity. With these two extra degrees of freedom, can a clustered dark energy model mimic modified gravity models in all observational tests? We show with specific examples that observational constraints on both the metric potentials and density perturbations can in principle distinguish modifications of gravity from dark energy models. We compare our result with other recent studies that have slightly different assumptions (and apparently contradictory conclusions).

Bhuvnesh Jain; Pengjie Zhang

2007-09-17T23:59:59.000Z

162

Robust data sharing with key-value stores  

Science Conference Proceedings (OSTI)

A key-value store (KVS) offers functions for storing and retrieving values associated with unique keys. KVSs have become widely used as shared storage solutions for Internet-scale distributed applications. We present a fault-tolerant wait-free efficient ... Keywords: cloud storage, distributed storage

Cristina Basescu; Christian Cachin; Ittay Eyal; Robert Haas; Marko Vukolic

2011-06-01T23:59:59.000Z

163

Robust data sharing with key-value stores  

Science Conference Proceedings (OSTI)

A key-value store (KVS) offers functions for storing and retrieving values associated with unique keys. KVSs have become the most popular way to access Internet-scale cloud storage systems. We present an efficient wait-free algorithm that ...

Cristina Basescu; Christian Cachin; Ittay Eyal; Robert Haas; Alessandro Sorniotti; Marko Vukolic; Ido Zachevsky

2012-06-01T23:59:59.000Z

164

A framework for password-based authenticated key exchange1  

Science Conference Proceedings (OSTI)

In this paper, we present a general framework for password-based authenticated key exchange protocols, in the common reference string model. Our protocol is actually an abstraction of the key exchange protocol of Katz et al. and is based on the recently ... Keywords: Passwords, authentication, dictionary attack, projective hash functions

Rosario Gennaro; Yehuda Lindell

2006-05-01T23:59:59.000Z

165

Efficient decoy-state quantum key distribution with quantified security  

E-Print Network (OSTI)

We analyse the finite-size security of the efficient Bennett-Brassard 1984 protocol implemented with decoy states and apply the results to a gigahertz-clocked quantum key distribution system. Despite the enhanced security level, the obtained secure key rates are the highest reported so far at all fibre distances.

M. Lucamarini; K. A. Patel; J. F. Dynes; B. Frhlich; A. W. Sharpe; A. R. Dixon; Z. L. Yuan; R. V. Penty; A. J. Shields

2013-10-01T23:59:59.000Z

166

An extension of secure group communication using key graph  

Science Conference Proceedings (OSTI)

With the continuously emerging of Internet applications based on secure group communication, the design of secure group communication becomes an important Internet design topic. Group key management is important for secure group communication. Previous ... Keywords: Batch rekey, Group security, Key graph, Rekey

Zhang Jun; Zhou Yu; Ma Fanyuan; Gu Dawu; Bai Yingcai

2006-10-01T23:59:59.000Z

167

Electricity and Development: Global Trends and Key Challenges  

E-Print Network (OSTI)

Electricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12 and the transport burden in Tanzania. Source: Modi, 2004 #12;2. Energy and Human Development Access to electricity

168

Cryptanalysis of two three-party encrypted key exchange protocols  

Science Conference Proceedings (OSTI)

Due to the simplicity of maintaining human memorable passwords without any assistant storage device, password-based three-party encrypted key exchange (3PEKE) protocol has become one of the most promising research fields on user authentication and secure ... Keywords: Authentication, Cryptanalysis, Security, Three-party encrypted key exchange (3PEKE) protocol, Undetectable on-line password guessing attacks

N. W. Lo; Kuo-Hui Yeh

2009-11-01T23:59:59.000Z

169

Energy Security: A Key Requirement forSustainable Development  

E-Print Network (OSTI)

1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

170

MeerKAT Key Project Science, Specifications, and Proposals  

E-Print Network (OSTI)

We present the specifications of the MeerKAT Karoo Array Telescope, the South African Square Kilometre Array Precursor. Some of the key science for MeerKAT is described in this document. We invite the community to submit proposals for Large Key Projects.

Booth, R S; Jonas, J L; Fanaroff, B

2009-01-01T23:59:59.000Z

171

A matricial public key cryptosystem with digital signature  

Science Conference Proceedings (OSTI)

We describe a new public key cryptosystem using block upper triangular matrices with elements in Zp, based on a generalization of the discrete logarithm problem over a finite group. The proposed cryptosystem is very efficient, requiring ... Keywords: DLP, Diffie-Hellman, ElGamal, cryptography, digital signature, finite fields, polynomial matrices, public-key, security

Rafael Alvarez; Francisco-Miguel Martinez; Jose-Francisco Vicent; Antonio Zamora

2008-04-01T23:59:59.000Z

172

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts President Obama Announces More Key Administration Posts July 8, 2011 - 12:00am Addthis THE WHITE HOUSE Office of the Press Secretary WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Michael A. Hammer, Assistant Secretary for Public Affairs, Department of State Charles McConnell, Assistant Secretary for Fossil Energy, Department of Energy The President also announced his intent to appoint the following individuals to key Administration posts: Terry Guen, Member, Advisory Council on Historic Preservation Dorothy T. Lippert, Member, Advisory Council on Historic Preservation Rosemary A. Joyce, Member, Cultural Property Advisory Committee President Obama said, "Our nation will be greatly served by the talent and

173

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Albert Einstein Distinguished Educator Fellowship (AEF) Program Einstein Fellowship Home Eligibility Benefits Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page Key Dates for the 2014-2015 Einstein Fellowship Application process. On-line Application Opens September 24, 2013 Application Deadline 5:00pm EST December 4, 2013 Application Review 7-8 weeks Notification to Semi-Finalists [Travel Arrangements made for Interviews in Washington, DC] Late January 2014 Interviews in Washington, DC February 23-25, 2014 Finalists Notifications March 2014 Congressional Fellows Placement Interviews June - July 2014 Fellows Arrive in Washington, DC August 2014 Orientation meeting for the 2014-2015 Einstein Fellows

174

Security Notions for Quantum Public-Key Cryptography  

E-Print Network (OSTI)

It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

Takeshi Koshiba

2007-02-19T23:59:59.000Z

175

Regional Variability in Tropical Convection: Observations from TRMM  

Science Conference Proceedings (OSTI)

Observation of the vertical profile of precipitation over the global Tropics is a key objective of the Tropical Rainfall Measuring Mission (TRMM) because this information is central to obtaining vertical profiles of latent heating. This study ...

Walter A. Petersen; Steven A. Rutledge

2001-09-01T23:59:59.000Z

176

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

177

A Key-Distribution Scheme for Wireless Home Automation Networks  

E-Print Network (OSTI)

Wireless home automation networks are one example of how wireless technologies may soon become part of our daily life, yet security in existing products is woefully inadequate. An important problem in this area is the question of secure key distribution. In this paper we present a key-distribution scheme geared towards home automation networks, but applicable to other networks with related properties as well. Our approach uses a decentralized scheme that is designed to work on resource-poor devices, allows easy addition and removal of devices and limits the workload on the end user while guaranteeing the secrecy of the exchanged keys even in the presence of subverted nodes.

Arno Wacker; Timo Heiber; Holger Cermann

2004-01-01T23:59:59.000Z

178

The Electricity Transmission System Opportunities to Overcome Key Challenges  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Opportunities to Overcome Key Challenges Opportunities to Overcome Key Challenges Summary Results of Breakout Group Discussions Electricity Transmission Workshop Double Tree Crystal City, Arlington, Virginia November 2, 2012 Breakout Group Discussion Overview Opportunities to Overcome Key Challenges Each of the four breakout groups prioritized the critical issues facing the grid from the list of synthesized challenges identified in the first breakout session of the workshop. Focusing on these top priorities, each group proposed specific R&D activities and initiatives that DOE can pursue to overcome these challenges and address existing gaps. Summary of Synthesized Challenges A. Need improved understanding of the availability, utility, maintenance, exchange, and security of data and associated requirements.

179

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Science Undergraduate Laboratory Internships (SULI) SULI Home Eligibility Benefits Participant Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page At the submission deadline (shown in red) the application system will close, and no materials will be accepted after the submission deadline has passed. The Application System closes at 5:00 PM Eastern Time. SULI Internship Term: Spring 2014 Summer 2014* Fall 2013 On-line Application Opens August 6, 2013 October 18, 2013 May 1, 2013 Applications Due October, 1, 2013 5:00 PM ET January 10, 2014 5:00 PM ET June 12, 2013 5:00 PM ET Offer Notification Period Begins on or around October, 15, 2013 January 20, 2014 June 24, 2013

180

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Visiting Faculty Program (VFP) VFP Home Eligibility Benefits Participant Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page At the submission deadline (shown in red) the application system will close, and no materials will be accepted after the submission deadline has passed. The Application System closes at 5:00 PM Eastern Time. VFP Term: Summer 2014 On-line Application Opens October 18, 2013 Applications Due January 10, 2014 5:00 PM ET* Offer Notification Period Begins January 20, 2014 All DOE Offers and Notifications Complete April 1, 2014 *A research proposal co-developed with a DOE laboratory researcher must be electronically submitted by all faculty applicants as part of their

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

182

Energy Secretary Bodman Commends Key Milestone In MOX Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Commends Key Milestone In MOX Program Commends Key Milestone In MOX Program Energy Secretary Bodman Commends Key Milestone In MOX Program April 1, 2005 - 11:28am Addthis WASHINGTON, DC - In response to the Nuclear Regulatory Commission's (NRC) authorization of the construction of a U.S. Mixed-Oxide (MOX) Fuel Fabrication Facility at the Department of Energy's Savannah River Site in South Carolina, Secretary of Energy Samuel W. Bodman today released the following statement: "Issuing the permit for construction of a MOX facility in South Carolina is the crucial next step in the MOX program. It is a key milestone in our efforts to dispose of surplus weapons grade plutonium in the U.S. and Russia," Secretary Bodman said. "We look forward to proceeding with this nonproliferation program that will ultimately eliminate enough

183

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts December 9, 2009 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Patricia A. Hoffman, Assistant Secretary for Electricity Delivery and Energy Reliability, Department of Energy Mari Del Carmen Aponte, Ambassador to the Republic of El Salvador, Department of State Donald E. Booth, Ambassador to the Federal Democratic Republic of Ethiopia, Department of State Larry Persily, Federal Coordinator for Alaska Natural Gas Transportation Projects President Obama said, "The depth of experience these individuals bring to their roles will be valuable to my administration as we work to bring about

184

Department of Energy Announces Key Additions to Public Affairs Staff |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Announces Key Additions to Public Affairs Announces Key Additions to Public Affairs Staff Department of Energy Announces Key Additions to Public Affairs Staff February 26, 2009 - 12:00am Addthis WASHINGTON, DC - Today, the Department of Energy announced key staff additions to the Office Public Affairs: Dan Leistikow, Director of Public Affairs; Tom Reynolds, Deputy Director of Public Affairs; Stephanie Mueller, Press Secretary; and Tiffany Edwards, Deputy Press Secretary. "I am pleased to have these talented individuals join the Department of Energy", said Secretary Steven Chu. "Having worked on President Obama's presidential campaign Dan, Tom, Stephanie and Tiffany bring knowledge about the President's commitment to end our addiction to foreign oil, invest in alternative and renewable energy, address the global climate crisis and

185

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

186

Table A4. Residential sector key indicators and consumption  

Gasoline and Diesel Fuel Update (EIA)

3 3 U.S. Energy Information Administration | Annual Energy Outlook 2013 Reference case Table A4. Residential sector key indicators and consumption (quadrillion Btu per year, unless otherwise noted) Energy Information Administration / Annual Energy Outlook 2013 Table A4. Residential sector key indicators and consumption (quadrillion Btu per year, unless otherwise noted) Key indicators and consumption Reference case Annual growth 2011-2040 (percent) 2010 2011 2020 2025 2030 2035 2040 Key indicators Households (millions) Single-family ....................................................... 82.85 83.56 91.25 95.37 99.34 103.03 106.77 0.8% Multifamily ........................................................... 25.78 26.07 29.82 32.05 34.54 37.05 39.53 1.4%

187

DOE Announces More Key Administration Posts | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts DOE Announces More Key Administration Posts March 27, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Ray Mabus, Secretary of the Navy, Department of Defense; Donald Remy, General Counsel of the Army, Department of Defense; J. Randolph Babbitt, Administrator, Federal Aviation Administration; Jose D. Riojas, Assistant Secretary for Operations, Security and Preparedness, Department of Veterans Affairs; John Trasviña, Assistant Secretary for Fair Housing and Equal Opportunity, Department of Housing and Urban Development; Lawrence E. Strickling, Assistant Secretary for Communications and Information, Department of Commerce; and Cathy Zoi, Assistant Secretary for Energy Efficiency and

188

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Key Actions) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

189

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts June 10, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Joan Evans, Assistant Secretary for Congressional and Legislative Affairs, Department of Veterans Affairs; Warren F. "Pete" Miller, Jr., PhD, Assistant Secretary for Nuclear Energy, Department of Energy; and John R. Norris, Commissioner, Federal Energy Regulatory Commission. President Obama said, "I am grateful that these three impressive individuals will be working with me in these important roles. The commitment of these experienced public servants has made an impression on

190

Key Science and Engineering Indicators: Digest 2012 | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Science and Engineering Indicators: Digest 2012 Key Science and Engineering Indicators: Digest 2012 BusinessUSA Data/Tools Apps Challenges Let's Talk BusinessUSA You are here Data.gov » Communities » BusinessUSA » Data Key Science and Engineering Indicators: Digest 2012 Dataset Summary Description This 2012 digest of key S&E indicators is an interactive tool that draws from the National Science Board's (NSB's) Science and Engineering Indicators report. The digest serves to draw attention to important trends and data points from across Indicators and to introduce readers to the data resources available in the report. Tags {science,engineering,indicators,statistics,nsf,nsb,srs,federal,government,education,labor,employment,workforce,research,development,industry,international,global,r&d,technology,patents,"research citations"}

191

Recommendation for Pair-Wise Key Establishment Schemes ...  

Science Conference Proceedings (OSTI)

... with unilateral key-confirmation from party V to party ... may be a component of a protocol, which in ... Note that protocols, per se, are not specified in this ...

2013-06-05T23:59:59.000Z

192

A linux kernel cryptographic framework: decoupling cryptographic keys from applications  

Science Conference Proceedings (OSTI)

This paper describes a cryptographic service framework for the Linux kernel. The framework enables user-space applications to perform operations with cryptographic keys, while at the same time ensuring that applications cannot directly access or extract ...

Nikos Mavrogiannopoulos; Miloslav Trma?; Bart Preneel

2012-03-01T23:59:59.000Z

193

SLAC National Accelerator Laboratory - LCLS-II Passes Key Milestone...  

NLE Websites -- All DOE Office Websites (Extended Search)

LCLS-II Passes Key Milestone in DOE Approval Process By Glennda Chui November 1, 2011 The Department of Energy has approved a preliminary budget, schedule and design plans for the...

194

First look at cellulose's early production could hold keys to...  

NLE Websites -- All DOE Office Websites (Extended Search)

cellulose's early production could hold keys to bacteria-free medical devices, better biofuel By Jared Sagoff * May 14, 2013 Tweet EmailPrint Produced by plants as well as algae...

195

Worldwide Trends in Energy Use and Efficiency: Key Insights from...  

Open Energy Info (EERE)

Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

196

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to  

NLE Websites -- All DOE Office Websites (Extended Search)

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to policy makers on energy codes and to offer guidance on how policy makers can support the creation of statewide energy...

197

The use of a logistic map for key generation  

E-Print Network (OSTI)

A key generation scheme is proposed and its performance analyzed. The method, the logistic map scheme (LMS), is applicable for use on wireless networks because it does not require devices to engage in computationally ...

Ando, Megumi, M. Eng. Massachusetts Institute of Technology

2010-01-01T23:59:59.000Z

198

EIA Data: 2011 United States Residential Sector Key Indicators...  

Open Energy Info (EERE)

Residential Sector Key Indicators and Consumption This datasetis the 2011 United...

199

An Implementation of Key-Based Digital Signal Steganography  

Science Conference Proceedings (OSTI)

A real-life requirement motivated this case study of secure covert communication. An independently researched process is described in detail with an emphasis on implementation issues regarding digital images. A scheme using stego keys to create pseudo-random ...

Toby Sharp

2001-04-01T23:59:59.000Z

200

Nano Lect 1 Questions and Keypoints Key Points  

E-Print Network (OSTI)

Nano Lect 1 ­ Questions and Keypoints Key Points 1. What is nano technology: a. Very small technology with device in the 1nm to 100nm lots of useful properties Questions 1. Define nanotechnology. Is an nano

Smy, Tom

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

DOE Announces More Key Administration Posts | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts DOE Announces More Key Administration Posts March 20, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Dr. Steven E. Koonin, Under Secretary for Science, Department of Energy; David Sandalow, Assistant Secretary for Policy and International Affairs, Department of Energy; Ambassador Johnnie Carson, Assistant Secretary for African Affairs, State Department; Kathy Martinez, Assistant Secretary for Disability Employment Policy (ODEP), Department of Labor; Jonathan S. Adelstein, Administrator for the Rural Utilities Service, United States Department of Agriculture; Timothy W. Manning, Deputy Administrator for National Preparedness, FEMA, Department of Homeland Security; and Priscilla

202

Key Activities in Energy Efficiency | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

About » Key Activities in Energy Efficiency About » Key Activities in Energy Efficiency Key Activities in Energy Efficiency The Building Technologies Office conducts work in three key areas in order to continually develop innovative, cost-effective energy saving solutions: research and development (R&D), market stimulation, and building codes and equipment standards. Working with our partners on these activities results in better products, better new homes, better ways to improve older homes, and better buildings in which to work, shop, and lead our everyday lives. Research and Development Spearhead the development of new, energy efficient technologies. Lead R&D activities that reduce home energy use through Building America. Collaborate with industry to improve the energy efficiency of new

203

Atomic Collapse Observed  

NLE Websites -- All DOE Office Websites (Extended Search)

Collapse State Observed Aided by Simulations, Scientists Observe Atomic Collapse State Quantum Mechanics Prediction Confirmed in Graphene Using NERSC's Hopper April 26, 2013 |...

204

Interest/Users Group Meeting Proceedings and Key Findings, 2011  

Science Conference Proceedings (OSTI)

This technical update is the summary of the meeting proceedings and key findings for the Fossil Operations and Maintenance Program Area Interest/Users Groups meetings held during 2011. The report represents a culmination of numerous meetings, conferences, users groups, and workshops conducted throughout the year. The document incorporates the meeting logistics and objectives; names of keynote speaker, attendees, and host utility; presentation location, and key findings and recommendations from each meeti...

2011-12-21T23:59:59.000Z

205

Security of quantum key distribution with arbitrary individual imperfections  

E-Print Network (OSTI)

We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

ystein Mary; Lars Lydersen; Johannes Skaar

2009-03-20T23:59:59.000Z

206

Key-and-keyway coupling for transmitting torque  

DOE Patents (OSTI)

The design of an improved key-and-keyway coupling for the transmission of torque is given. The coupling provides significant reductions in stress concentrations in the vicinity of the key and keyway. The keyway is designed with a flat-bottomed u-shaped portion whose inboard end terminates in a ramp which is dished transversely, so that the surface of the ramp as viewed in transverse section defines an outwardly concave arc.

Blue, S.C.; Curtis, M.T.; Orthwein, W.C.; Stitt, D.H.

1975-11-18T23:59:59.000Z

207

Quantum Public-Key Encryption with Information Theoretic Security  

E-Print Network (OSTI)

We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

Jiangyou Pan; Li Yang

2010-06-02T23:59:59.000Z

208

W-like bound entangled states and secure key distillation  

E-Print Network (OSTI)

We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

Remigiusz Augusiak; Pawel Horodecki

2008-11-21T23:59:59.000Z

209

Key distillation from Gaussian states by Gaussian operations  

E-Print Network (OSTI)

We study the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill a secret key secure against any attack from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for key distillation, when Eve is assumed to perform finite-size coherent attacks before the reconciliation process.

M. Navascues; J. Bae; J. I. Cirac; M. Lewenstein; A. Sanpera; A. Acin

2004-05-11T23:59:59.000Z

210

Tracking Market Transitions: Key Trends in America's Electricity Markets: Retail Customers and Energy Competition  

Science Conference Proceedings (OSTI)

U.S. electricity markets have been transitioning in an uneven, but accelerating pace toward competition. Enough experience with competition exists by now to begin to draw from lessons learned. This report summarizes key trends observed in U.S. competitive energy markets to-date, and suggests several trends that are likely to emerge in the near future. Among some of the most important trends observed are the declining number of retail mass-market energy service providers, and the relative lack of differen...

1999-11-23T23:59:59.000Z

211

A robust on-demand path-key establishment framework via random key predistribution for wireless sensor networks  

Science Conference Proceedings (OSTI)

Secure communication is a necessity for some wireless sensor network (WSN) applications. However, the resource constraints of a sensor render existing cryptographic systems for traditional network systems impractical for a WSN. Random key predistribution ...

Guanfeng Li; Hui Ling; Taieb Znati; Weili Wu

2006-04-01T23:59:59.000Z

212

Device-independent quantum key distribution with spin-coupled cavities  

E-Print Network (OSTI)

Device-independent quantum key distribution (DIQKD) guarantees the security of a shared key without any assumptions on the apparatus used, provided that the observed data violate a Bell inequality. Such violation is challenging experimentally due to channel losses and photo-detection inefficiencies. Here we describe a realistic DIQKD protocol based on interaction between light and spins stored in cavities, which allows a heralded mapping of polarisation entanglement of light onto the spin. The spin state can subsequently be measured with near unit efficiency. Heralding alleviates the effect of channel loss, and as the protocol allows for local heralding, the spin decay is not affected by the communication time between the parties, making Bell inequality violation over an arbitrary distance possible. We compute the achievable key rates of the protocol, based on recent estimates of experimentally accessible parameter values and compare to the other known DIQKD protocol, which is entirely optical. We find significant improvements in terms of key bits per source use. For example we gain about five orders of magnitude over a distance of 75km, for realistic parameter values.

Alejandro Mttar; Jonatan Bohr Brask; Antonio Acn

2013-06-11T23:59:59.000Z

213

Quantum key distribution using gaussian-modulated coherent states  

E-Print Network (OSTI)

Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1 dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.

F. Grosshans; G. Van Assche; J. Wenger; R. Brouri; N. J. Cerf; Ph. Grangier

2003-12-02T23:59:59.000Z

214

Energy Storage: The Key to a Reliable, Clean Electricity Supply |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Storage: The Key to a Reliable, Clean Electricity Supply Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy storage technology offers a number of economic and environmental benefits. Improved energy storage technology offers a number of economic and environmental benefits. Matthew Loveless Matthew Loveless Data Integration Specialist, Office of Public Affairs What does this project do? ARPA-E's GRIDS program is investing in new technologies that make storing energy cheaper and more efficient. Energy storage isn't just for AA batteries any more. Thanks to investments from the Department's Advanced Research Projects Agency-Energy (ARPA-E), energy storage may soon play a bigger part in our electricity

215

Technology Key to Harnessing Natural Gas Potential | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa Energy Corp. in Houston, Texas. Proinlosa is a company in the wind turbine manufacturing supply chain that develops tower parts and has benefitted from the Production Tax Credit (PTC). | Photo courtesy of Keri Fulton. Deputy Secretary Daniel Poneman tours Proinlosa Energy Corp. in Houston, Texas. Proinlosa is a company in the wind turbine manufacturing supply chain that develops tower parts and has benefitted from the Production Tax Credit (PTC). | Photo courtesy of Keri Fulton. Daniel B. Poneman Daniel B. Poneman Deputy Secretary of Energy What does this project do? Builds on President Obama's call for a new era for American energy

216

Sierra Geothermal's Key Find in Southern Nevada | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Paul Lester Communications Specialist for the Office of Energy Efficiency and Renewable Energy In May 2010, Sierra Geothermal determined temperature at the bottom of a well drilled at the company's Alum project near Silver Peak, Nev., was hot enough for commercial-sized geothermal energy production - measured as 147

217

Transportation Energy Futures Study: The Key Results and Conclusions  

Open Energy Info (EERE)

Transportation Energy Futures Study: The Key Results and Conclusions Transportation Energy Futures Study: The Key Results and Conclusions Webinar Home > Groups > OpenEI Community Central Graham7781's picture Submitted by Graham7781(1992) Super contributor 1 May, 2013 - 11:38 This webinar will outline the key results and conclusions from EERE's Transportation Energy Futures study, which highlights underexplored opportunities to reduce petroleum use and greenhouse gas emissions from the U.S. transportation sector. There will be time for questions from attendees at the end of the webinar. Principal Deputy Assistant Secretary Mike Carr will introduce the study and provide context on EERE's transportation energy strategy. In his role with EERE, Mike provides leadership direction on cross-cutting activities in EERE's portfolio. In particular, he is using his experience in policy

218

Sierra Geothermal's Key Find in Southern Nevada | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Paul Lester Communications Specialist, Office of Energy Efficiency and Renewable Energy In May 2010, Sierra Geothermal determined temperature at the bottom of a well drilled at the company's Alum project near Silver Peak, Nev., was hot enough for commercial-sized geothermal energy production - measured as 147

219

Florida Keys El Coop Assn, Inc | Open Energy Information  

Open Energy Info (EERE)

Keys El Coop Assn, Inc Keys El Coop Assn, Inc Jump to: navigation, search Name Florida Keys El Coop Assn, Inc Place Florida Utility Id 6443 Utility Location Yes Ownership C NERC Location FRCC NERC FRCC Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Rate Code 1 - Residential Service Residential Rate Code 2 - Commercial Service (General Service Non-Demand) Commercial Rate Code 3 - Commercial Service (General Service Demand) Commercial Average Rates Residential: $0.1210/kWh Commercial: $0.1220/kWh Industrial: $0.1140/kWh

220

Turn Your Key, Be Idle Free | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes gasoline, costs money, produces pollutants, and yet doesn't get you anywhere? Idling! And yet, every year, Americans waste 3 billion gallons of fuel by idling their vehicles. Idling is running a vehicle any time that it's not moving. In this condition, the car's fuel economy is exactly zero miles per gallon. Although many people think that restarting the engine too often will wear out the starter, that idea is just an "old husband's tale." In fact, idling places unnecessary wear-and-tear on the engine, and many manufacturers discourage it. Although drivers can't avoid some amount of idling, such as being stuck in

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar July 12, 2010 - 3:51pm Addthis APS will install solar photovoltaic panels like these in Castro Valley, Calif. for a pilot project studying distributed energy in Flagstaff, Ariz. | Photo courtesy of APS APS will install solar photovoltaic panels like these in Castro Valley, Calif. for a pilot project studying distributed energy in Flagstaff, Ariz. | Photo courtesy of APS Nestled in the mountains of northern Arizona and just 75 miles from Grand Canyon National Park, the city of Flagstaff, Ariz. is an ideal city for the Arizona Public Service (APS) to pilot a high concentration of solar photovoltaic energy systems. "Flagstaff is unique electrically," says Eran Mahrer, Director of Renewable

222

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of A Key Enzyme to the Potency of an Anticancer Agent A Key Enzyme to the Potency of an Anticancer Agent Print Wednesday, 28 May 2008 00:00 Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline 8.2.2, discovered and characterized the chlorinating SalL enzyme, a crucial component in sal A biosynthesis that uses a unique chlorine-activating mechanism. Chlorine-Loving Enzyme Speeds Things Up

223

Property:Specializations, Capabilities, and Key Facility Attributes Not  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere Jump to: navigation, search Property Name Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere Property Type Text Pages using the property "Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere" Showing 25 pages using this property. 1 11-ft Wave Flume Facility + Glass window 6 6-ft Wave Flume Facility + Glass window A Alden Large Flume + This is a recirculating flume facility, so a constant velocity can be maintained indefinitely. This allows collection of a much greater amount of data than possible in tow tanks. Alden's biologists are highly experienced in assessing the impacts of generation devices on fish and the facilities allow for accurate testing with fish in a highly controlled environment.

224

SECOQC White Paper on Quantum Key Distribution and Cryptography  

E-Print Network (OSTI)

The SECOQC White Paper on Quantum Key Distribution and Cryptography is the outcome on a thorough consultation and discussion among the participants of the European project SECOQC (www.secoqc.net). This paper is a review article that attempts to position Quantum Key Distribution (QKD) in terms of cryptographic applications. A detailed comparison of QKD with the solutions currently in use to solve the key distribution problem, based on classical cryptography, is provided. We also detail how the work on QKD networks lead within SECOQC will allow the deployment of long-distance secure communication infrastructures based on quantum cryptography. The purpose of the White Paper is finally to promote closer collaboration between classical and quantum cryptographers. We believe that very fruitful research, involving both communities, could emerge in the future years and try to sketch what may be the next challenges in this direction.

Romain Alleaume; Jan Bouda; Cyril Branciard; Thierry Debuisschert; Mehrdad Dianati; Nicolas Gisin; Mark Godfrey; Philippe Grangier; Thomas Langer; Anthony Leverrier; Norbert Lutkenhaus; Philippe Painchault; Momtchil Peev; Andreas Poppe; Thomas Pornin; John Rarity; Renato Renner; Gregoire Ribordy; Michel Riguidel; Louis Salvail; Andrew Shields; Harald Weinfurter; Anton Zeilinger

2007-01-23T23:59:59.000Z

225

Physical key-protected one-time pad  

E-Print Network (OSTI)

We describe an encrypted communication principle that can form a perfectly secure link between two parties without electronically saving either of their keys. Instead, cryptographic key bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 cubic millimeter scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any random bits without fundamentally altering the entire key space. Beyond the demonstrated communication scheme, our ability to securely couple the randomness contained within two unique physical objects may help strengthen the hardware for a large class of cryptographic protocols, which ...

Horstmeyer, Roarke; Vellekoop, Ivo; Yang, Changhuei

2013-01-01T23:59:59.000Z

226

Worldwide Trends in Energy Use and Efficiency: Key Insights from  

Open Energy Info (EERE)

Worldwide Trends in Energy Use and Efficiency: Key Insights from Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Focus Area: Power Plant Efficiency Topics: Potentials & Scenarios Website: www.iea.org/papers/2008/indicators_2008.pdf Equivalent URI: cleanenergysolutions.org/content/worldwide-trends-energy-use-and-effic Language: English Policies: "Regulations,Deployment Programs" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property.

227

Managing Supply Chain Key for Hawaii Appliance Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program August 24, 2010 - 10:00am Addthis Lindsay Gsell Hawaii's appliance rebate program delivered 4,300 rebates to Hawaiians in just three days. And on just the first day of program, almost 4,000 ENERGY STAR qualified refrigerators were sold. Funded by $1.2 million from the American Recovery and Reinvestment Act, the program delivered a proportionate number of $250 ENERGY STAR refrigerator rebates to six of Hawaii's islands: Oahu, Hawaii, Maui, Kauai, Lanai, and Molokai. "It takes a lot of help from manufacturers, distributors, retailers, hauling company, recyclers, advertisers, printers, new reporters, radio stations and television station to create a success story," said Derrick

228

Managing Supply Chain Key for Hawaii Appliance Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program August 24, 2010 - 10:00am Addthis Lindsay Gsell Hawaii's appliance rebate program delivered 4,300 rebates to Hawaiians in just three days. And on just the first day of program, almost 4,000 ENERGY STAR qualified refrigerators were sold. Funded by $1.2 million from the American Recovery and Reinvestment Act, the program delivered a proportionate number of $250 ENERGY STAR refrigerator rebates to six of Hawaii's islands: Oahu, Hawaii, Maui, Kauai, Lanai, and Molokai. "It takes a lot of help from manufacturers, distributors, retailers, hauling company, recyclers, advertisers, printers, new reporters, radio stations and television station to create a success story," said Derrick

229

Energy Storage: The Key to a Reliable, Clean Electricity Supply |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy storage technology offers a number of economic and environmental benefits. Improved energy storage technology offers a number of economic and environmental benefits. Matthew Loveless Matthew Loveless Data Integration Specialist, Office of Public Affairs What does this project do? ARPA-E's GRIDS program is investing in new technologies that make storing energy cheaper and more efficient. Energy storage isn't just for AA batteries any more. Thanks to investments from the Department's Advanced Research Projects Agency-Energy (ARPA-E), energy storage may soon play a bigger part in our electricity

230

Single, Key Gene Discovery Could Streamline Production of Biofuels |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON, DC -- A team of researchers at the Department of Energy's BioEnergy Science Center (BESC) have pinpointed the exact, single gene that controls ethanol production capacity in a microorganism. This discovery could be the missing link in developing biomass crops that produce higher concentrations of ethanol at lower costs. "The Department of Energy relies on the scientific discoveries of its labs and research centers to improve the production of clean energy sources," said Energy Secretary Steven Chu. "This discovery is an important step in developing biomass crops that could increase yield of

231

Building MRV Standards and Capacity in Key Countries | Open Energy  

Open Energy Info (EERE)

MRV Standards and Capacity in Key Countries MRV Standards and Capacity in Key Countries Jump to: navigation, search Name Building MRV Standards and Capacity in Key Countries Agency/Company /Organization World Resources Institute (WRI) Sector Climate Focus Area Renewable Energy Topics Implementation Website http://www.wri.org/topics/mrv Program Start 2011 Program End 2014 Country Brazil, Colombia, Ethiopia, India, South Africa, Thailand South America, South America, Eastern Africa, Southern Asia, Southern Africa, South-Eastern Asia References World Resources Institute (WRI)[1] Program Overview Developing countries will be required to measure, report, and verify (MRV) mitigation actions according to international guidelines, but few have the capacity to do so. The goal of this project is to build the capacity of a

232

Special Presentation: Key Findings from the Barrier Immune Radio  

NLE Websites -- All DOE Office Websites (Extended Search)

Special Presentation: Key Findings from the Barrier Immune Radio Special Presentation: Key Findings from the Barrier Immune Radio Communications Project Speaker(s): Francis Rubinstein Girish Ghatikar Peter Haugen Date: November 29, 2007 - 12:00pm Location: 90-3122 The Barrier Immune Radio Communications (BIRC) Project was established in January 2007 by the Demand Response Emerging Technologies Program (DRETD) to identify radio frequency technologies that could enable the widespread deployment of Demand Response strategies in buildings. Researchers from Lawrence Berkeley National Laboratory and Lawrence Livermore National Laboratory will present the key findings from this project in a one-hour presentation. Researchers found that several of the RF technologies tested at LBNL's Molecular Foundry building were able to provide sufficiently

233

Small Businesses Key in Hydropower Tech Advancement | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Businesses Key in Hydropower Tech Advancement Businesses Key in Hydropower Tech Advancement Small Businesses Key in Hydropower Tech Advancement September 6, 2011 - 2:59pm Addthis Earlier today, the Department of Energy and the Department of Interior announced nearly $17 million in funding over the next three years to advance hydropower technology. The funding announced today will go to sixteen innovative projects around the country, including sustainable small hydro projects, like the ones from Hydro Green Energy, a small business that handles hydroelectric power generation and power and communication line construction. The company, which has eight employees currently, has been awarded funding for two projects. Near Space Systems, a Colorado Springs-based company, is a service-disabled veteran-owned business with a manufacturing focus that's

234

Energy Critical Infrastructure and Key Resources Sector-Specific  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Energy Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) May 2007 Department of Energy Energy Sector Government Coordinating Council Letter of Support i ii Energy Sector-Specific Plan (Redacted) Energy Sector Coordinating Councils Letter of Concurrence The National Infrastructure Protection Plan (NIPP) provides the unifying structure for the integration of federal critical infrastructures and key resources (CI/KR) protection efforts into a single national program. The NIPP includes an overall framework integrating federal programs and activities that are currently underway in the various sectors, as well as new and developing CI/KR protection efforts. The Energy

235

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

Actions Actions < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport sector, choosing from relevant resources to achieve a comprehensive action

236

Security bounds for continuous variables quantum key distribution  

E-Print Network (OSTI)

Security bounds for key distribution protocols using coherent and squeezed states and homodyne measurements are presented. These bounds refer to (i) general attacks and (ii) collective attacks where Eve interacts individually with the sent states, but delays her measurement until the end of the reconciliation process. For the case of a lossy line and coherent states, it is first proven that a secure key distribution is possible up to 1.9 dB of losses. For the second scenario, the security bounds are the same as for the completely incoherent attack.

Miguel Navascues; Antonio Acin

2004-07-19T23:59:59.000Z

237

Tomographic Quantum Cryptography: Equivalence of Quantum and Classical Key Distillation  

E-Print Network (OSTI)

The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. For an important class of protocols, which exploit tomographically complete measurements on entangled pairs of any dimension, we show that the noise threshold for classical advantage distillation is identical with the threshold for quantum entanglement distillation. As a consequence, the two distillation procedures are equivalent: neither offers a security advantage over the other.

Dagmar Bruss; Matthias Christandl; Artur Ekert; Berthold-Georg Englert; Dagomir Kaszlikowski; Chiara Macchiavello

2003-03-31T23:59:59.000Z

238

KeyTex Energy LLC | Open Energy Information  

Open Energy Info (EERE)

KeyTex Energy LLC KeyTex Energy LLC Jump to: navigation, search Name KeyTex Energy LLC Place Greensburg, Pennsylvania Zip 15601 Product KeyTex Energy is a full service energy and consulting company, helping businesses implement both wholesale and retail strategies to control and reduce energy costs as well as manage the risks and complexities associated with the energy markets. Coordinates 40.299245°, -79.543159° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.299245,"lon":-79.543159,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

239

The S/KEY One-Time Password System  

Science Conference Proceedings (OSTI)

This document describes the S/KEY* One-Time Password system as released for public use by Bellcore and as described in reference [3]. A reference implementation and documentation are available by anonymous ftp from ftp.bellcore.com in the directories ...

N. Haller

1995-02-01T23:59:59.000Z

240

Quantum Key Distribution and String Oblivious Transfer in Noisy Channels  

Science Conference Proceedings (OSTI)

We prove the unconditional security of a quantum key distribution (QKD) protocol on a noisy channel against the most general attack allowed by quantum physics. We use the fact that in a previous paper we have reduced the proof of the unconditionally ...

Dominic Mayers

1996-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

The Key Renewal Theorem for a Transient Markov Chain  

E-Print Network (OSTI)

We consider a time-homogeneous Markov chain $X_n$, $n\\ge0$, valued in ${\\bf R}$. Suppose that this chain is transient, that is, $X_n$ generates a $\\sigma$-finite renewal measure. We prove the key renewal theorem under condition that this chain has asymptotically homogeneous at infinity jumps and asymptotically positive drift.

Korshunov, Dmitry

2007-01-01T23:59:59.000Z

242

Essential lack of security proof in quantum key distribution  

E-Print Network (OSTI)

All the currently available unconditional security proofs on quantum key distribution, in particular for the BB84 protocol and its variants including continuous-variable ones, are invalid or incomplete at many points. In this paper we discuss some of the main known problems, particularly those on operational security guarantee and error correction. Most basic are the points that there is no security parameter in such protocols and it is not the case the generated key is perfect with probability $\\geq 1-\\epsilon$ under the trace distance criterion $d\\leq\\epsilon$, which is widely claimed in the technical and popular literature. The many serious security consequences of this error about the QKD generated key would be explained, including practical ramification on achievable security levels. It will be shown how the error correction problem alone may already defy rigorous quantitative analysis. Various other problems would be touched upon. It is pointed out that rigorous security guarantee of much more efficient quantum cryptosystems may be obtained by abandoning the disturbance-information tradeoff principle and utilizing instead the known KCQ (keyed communication in quantum noise) principle in conjunction with a new DBM (decoy bits method) principle that will be detailed elsewhere.

Horace P. Yuen

2013-10-02T23:59:59.000Z

243

Illustrated plant identification keys: An interactive tool to learn botany  

Science Conference Proceedings (OSTI)

An Interactive Dichotomous Key (IDK) for 390 taxa of vascular plants from the Ria de Aveiro, available on a website, was developed to help teach botany to school and universitary students. This multimedia tool includes several links to Descriptive and ... Keywords: Applications in subject areas, Post-secondary education, Secondary education, Teaching/learning strategies

Helena Silva; Rosa Pinho; Lsia Lopes; Antnio J. A. Nogueira; Paulo Silveira

2011-05-01T23:59:59.000Z

244

A Verifiable Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

construction of a verifiable ran- dom function (VRF) on groups equipped with a bilinear mapping. Our to a VRF in contrast to prior works of Micali-Rabin-Vadhan [MRV99] and Lysyanskaya [Lys02]. Our proofs in [BB04a] to construct an identity based encryption scheme. Our VRF's proofs and keys have constant size

Dodis, Yevgeniy

245

A Verifiable Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

#cient construction of a verifiable ran­ dom function (VRF) on groups equipped with a bilinear mapping. Our to a VRF in contrast to prior works of Micali­Rabin­Vadhan [MRV99] and Lysyanskaya [Lys02]. Our proofs in [BB04a] to construct an identity based encryption scheme. Our VRF's proofs and keys have constant size

Dodis, Yevgeniy

246

Verifiable Random Functions from Identity-Based Key Encapsulation  

Science Conference Proceedings (OSTI)

We propose a methodology to construct verifiable random functions from a class of identity based key encapsulation mechanisms (IB-KEM) that we call VRF suitable. Informally, an IB-KEM is VRF suitable if it provides what we call unique decryption ...

Michel Abdalla; Dario Catalano; Dario Fiore

2009-04-01T23:59:59.000Z

247

A Veri able Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

?? Abstract. We give a simple and e?cient construction of a veri#12;able random function (VRF) on bilinear groups. Our construction is direct. In contrast to prior VRF constructions [MRV99, Lys02], it avoids reasonable given cur- rent state of knowledge. For small message spaces, our VRF's proofs and keys have

248

What were the key energy commodity price trends in 2011?  

Reports and Publications (EIA)

Energy commodity price trends varied widely during 2011. Crude oil and petroleum products prices increased during 2011, while natural gas, coal, and electricity prices declined. This article provides an overview of key energy commodity price trends in 2011 based on prices seen in futures markets.

2012-02-14T23:59:59.000Z

249

Robust secret key based authentication scheme using smart cards  

Science Conference Proceedings (OSTI)

User authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. Recently, Chen et al. proposed an improvement on the SAS-like password ... Keywords: authentication, cryptography, secret key, smart card

Eun-Jun Yoon; Kee-Young Yoo

2005-11-01T23:59:59.000Z

250

An improved anonymous authentication and key exchange scheme  

Science Conference Proceedings (OSTI)

Nowadays, anonymity property of user authentication scheme becomes important. In 2003, Park et al. proposed an authentication and key exchange scheme using smart card. However, Juang et al. pointed out that Park et al.'s scheme did not provide the user ...

Kyung-kug Kim; Myung-Hwan Kim

2012-09-01T23:59:59.000Z

251

Quantum key distribution system clocked at 2 GHz  

E-Print Network (OSTI)

An improved quantum key distribution test system operating at clock rates of up to 2GHz using a specially adapted commercially available silicon single photon avalanche diode is presented. The use of improved detectors has improved the fibre-based test system performance in terms of transmission distance and quantum bit error rate.

K. J. Gordon; V. Fernandez; G. S. Buller; I. Rech; S. D. Cova; P. D. Townsend

2006-05-08T23:59:59.000Z

252

Extracting Key Factors to Design Applications in Ambient Intelligence Environment  

Science Conference Proceedings (OSTI)

In an ambient intelligence environment, the design of applications influences the users behavior heavily. The purpose of this paper is to provide key factors considered necessary in developing those applications. We developed four applications applied ... Keywords: ambient feedback, persuasive technology, behavior modification, emotional engagement

Hiroaki Kimura; Tatsuo Nakajima

2008-12-01T23:59:59.000Z

253

The Key Coal Producers ONLINE SUPPORTING MATERIALS to  

E-Print Network (OSTI)

The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

Patzek, Tadeusz W.

254

Page 1 of 4 Creating and Submitting a Key Request  

E-Print Network (OSTI)

of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

Howitt, Ivan

255

news and views A key issue for hydrogen storage materi-  

E-Print Network (OSTI)

news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

Palumbi, Stephen

256

BURNING PLASMA NEXT STEPS: DISCUSSION OF KEY DEVELOPMENTS  

E-Print Network (OSTI)

BURNING PLASMA NEXT STEPS: DISCUSSION OF KEY DEVELOPMENTS Gerald A. Navratil Columbia University/FESAC Burning Plasma Strategy Dec 2002 NRC/NAS Interim Report on Burning Plasmas Jan 30, 2003 DOE of the physics of burning plasma, advance fusion technology, and contribute to the development of fusion energy

257

Key issues in ITER diagnostics: Problems and solutions (invited)  

Science Conference Proceedings (OSTI)

The key problems associated with designing diagnostic systems for the International Thermonuclear Experimental Reactor (ITER) are identified and representative solutions are described. The plans for dealing with some outstanding issues are briefly presented. The detailed work is specific to the ITER

A. E. Costley; Members of the ITER Joint Central Team and Home Teams

1999-01-01T23:59:59.000Z

258

Quantum key distribution with a reference quantum state  

SciTech Connect

A new quantum key distribution protocol stable at arbitrary losses in a quantum communication channel has been proposed. For the stability of the protocol, it is of fundamental importance that changes in states associated with losses in the communication channel (in the absence of the eavesdropper) are included in measurements.

Molotkov, S. N., E-mail: molotkov@issp.ac.ru [Russian Academy of Sciences, Institute of Solid State Physics (Russian Federation)

2011-11-15T23:59:59.000Z

259

Generic Security Proof of Quantum Key Exchange using Squeezed States  

E-Print Network (OSTI)

Recently, a Quantum Key Exchange protocol that uses squeezed states was presented by Gottesman and Preskill. In this paper we give a generic security proof for this protocol. The method used for this generic security proof is based on recent work by Christiandl, Renner and Ekert.

Karin Poels; Pim Tuyls; Berry Schoenmakers

2005-08-09T23:59:59.000Z

260

A simple threshold authenticated key exchange from short secrets  

Science Conference Proceedings (OSTI)

This paper brings the password-based authenticated key exchange (PAKE) problem closer to practice. It takes into account the presence of firewalls when clients communicate with authentication servers. An authentication server can indeed be seen as two ... Keywords: password-based authentication, threshold protocols

Michel Abdalla; Olivier Chevassut; Pierre-Alain Fouque; David Pointcheval

2005-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Key website factors in e-business strategy  

Science Conference Proceedings (OSTI)

The design of a quality website, as part of e-business strategy, has become a key element for success in the online market. This article analyzes the main factors that must be taken into account when designing a commercial website, concentrating on the ... Keywords: Accessibility, Content, Navigability, Speed, Web Assessment Index (WAI), Website

Blanca HernNdez; Julio JimNez; M. Jos MartN

2009-10-01T23:59:59.000Z

262

First Direct Observation of Spinons and Holons  

NLE Websites -- All DOE Office Websites (Extended Search)

First Direct Observation of Spinons and Holons Print First Direct Observation of Spinons and Holons Print Spin and charge are inseparable traits of an electron, but in one-dimensional solids, a 40-year-old theory predicts their separation into "collective" modes-as independent excitation quanta called spinons and holons. Angle-resolved photoemission spectroscopy (ARPES) should provide the most direct evidence of this spin-charge separation, as the single quasiparticle peak splits into a spinon-holon two-peak structure. However, despite extensive ARPES experiments, the unambiguous observation of the two-peak structure has remained elusive. Working at the ALS, a team of researchers from Korea, Japan, and the U.S. has now observed electron spin-charge separation in a one-dimensional solid. These results hold implications for future developments in several key areas of advanced technology, including high-temperature superconductors, nanowires, and spintronics.

263

First Direct Observation of Spinons and Holons  

NLE Websites -- All DOE Office Websites (Extended Search)

First Direct Observation of Spinons and Holons Print First Direct Observation of Spinons and Holons Print Spin and charge are inseparable traits of an electron, but in one-dimensional solids, a 40-year-old theory predicts their separation into "collective" modes-as independent excitation quanta called spinons and holons. Angle-resolved photoemission spectroscopy (ARPES) should provide the most direct evidence of this spin-charge separation, as the single quasiparticle peak splits into a spinon-holon two-peak structure. However, despite extensive ARPES experiments, the unambiguous observation of the two-peak structure has remained elusive. Working at the ALS, a team of researchers from Korea, Japan, and the U.S. has now observed electron spin-charge separation in a one-dimensional solid. These results hold implications for future developments in several key areas of advanced technology, including high-temperature superconductors, nanowires, and spintronics.

264

First Direct Observation of Spinons and Holons  

NLE Websites -- All DOE Office Websites (Extended Search)

First Direct Observation of Spinons and Holons Print First Direct Observation of Spinons and Holons Print Spin and charge are inseparable traits of an electron, but in one-dimensional solids, a 40-year-old theory predicts their separation into "collective" modes-as independent excitation quanta called spinons and holons. Angle-resolved photoemission spectroscopy (ARPES) should provide the most direct evidence of this spin-charge separation, as the single quasiparticle peak splits into a spinon-holon two-peak structure. However, despite extensive ARPES experiments, the unambiguous observation of the two-peak structure has remained elusive. Working at the ALS, a team of researchers from Korea, Japan, and the U.S. has now observed electron spin-charge separation in a one-dimensional solid. These results hold implications for future developments in several key areas of advanced technology, including high-temperature superconductors, nanowires, and spintronics.

265

TYPiMatch: type-specific unsupervised learning of keys and key values for heterogeneous web data integration  

Science Conference Proceedings (OSTI)

Instance matching and blocking, a preprocessing step used for selecting candidate matches, require determining the most representative attributes of instances called keys, based on which similarities between instances are computed. We show that for the ... Keywords: heterogeneous web data, information integration, unsupervised learning

Yongtao Ma; Thanh Tran

2013-02-01T23:59:59.000Z

266

Protocols from perceptual observations  

Science Conference Proceedings (OSTI)

This paper presents a cognitive vision system capable of autonomously learning protocols from perceptual observations of dynamic scenes. The work is motivated by the aim of creating a synthetic agent that can observe a scene containing interactions between ... Keywords: Autonomous learning, Cognitive vision, Inductive logic programming, Spatio-temporal reasoning, Symbol grounding, Unsupervised clustering

Chris J. Needham; Paulo E. Santos; Derek R. Magee; Vincent Devin; David C. Hogg; Anthony G. Cohn

2005-09-01T23:59:59.000Z

267

Key West, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

(Redirected from Key West, FL) (Redirected from Key West, FL) Jump to: navigation, search Equivalent URI DBpedia Coordinates 24.5557025°, -81.7825914° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":24.5557025,"lon":-81.7825914,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

268

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 27, 2011 - 3:25pm July 27, 2011 - 3:25pm Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: David Danielson - Assistant Secretary for Energy Efficiency and Renewable Energy, Department of Energy Dot Harris - Director of the Office of Minority Economic Impact, Department of Energy President Obama said, "I am honored that these talented individuals have decided to join this Administration and serve our country. I look forward to working with them in the months and years to come." President Obama announced his intent to nominate the following individuals to key Administration posts: David Danielson, Nominee for Assistant Secretary for Energy Efficiency and Renewable Energy, Department of Energy

269

Key Accomplishments @ Catalysis: Reactivity and Structure Group | Chemistry  

NLE Websites -- All DOE Office Websites (Extended Search)

Recent Key Accomplishments Recent Key Accomplishments WGS: Importance of the Metal-Oxide Interface in Catalysis: In Situ Studies of the Water-Gas Shift Reaction by Ambient-Pressure X-ray Photoelectron Spectroscopy A New Type of Strong Metal-Support Interaction and the Production of H-2 through the Transformation of Water on Pt/CeO2(111) and Pt/CeOx/TiO2(110) Catalysts In situ studies of CeO2-supported Pt, Ru, and Pt-Ru alloy catalysts for the water-gas shift reaction: Active phases and reaction intermediates In situ/operando studies for the production of hydrogen through the water-gas shift on metal oxide catalysts Mechanistic understanding of WGS catalysts from first principles: Au(111) Supported Oxide Nanoparticles Theoretical catalyst optimization of WGS catalysts: Cu(111) supported oxide nanostructures

270

Contributions to Key Energy Conversion Technologies and Advanced Methods  

NLE Websites -- All DOE Office Websites (Extended Search)

Contributions to Key Energy Conversion Technologies and Advanced Methods Contributions to Key Energy Conversion Technologies and Advanced Methods for Optimum Energy Systems Design and Planning Speaker(s): Daniel Favrat Date: February 27, 2003 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Kristina LaCommare This presentation reviews some of EPFL-LENI's recent contributions to advanced cogeneration and heat pump technologies as well as to new system design approaches based on multimodal evolutionar algorithms. In the field of cogeneration, theoretical and experimental results show that gas engines with unscavenged ignition prechambers can, without the need of a catalyst, achieve high efficiencies with reasonable emissions with both natural gas and biogas. Combination with Organic Rankine Cycle (ORC) heat recovery

271

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 23, 2012 - 8:28pm January 23, 2012 - 8:28pm Addthis THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE January 23, 2012 President Obama Announces More Key Administration Posts WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Erin C. Conaton - Under Secretary of Defense for Personnel and Readiness, Department of Defense Scott H. DeLisi - Ambassador to the Republic of Uganda, Department of State Deborah Delisle - Assistant Secretary for Elementary and Secondary Education, Department of Education Tracey Ann Jacobson - Ambassador to the Republic of Kosovo, Department of State James J. Jones - Assistant Administrator for Toxic Substances, Environmental Protection Agency Frank Kendall III - Under Secretary of Defense for Acquisition,

272

Quantum key distribution using intra-particle entanglement  

E-Print Network (OSTI)

We propose the use of intra-particle entanglement to enhance the security of a practical implementation of the Bennett-Brassard-1984 (BB84) quantum key distribution scheme. Intra-particle entanglement is an attractive resource since it can be easily generated using only linear optics. Security is studied under a simple model of incoherent attack for protocols involving two or all five mutually unbiased bases. In terms of efficiency of secret key generation and tolerable error rate, the latter is found to be superior to the former. We find that states that allow secrecy distillation are necessarily entangled, though they may be local. Since more powerful attacks by Eve obviously exist, our result implies that security is a strictly stronger condition than entanglement for these protocols.

S. Adhikari; Dipankar Home; A. S. Majumdar; A. K. Pan; Akshata Shenoy H.; R. Srikanth

2011-01-04T23:59:59.000Z

273

Public key Steganography Using Discrete Cross-Coupled Chaotic Maps  

E-Print Network (OSTI)

By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

2012-11-01T23:59:59.000Z

274

Thailand-Key Results and Policy Recommendations for Future Bioenergy  

Open Energy Info (EERE)

and Policy Recommendations for Future Bioenergy and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Agency/Company /Organization Food and Agriculture Organization of the United Nations Sector Land Focus Area Biomass, Agriculture Topics Co-benefits assessment, Policies/deployment programs, Background analysis Resource Type Lessons learned/best practices Website http://www.fao.org/docrep/013/ Country Thailand UN Region South-Eastern Asia References Thailand-Key Results and Policy Recommendations for Future Bioenergy Development[1] Abstract "The Government of Thailand, through its Alternative Energy Development Plan, has set a target to increase biofuel production to five billion

275

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 2, 2011 - 9:20pm August 2, 2011 - 9:20pm Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Ashton B. Carter - Nominee for Deputy Secretary of Defense, Department of Defense I. Charles McCullough III - Inspector General of the Intelligence Community, Office of the Director of National Intelligence Ernest Mitchell, Jr. - Administrator, United States Fire Administration, Federal Emergency Management Agency, Department of Homeland Security Nancy M. Ware - Director, Court Services and Offender Supervision Agency for the District of Columbia Gregory H. Woods - General Counsel, Department of Energy The President also announced his intent to appoint the following individuals to key Administration posts:

276

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to  

NLE Websites -- All DOE Office Websites (Extended Search)

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to policy makers on energy codes and to offer guidance on how policy makers can support the creation of statewide energy efficiency goals and standards. In addition, this guide will help instruct policy makers on how they can: » Encourage the adoption of statewide codes. » Establish energy code awareness programs. » Support enforcement of and compliance with energy codes. » Participate in the development of national codes and standards. » Determine the viability of the new code. Building TECHnOlOgiES PROgRAM Resource Guide for Policy Makers PREPAREd By Building Energy Codes Program The u.S. department of Energy's (uSdOE) Building Energy Codes Program (BECP) is an information resource on national energy codes. They work with other government

277

Extensible router for multi-user quantum key distribution network  

E-Print Network (OSTI)

A feasible quantum key distribution (QKD) network scheme has been proposed with the wavelength routing. An apparatus called "quantum router", which is made up of many wavelength division multiplexers, can route the quantum signals without destroying their quantum states. Combining with existing point-to-point QKD technology, we can setup a perfectly QKD star-network. A simple characteristic and feasibility of this scheme has also been obtained.

Zhang, T; Han, Z F; Mo, X F; Guo, Guang-Can; Han, Zheng-Fu; Mo, Xiao-Fan; Zhang, Tao

2006-01-01T23:59:59.000Z

278

Key Factors in Displacement Ventilation Systems for Better IAQ  

E-Print Network (OSTI)

This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect air-quality in rooms of multi-polluting heat sources. Results show that it is very important to determine the suitable air-intemperature , air-inflow, and heat source quantity and dispersion, to obtain better displacement ventilation results.

Wang, X.; Chen, J.; Li, Y.; Wang, Z.

2006-01-01T23:59:59.000Z

279

Key Elements of and Materials Performance Targets for Highly Insulating  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Elements of and Materials Performance Targets for Highly Insulating Key Elements of and Materials Performance Targets for Highly Insulating Window Frames Title Key Elements of and Materials Performance Targets for Highly Insulating Window Frames Publication Type Journal Article LBNL Report Number LBNL-5099E Year of Publication 2011 Authors Gustavsen, Arlid, Steinar Grynning, Dariush K. Arasteh, Bjørn Petter Jelle, and Howdy Goudey Journal Energy and Buildings Volume 43 Issue 10 Pagination 2583-2594 Date Published 10/2011 Keywords Fenestration, heat transfer modeling, thermal performance, thermal transmittance, u-factor, window frames Abstract The thermal performance of windows is important for energy efficient buildings. Windows typically account for about 30-50 percent of the transmission losses though the building envelope, even if their area fraction of the envelope is far less. The reason for this can be found by comparing the thermal transmittance (U-factor) of windows to the U-factor of their opaque counterparts (wall, roof and floor constructions). In well insulated buildings the U-factor of walls, roofs an floors can be between 0.1-0.2 W/(m2K). The best windows have U-values of about 0.7-1.0. It is therefore obvious that the U-factor of windows needs to be reduced, even though looking at the whole energy balance for windows (i.e. solar gains minus transmission losses) makes the picture more complex.

280

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of an Anticancer Agent Print A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline 8.2.2, discovered and characterized the chlorinating SalL enzyme, a crucial component in sal A biosynthesis that uses a unique chlorine-activating mechanism. Chlorine-Loving Enzyme Speeds Things Up The smell of chlorine is unmistakable. It's in the swimming pool, in household bleach, and sometimes the faint odor of chlorine rises up from your tap water. But chlorine is more than a purifier and a disinfectant. It's found almost everywhere in nature-in table salt, dissolved in the ocean, and as a key ingredient in biosynthesis, a vital part of the metabolism of all living organisms.

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Key management and encryption under the bounded storage model.  

SciTech Connect

There are several engineering obstacles that need to be solved before key management and encryption under the bounded storage model can be realized. One of the critical obstacles hindering its adoption is the construction of a scheme that achieves reliable communication in the event that timing synchronization errors occur. One of the main accomplishments of this project was the development of a new scheme that solves this problem. We show in general that there exist message encoding techniques under the bounded storage model that provide an arbitrarily small probability of transmission error. We compute the maximum capacity of this channel using the unsynchronized key-expansion as side-channel information at the decoder and provide tight lower bounds for a particular class of key-expansion functions that are pseudo-invariant to timing errors. Using our results in combination with Dziembowski et al. [11] encryption scheme we can construct a scheme that solves the timing synchronization error problem. In addition to this work we conducted a detailed case study of current and future storage technologies. We analyzed the cost, capacity, and storage data rate of various technologies, so that precise security parameters can be developed for bounded storage encryption schemes. This will provide an invaluable tool for developing these schemes in practice.

Draelos, Timothy John; Neumann, William Douglas; Lanzone, Andrew J.; Anderson, William Erik

2005-11-01T23:59:59.000Z

282

Green Thunderstorms Observed  

Science Conference Proceedings (OSTI)

Green thunderstorms have been observed from time to time in association with deep convection or severe weather events. Often the green coloration has been attributed to hail or to reflections of light from green foliage on the ground. Some ...

Frank W. Gallagher III; William H. Beasley; Craig F. Bohren

1996-12-01T23:59:59.000Z

283

Tropical observability and predictability  

E-Print Network (OSTI)

Many studies have investigated tropical data assimilation in the context of global models or specifically for tropical cyclones, but relatively few have focused on the mesoscale predictability and observability of the ...

Whitcomb, Timothy Robert

2008-01-01T23:59:59.000Z

284

Multifunctional Mesoscale Observing Networks  

Science Conference Proceedings (OSTI)

More than 120 scientists, engineers, administrators, and users met on 810 December 2003 in a workshop format to discuss the needs for enhanced three-dimensional mesoscale observing networks. Improved networks are seen as being critical to ...

Walter F. Dabberdt; Thomas W. Schlatter; Frederick H. Carr; Elbert W. Joe Friday; David Jorgensen; Steven Koch; Maria Pirone; F. Martin Ralph; Juanzhen Sun; Patrick Welsh; James W. Wilson; Xiaolei Zou

2005-07-01T23:59:59.000Z

285

Observing AAPI Heritage Month | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Observing AAPI Heritage Month Observing AAPI Heritage Month Observing AAPI Heritage Month May 1, 2012 - 4:42pm Addthis Bill Valdez Bill Valdez Principal Deputy Director What are the key facts? President Obama has also appointed a historic number of highly qualified Asian Americans and Pacific Islanders to senior positions in his Administration Throughout May,the White House Initiative on Asian Americans and Pacific Islanders will be sharing the many ways in which the Obama Administration has helped the Asian American and Pacific Islander community. White House Initiative on Asian Americans and Pacific Islanders Editor's Note: This blog originally appeared on the White House Blog, and is authored by Chris Lu, Assistant to the President and Cabinet Secretary. He is also the Co-Chair of the White House Initiative on Asian

286

Transformational Energy Action Management (TEAM) Wireless Energy Efficiency Keys Initiative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

by by Transformational Energy Action Management (TEAM) Wireless Energy Efficiency Keys Initiative *Ways of Using Wireless Technology to Help You Reduce Energy Usage at your Facility Together with our industry partners, we strive to: * Accelerate adoption of the many energy-efficient technologies and practices available today * Conduct vigorous technology innovation to radically improve future energy diversity, resource efficiency, and carbon mitigation * Promote a corporate culture of energy efficiency and carbon management What Is the Industrial Technologies Program ? The Industrial Technologies Program (ITP) is the lead federal agency responsible for improving energy efficiency in the largest energy-using sector of the country. Industrial Sector National Initiative

287

Local structures - key to improved gas adsorption in carbon materials |  

NLE Websites -- All DOE Office Websites (Extended Search)

Functional Materials for Energy Functional Materials for Energy Local structures - key to improved gas adsorption in carbon materials September 23, 2013 (Inset, top left) A simulated disordered carbon structure. (Inset, bottom right) Same structure, with dense colored regions showing the strongest adsorption positions. (Main figure) Isosteric heat of adsorption as a function of carbon density, showing the strong change of adsorption with pore size. Combined results from electron microscopy, neutron scattering, and theory, illustrate the link between local structures and adsorption properties in carbon materials. The achieved understanding at the atomic scale is a crucial step towards predicting and designing materials with enhanced gas adsorption properties, with important implications for applications such as

288

Numerical analysis of decoy state quantum key distribution protocols  

SciTech Connect

Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

2008-01-01T23:59:59.000Z

289

Stable polarization-encoded quantum key distribution in fiber  

E-Print Network (OSTI)

Polarizations of single-photon pulses have been controlled with long-term stability of more than 10 hours by using an active feedback technique for auto-compensation of unpredictable polarization scrambling in long-distance fiber. Experimental tests of long-term operations in 50, 75 and 100 km fibers demonstrated that such a single-photon polarization control supported stable polarization encoding in long-distance fibers to facilitate stable one-way fiber system for polarization-encoded quantum key distribution, providing quantum bit error rates below the absolute security threshold.

Wu, G; Li, Y; Zeng, H; Wu, Guang; Chen, Jie; Li, Yao; Zeng, Heping

2006-01-01T23:59:59.000Z

290

Renewable: A key component of our global energy future  

DOE Green Energy (OSTI)

Inclusion of renewable energy sources in national and international energy strategies is a key component of a viable global energy future. The global energy balance is going to shift radically in the near future brought about by significant increases in population in China and India, and increases in the energy intensity of developing countries. To better understand the consequences of such global shifts in energy requirements and to develop appropriate energy strategies to respond to these shifts, we need to look at the factors driving choices among supply options by geopolitical consumers and the impact these factors can have on the future energy mix.

Hartley, D.

1995-12-31T23:59:59.000Z

291

Key results from SB8 simulant flowsheet studies  

SciTech Connect

Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

Koopman, D. C.

2013-04-26T23:59:59.000Z

292

Quantum Mechanics Without Observers  

E-Print Network (OSTI)

The measurement problem and the role of observers have plagued quantum mechanics since its conception. Attempts to resolve these have introduced anthropomorphic or non-realist notions into physics. A shift of perspective based upon process theory and utilizing methods from combinatorial games, interpolation theory and complex systems theory results in a novel realist version of quantum mechanics incorporating quasi-local, nondeterministic hidden variables that are compatible with the no-hidden variable theorems and relativistic invariance, and reproduce the standard results of quantum mechanics to a high degree of accuracy without invoking observers.

W. H. Sulis

2013-02-18T23:59:59.000Z

293

Network Observability Transitions  

E-Print Network (OSTI)

In the modeling, monitoring, and control of complex networks, a fundamental problem concerns the comprehensive determination of the state of the system from limited measurements. Using power grids as example networks, we show that this problem leads to a new type of percolation transition, here termed a {\\it network observability transition}, which we solve analytically for the configuration model. We also demonstrate a dual role of the network's community structure, which both facilitates optimal measurement placement and renders the networks substantially more sensitive to `observability attacks'. Aside from their immediate implications for the development of smart grids, these results provide insights into decentralized biological, social, and technological networks.

Yang, Yang; Motter, Adilson E; 10.1103/PhysRevLett.109.258701

2013-01-01T23:59:59.000Z

294

Key Distribution based on Three Player Quantum Games  

E-Print Network (OSTI)

We study a new QKD that is different from the scheme proposed by \\cite{Ramz2}, though it essentially takes our ground on three-player quantum games and Greenberg-Horne-Zeilinger triplet entangled state (GHZ state) \\cite{Gree} is used. In the scheme proposed in this paper, players in the game, Bob and Charlie (and Alice also) can get some common key or information (applied strategies and their payoffs in the game), when Alice informs Bob and Charlie about some results of the measurement made by her. Even if somebody else knows the public information, he/she can not get any key information. There is not any arbiter in our scheme, since existence of an arbiter increases the risk of wiretapping. Lastly we discuss robustness of the proposed QKD method for eavesdrop. We show that though maximally entangled case and non-entangled case essentially provide an equivalent way as QKD, the latter is not available in the case where there are some eavesdroppers. At the same time, we point put that the entanglement of the initial state is crucial when a partially entangled state is used.

Norihito Toyota

2010-10-09T23:59:59.000Z

295

Encryption Key Search using Java-based ALiCE Grid  

E-Print Network (OSTI)

Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

Virkar, Ameya

296

Key Response Planning Factors for the Aftermath of Nuclear Terrorism  

Science Conference Proceedings (OSTI)

Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

Buddemeier, B R; Dillon, M B

2009-01-21T23:59:59.000Z

297

Investing in Oil and Natural Gas A Few Key Issues  

U.S. Energy Information Administration (EIA) Indexed Site

Strategic Advisors in Global Energy Strategic Advisors in Global Energy Strategic Advisors in Global Energy Strategic Advisors in Global Energy Investing in Oil and Natural Gas: A Few Key Issues Prepared for EIA Conference Susan Farrell, Senior Director PFC Energy April 8, 2009 Investing in Oil and Gas| PFC Energy| Page 2 The Top 20 IOCs and Top 20 NOCs Account for Over Half of E&P Spend Source: PFC Energy, Global E&P Surveys Investing in Oil and Gas| PFC Energy| Page 3 Oil Prices Rose, But So Did Costs + 52% $0 $20 $40 $60 $80 $100 $120 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 WTI $/barrel Annual averages Large Gulf of Mexico Facility Costs by Segment Avg $28.31 Avg $59.13 Source: PFC Energy Investing in Oil and Gas| PFC Energy| Page 4 Near term Spending Cuts will be Significant

298

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 9, 2009 - 12:00am December 9, 2009 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Patricia A. Hoffman, Assistant Secretary for Electricity Delivery and Energy Reliability, Department of Energy Mari Del Carmen Aponte, Ambassador to the Republic of El Salvador, Department of State Donald E. Booth, Ambassador to the Federal Democratic Republic of Ethiopia, Department of State Larry Persily, Federal Coordinator for Alaska Natural Gas Transportation Projects President Obama said, "The depth of experience these individuals bring to their roles will be valuable to my administration as we work to bring about real change for the American people. I look forward to working with them in

299

Nano Changes Have Macro Importance for a Key Electronics Material |  

NLE Websites -- All DOE Office Websites (Extended Search)

Squeezing an Old Material Could Yield "Instant-On" Memory Squeezing an Old Material Could Yield "Instant-On" Memory A Metal That Becomes Transparent under Pressure Under Pressure, Atoms Make Unlikely Alloys Slowing Down Near the Glass Transition New Light on Improving Engine Efficiencies Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed Nano Changes Have Macro Importance for a Key Electronics Material APRIL 23, 2009 Bookmark and Share Original image courtesy of http://www.freefoto.com By combining the results from several powerful techniques for studying materials structure at the nanoscale, including work at the U.S. Department of Energy's Advanced Photon Source (APS) at Argonne National Laboratory,

300

LANL to play key role in biofuel development  

NLE Websites -- All DOE Office Websites (Extended Search)

Biofuel development Biofuel development LANL to play key role in biofuel development LANL to create a proof-of-concept system for commercializing algae-based biofuels or other advanced biofuels that can be transported and sold using the nation's existing fueling infrastructure. January 14, 2010 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials.

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 17, 2009 - 12:00am April 17, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Christine M. Griffin, Deputy Director of Office of Personnel Management; Kevin Concannon, Under Secretary for Food, Nutrition and Consumer Services, United States Department of Agriculture; Rajiv Shah, Under Secretary for Research, Education, and Economics, United States Department of Agriculture; Michael Nacht, Assistant Secretary of Defense (Global Strategic Affairs), Department of Defense; Mercedes Márquez, Assistant Secretary for Community Planning and Development, Department of Housing and Urban Development; Raymond M. Jefferson, Assistant Secretary for Veterans Employment and Training, Department of Labor; Robert S. Litt, General

302

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 10, 2010 - 12:00am December 10, 2010 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Peter B. Lyons, Assistant Secretary for Nuclear Energy, Department of Energy Denise E. O'Donnell, Director of the Bureau of Justice Assistance, Department of Justice Stephanie O'Sullivan, Principal Deputy Director of National Intelligence, Directorate of National Intelligence David Shear, Ambassador to the Socialist Republic of Vietnam, Department of State The President also announced his intent to appoint Harvey S. Wineberg as a Member of the President's Advisory Council on Financial Capability. His biography is below. President Obama said, "The American people will be greatly served by the

303

Potential Benefits from Improved Energy Efficiency of Key Electrical Products:  

NLE Websites -- All DOE Office Websites (Extended Search)

8254 8254 Potential Benefits from Improved Energy Efficiency of Key Electrical Products: The Case of India Michael McNeil, Maithili Iyer, Stephen Meyers, Virginie Letschert, James E. McMahon Environmental Energy Technologies Division Lawrence Berkeley National Laboratory University of California, Berkeley Berkeley, CA December 2005 This work was supported by the International Copper Association through the U.S. Department of Energy under Contract No. DE-AC03-76SF00098. 2 ABSTRACT The goal of this project was to estimate the net benefits that cost-effective improvements in energy efficiency can bring to developing countries. The study focused on four major electrical products in the world's second largest developing country, India. These

304

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 8, 2009 - 12:00am July 8, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Joe Garcia, Director of the Office of Minority Economic Impact, Department of Energy Michael H. Posner, Assistant Secretary of State for Democracy, Human Rights, and Labor, Department of State Stephen J. Rapp, Ambassador at Large for War Crimes Issues, Department of State Alexander G. Garza, Assistant Secretary for Health Affairs and Chief Medical Officer, Department of Homeland Security Susan L. Kurland, Assistant Secretary for Aviation and International Affairs, Department of Transportation Kenneth A. Spearman, Member of the Board of Directors, Farm Credit Administration Rolena Adorno, Member of the National Council on the Humanities

305

A Key Target for Diabetes Drugs | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

Molten Metal Solidifies into a New Kind of Glass Molten Metal Solidifies into a New Kind of Glass Organic Polymers Show Sunny Potential A New Family of Quasicrystals Cool Muscles: Storing Elastic Energy for Flight A Further Understanding of Superconductivity Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor, which could help scientists design new drugs for type 2 diabetes. (Image courtesy of Katya Kadyshevskaya, The Scripps Research Institute) The three-dimensional (3-D) atomic structure of the human glucagon receptor has been identified by an international team of researchers carrying out

306

Key parameters influencing the performance of photocatalytic oxidation  

NLE Websites -- All DOE Office Websites (Extended Search)

Key parameters influencing the performance of photocatalytic oxidation Key parameters influencing the performance of photocatalytic oxidation (PCO) air purification under realistic indoor conditions Title Key parameters influencing the performance of photocatalytic oxidation (PCO) air purification under realistic indoor conditions Publication Type Journal Article Year of Publication 2012 Authors Destaillats, Hugo, Mohamad Sleiman, Douglas P. Sullivan, Catherine Jacquiod, Jean Sablayrolles, and Laurent Molins Journal Applied Catalysis B: Environmental Volume 128 Pagination 159-170 Date Published 11/30/2012 Abstract Photocatalytic oxidation (PCO) air cleaning is a promising technology suitable for the elimination of a broad range of volatile organic compounds (VOCs). However, performance of poorly designed PCO systems may be affected by the formation of volatile aldehydes and other partially oxidized byproducts. This study explored the role of key design and dimensioning parameters that influence the effective removal of primary pollutants and can help reduce or eliminate the formation of secondary byproducts. A model pollutant mixture containing benzene, toluene, o-xylene, undecane, 1-butanol, formaldehyde and acetaldehyde was introduced at a constant rate in a 20-m3 environmental chamber operating at an air exchange rate of 1 h-1. Individual pollutant concentrations were kept at realistically low levels, between 2 and 40 μg m-3. A prototype air cleaner provided with flat or pleated PCO filtering media was operated in an external ductwork loop that recirculated chamber air at flow rates in the range 178-878 m3 h-1, corresponding to recycle ratios between 8.5 and 38. Air samples were collected upstream and downstream of the air cleaner and analyzed off-line to determine single-pass removal efficiency. The final-to-initial chamber concentration ratio was used to determine the global chamber removal efficiency for each pollutant. In the flat filter configuration, longer dwelling times of compounds on the TiO2 surface were attained by reducing the recirculation airflow by a factor of ∼5, leading to increasing total pollutant removal efficiency from 5% to 44%. Net acetaldehyde and formaldehyde removal was achieved, the later at airflow rates below 300 m3 h-1, illustrating the critical importance of controlling the contact time of primary and secondary pollutants with the TiO2 surface. The use of pleated media was shown to increase significantly the system performance by extending the dwelling time of pollutants on the irradiated surface of the PCO media, with a 70% degradation of target pollutants. With the pleated media, formaldehyde removal efficiency increased to 60%. Irradiation using either a UVC or a UVA lamp under identical flow conditions produced similar pollutant elimination. A simple correlation between the steady-state single pass removal efficiency and the global chamber removal efficiency was used to rationalize these experimental results and identify optimal operating conditions.

307

City of Key West, Florida (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

Florida (Utility Company) Florida (Utility Company) Jump to: navigation, search Name Key West City of Place Florida Utility Id 10226 Utility Location Yes Ownership M NERC Location FRCC NERC FRCC Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes Activity Buying Transmission Yes Activity Distribution Yes Alt Fuel Vehicle Yes Alt Fuel Vehicle2 Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Governmental Recreational Facility Lighting (Schedule S-3) LED High Watt, Approx. 72 Watt (Street Light Schedule S-1) Lighting LED High Watt, Approx. 72 Watts (Area Lighting Schedule S-2) Lighting

308

LANL breaks ground on key sediment control project  

NLE Websites -- All DOE Office Websites (Extended Search)

Sediment control project Sediment control project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately $2 million features are up to eight feet high and made of rocks packed tightly into wire enclosures. November 5, 2009 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials.

309

A verifiable random function with short proofs and keys  

E-Print Network (OSTI)

Abstract. We give a simple and efficient construction of a verifiable random function (VRF) on bilinear groups. Our construction is direct. In contrast to prior VRF constructions [14, 15], it avoids using an inefficient Goldreich-Levin transformation, thereby saving several factors in security. Our proofs of security are based on a decisional bilinear Diffie-Hellman inversion assumption, which seems reasonable given current state of knowledge. For small message spaces, our VRFs proofs and keys have constant size. By utilizing a collision-resistant hash function, our VRF can also be used with arbitrary message spaces. We show that our scheme can be instantiated with an elliptic group of very reasonable size. Furthermore, it can be made distributed and proactive. 1

Yevgeniy Dodis; R Yampolskiy

2005-01-01T23:59:59.000Z

310

The Seven Keys to Success in Energy Management and Conservation  

E-Print Network (OSTI)

This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process of initiating an energy management program is detailed. The establishment of long range goals, together with the organization and commitment to accomplish these goals are specified. The necessity of performing an energy audit is discussed, together with an explanation of the three 'types' of energy used in a manufacturing facility. The requirement of having a good 'energy ethic' among all employees is discussed in detail. The method of monitoring the program and measuring results is also discussed.

Darby, D. F.

1984-01-01T23:59:59.000Z

311

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4, 2009 - 12:00am 4, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Daniel B. Poneman, Deputy Secretary, Department of Energy; Fred P. Hochberg, President and Chairman of the Export-Import Bank of the United States; Francisco "Frank" J. Sánchez, Under Secretary for International Trade, Department of Commerce; Miriam E. Sapiro, Deputy Trade Representative; Judith A. McHale, Under Secretary for Public Diplomacy and Public Affairs, Department of State; Philip J. "P.J." Crowley, Assistant Secretary of State for Public Affairs, Department of State; Bonnie D. Jenkins, Coordinator for Threat Reduction Programs (with the Rank of Ambassador), Department of

312

Some Key Questions in the Climate Change Policy Debate  

U.S. Energy Information Administration (EIA) Indexed Site

IMAGE Model World Primary Energy in 550 ppm Case in 2100 Other Biomass Wind Solar Nuclear Hydro Coal Gas Oil The Energy Resource Mix Observations Regarding Current Approaches to...

313

Using Key Performance Indicators to Manage Energy Costs  

E-Print Network (OSTI)

Modern management systems rely heavily on information technology to set goals, track performance and communicate results. Energy management approaches (such as those offered by the US Department of Energy and Natural Resources Canada) and measurement and verification protocols (such as IPMVP 2001) often highlight the importance an information system has in maximizing results. The increasing adoption of energy information systems has led, however, to an interesting paradox: while it is now cost-effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators (KPIs) to summarize volumes of data into a few critical nuggets of actionable information. These KPIs provide both the metrics that will be used to determine the success of a business plan as well as the timely information managers need to track performance and make adjustments to ensure success. A similar approach can be used in the practice of energy management, where KPIs can be designed to measure the success of key elements in an energy management plan and provide energy managers with the timely nuggets of information they need to ensure success. This paper describes how to define and use KPIs to track the performance and measure the success of an energy management plan. A framework is provided to assist in selecting measurable goals from an energy management plan and determine the raw data and processing required to generate the associated KPIs.

Van Gorp, J. C.

2005-01-01T23:59:59.000Z

314

Performance of Quantum Key Distribution Protocol with Dual-Rail Displaced Photon States  

E-Print Network (OSTI)

We propose a scheme for quantum key distribution (QKD) protocol with dual-rail displaced photon states. Displaced single photon states carry bit value of code which may be extracted while coherent states carry nothing and they only provide inconclusive outcome. Developed QKD protocol works with experimental attendant noise to observe presence of malicious Eve. Pulses with large amplitudes unlike conventional QKD relying on faint laser pulses are used that may approximate it to standard telecommunication communication and may show resistance to eavesdropping even in settings with high attenuation. Information leakage to the eavesdropper is determined from comparison of output distribution of the outcomes with ideal one that is defined by two additional inaccessible to nobody, saving for who sends the pulses, parameters. Robustness to some possible eavesdropping attacks is shown.

Sergey A. Podoshvedov

2009-05-13T23:59:59.000Z

315

Updated distribution and reintroduction of the Lower Keys marsh rabbit  

E-Print Network (OSTI)

Listed as federally-endangered in 1990, the Lower Keys marsh rabbit (LKMR, Sylvilagus palustris hefneri) exists as a metapopulation in patches of wetland habitat in Florida?s Lower Keys. This study sought to address 2 priority actions identified by the LKMR Recovery Team: (1) monitoring of populations and (2) reintroduction. Monitoring the distribution and status of LKMR populations is critical for targeting future management actions. Informal transects for rabbit fecal pellets were used to survey habitat patches documented in1988?1995 surveys and to identify additional patches of occupied and potential habitat. Next, a buffer was created around patches to help managers account for uncertainty in rabbit movements and to identify groups of patches that might function as local populations. Surveys included 228 patches of occupied and potential habitat, 102 of which were occupied by rabbits. Patches were arranged in 56 occupied and 88 potential populations. Surveys revealed new patches of both occupied and potential habitat. Considering only areas included in 1988?1995 surveys, however, revealed a net decrease in the number of occupied patches. Many of the recently extirpated populations, which tended to occupy the periphery of larger islands or small neighboring islands, were unlikely to be recolonized without human intervention. Reintroduction provides a means of artificially recolonizing potential habitat. Two pilot reintroductions were conducted to evaluate this conservation strategy for the species. The second reintroduction was postponed, but the first effort met all criteria for short-term success, including survival comparable to a control group, fidelity to release sites, and evidence of reproduction. There are a limited number of potential source populations for translocations. Future efforts should consider using in-situ captive breeding to prevent potential long-term impacts to these populations. Few potential release sites exhibited suitable habitat quality and landscape context. Thus, for reintroduction to be more widely-applied for this species, it must be part of a comprehensive management plan involving land acquisition, control of secondary impacts from development, and habitat restoration and enhancement.

Faulhaber, Craig Alan

2003-12-01T23:59:59.000Z

316

Do myoepithelial cells hold the key for breast tumorprogression?  

SciTech Connect

Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

Polyak, Kornelia; Hu, Min

2005-11-18T23:59:59.000Z

317

Optimising waste management performance - The key to successful decommissioning  

SciTech Connect

Available in abstract form only. Full text of publication follows: On the 1. of April 2005 the United Kingdom's Nuclear Decommissioning Authority became responsible for the enormous task of decommissioning the UK's civilian nuclear liabilities. The success of the NDA in delivering its key objectives of safer, cheaper and faster decommissioning depends on a wide range factors. It is self-evident, however, that the development of robust waste management practices by those charged with decommissioning liability will be at the heart of the NDA's business. In addition, the implementation of rigorous waste minimisation techniques throughout decommissioning will deliver tangible environmental benefits as well as better value for money and release funds to accelerate the decommissioning program. There are mixed views as to whether waste minimisation can be achieved during decommissioning. There are those that argue that the radioactive inventory already exists, that the amount of radioactivity cannot be minimised and that the focus of activities should be focused on waste management rather than waste minimisation. Others argue that the management and decommissioning of the UK's civilian nuclear liability will generate significant volumes of additional radioactive waste and it is in this area where the opportunities for waste minimisation can be realised. (author)

Keep, Matthew [Entec UK Limited. 17 Angel Gate. City Road. London EC1V 2SH (United Kingdom)

2007-07-01T23:59:59.000Z

318

Multi-client quantum key distribution using wavelength division multiplexing  

Science Conference Proceedings (OSTI)

Quantum Key Distribution (QKD) exploits the rules of quantum mechanics to generate and securely distribute a random sequence of bits to two spatially separated clients. Typically a QKD system can support only a single pair of clients at a time, and so a separate quantum link is required for every pair of users. We overcome this limitation with the design and characterization of a multi-client entangled-photon QKD system with the capacity for up to 100 clients simultaneously. The time-bin entangled QKD system includes a broadband down-conversion source with two unique features that enable the multi-user capability. First, the photons are emitted across a very large portion of the telecom spectrum. Second, and more importantly, the photons are strongly correlated in their energy degree of freedom. Using standard wavelength division multiplexing (WDM) hardware, the photons can be routed to different parties on a quantum communication network, while the strong spectral correlations ensure that each client is linked only to the client receiving the conjugate wavelength. In this way, a single down-conversion source can support dozens of channels simultaneously--and to the extent that the WDM hardware can send different spectral channels to different clients, the system can support multiple client pairings. We will describe the design and characterization of the down-conversion source, as well as the client stations, which must be tunable across the emission spectrum.

Grice, Warren P [ORNL; Bennink, Ryan S [ORNL; Earl, Dennis Duncan [ORNL; Evans, Philip G [ORNL; Humble, Travis S [ORNL; Pooser, Raphael C [ORNL; Schaake, Jason [ORNL; Williams, Brian P [ORNL

2011-01-01T23:59:59.000Z

319

Feasibility of 300 km Quantum Key Distribution with Entangled States  

E-Print Network (OSTI)

A significant limitation of practical quantum key distribution (QKD) setups is currently their limited operational range. It has recently been emphasized (X. Ma, C.-H. F. Fung, and H.-K. Lo., Phys. Rev. A, 76:012307, 2007) that entanglement-based QKD systems can tolerate higher channel losses than systems based on weak coherent laser pulses (WCP), in particular when the source is located symmetrically between the two communicating parties, Alice and Bob. In the work presented here, we experimentally study this important advantage by implementing different entanglement-based QKD setups on a 144~km free-space link between the two Canary Islands of La Palma and Tenerife. We established three different configurations where the entangled photon source was placed at Alice's location, asymmetrically between Alice and Bob and symmetrically in the middle between Alice and Bob, respectively. The resulting quantum channel attenuations of 35~dB, 58~dB and 71~dB, respectively, significantly exceed the limit for WCP systems. This confirms that QKD over distances of 300~km and even more is feasible with entangled state sources placed in the middle between Alice and Bob.

Thomas Scheidl; Rupert Ursin; Alessandro Fedrizzi; Sven Ramelow; Xiao-Song Ma; Thomas Herbst; Robert Prevedel; Lothar Ratschbacher; Johannes Kofler; Thomas Jennewein; Anton Zeilinger

2010-07-27T23:59:59.000Z

320

Do myoepithelial cells hold the key for breast tumorprogression?  

SciTech Connect

Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

Polyak, Kornelia; Hu, Min

2005-11-18T23:59:59.000Z

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Observations of Edge Turbulence  

NLE Websites -- All DOE Office Websites (Extended Search)

Edge Turbulence Edge Turbulence near the X-point of Alcator C-Mod APS-2007 (1) J.L. Terry, S.J. Zweben*, B. LaBombard, I. Cziegler, O. Grulke + , D.P. Stotler* MIT - Plasma Science and Fusion Center *Princeton Plasma Physics Laboratory + MPI for Plasma Physics, EURATOM Assoc., Greifswald, Germany American Physical Society - Div. of Plasma Physics Orlando, FL Nov. 12 - Nov. 16, 2007 APS-2007 (2) Background and Motivation for "Xpt-region" View Strong edge turbulence has been observed in nearly all magnetic confinement devices. Desire predictive capability Most previous measurements made near outboard midplane where the turbulence has the following main features: - generation is ballooning-like (absent at inboard midplane, etc.) - filaments/blobs moves radially outward with some poloidal motion

322

Polarization diversity for millimeter space-borne Doppler radars: an answer for observing deep convection?  

Science Conference Proceedings (OSTI)

Spaceborne Doppler radars have the potential to provide key missing observations of convective vertical air motions especially over the tropical oceans. Such measurements can improve our understanding of the role of tropical convection in vertical ...

Alessandro Battaglia; Simone Tanelli; Pavlos Kollias

323

Provably-Secure two-round password-authenticated group key exchange in the standard model  

Science Conference Proceedings (OSTI)

Password-authenticated group key exchange (PAGKE) allows group users to share a session key using a human-memorable password only. The fundamental security goal of PAGKE is security against dictionary attacks. Several solutions have been proposed ...

Jeong Ok Kwon; Ik Rae Jeong; Dong Hoon Lee

2006-10-01T23:59:59.000Z

324

High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors  

E-Print Network (OSTI)

We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

Spellmeyer, Neal W.

325

A hybrid data structure for dense keys in in-memory database systems  

E-Print Network (OSTI)

This thesis presents a data structure which performs well for in-memory indexing of keys that are unevenly distributed into clusters with a high density of keys. This pattern is prevalent, for example, in systems that use ...

Muiz Navarro, Jos Alberto

2010-01-01T23:59:59.000Z

326

Direct and Reverse Secret-Key Capacities of a Quantum Channel  

E-Print Network (OSTI)

We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

Braunstein, Samuel L.

327

NERSC Global Filesystem Played a Key Role in Discovery of the...  

NLE Websites -- All DOE Office Websites (Extended Search)

NGFS Played a Key Role in Neutrino Finding NERSC Global Filesystem Played a Key Role in Discovery of the Last Neutrino Mixing Angle February 7, 2013 | Tags: High Energy Physics...

328

Time-cost analysis of a quantum key distribution system clocked at 100 MHz  

E-Print Network (OSTI)

We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

Xiaofan Mo; Itzel Lucio Martinez; Philip Chan; Chris Healey; Steve Hosier; Wolfgang Tittel

2011-05-18T23:59:59.000Z

329

Chapter 2 Suggested Problems: Final Answer Key Atomic mass: mass of an individual atom  

E-Print Network (OSTI)

Chapter 2 Suggested Problems: Final Answer Key 2.1 Atomic mass: mass of an individual atom Atomic;Chapter 3 Suggested Problems: Final Answer Key 3.1 Atomic Structure: relates the # of protons and neutrons of intercepts 2 2 1 Reduction not necessary Enclosure (221) #12;Chapter 12 Suggested Problems: Final Answer Key

Grunlan, Melissa A.

330

Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks  

Science Conference Proceedings (OSTI)

This paper presents an improved method inspired by the recently proposed Pretty-Simple PAKE (Password Authenticated Key-Exchange) protocol, which is already a well-known, robust and simple password authenticated key exchange scheme. In our even more ... Keywords: elliptic curve discrete logarithm, key exchange, password authentication, wireless network

Ting-Yi Chang; Chou-Chen Yang; Chia-Meng Chen

2004-04-01T23:59:59.000Z

331

Low Complexity Spatio-Temporal Key Frame Encoding for Wyner-Ziv Video Coding  

Science Conference Proceedings (OSTI)

In most Wyner-Ziv video coding approaches, the temporal correlation of key frames is not exploited since they are simply intra encoded and decoded. In this paper, using the previously decoded key frame as the side information for the key frame to be ... Keywords: Wyner-Ziv coding, Distributed video coding

Ghazaleh Esmaili; Pamela Cosman

2009-03-01T23:59:59.000Z

332

KALwEN: a new practical and interoperable key management scheme for body sensor networks  

Science Conference Proceedings (OSTI)

Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challengessome inherited from wireless sensor networks (WSNs), some unique to themselvesthat require a new key management scheme to be tailor-made. ... Keywords: body area networks, body sensor networks, healthcare, key management, security

Yee Wei Law; Giorgi Moniava; Zheng Gong; Pieter Hartel; Marimuthu Palaniswami

2011-11-01T23:59:59.000Z

333

Strong planning under partial observability  

Science Conference Proceedings (OSTI)

Rarely planning domains are fully observable. For this reason, the ability to deal with partial observability is one of the most important challenges in planning. In this paper, we tackle the problem of strong planning under partial observability in ... Keywords: Binary decision diagrams, Heuristic search in belief space, Planning in nondeterministic domains, Planning under partial observability, Symbolic model checking

Piergiorgio Bertoli; Alessandro Cimatti; Marco Roveri; Paolo Traverso

2006-04-01T23:59:59.000Z

334

Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices  

SciTech Connect

In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Aldridge, Hal [ORNL; Duren, Mike [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC; Bertino, Elisa [ORNL; Kulatunga, Athula [Purdue University; Navaratne, Uditha Sudheera [Purdue University

2011-01-01T23:59:59.000Z

335

The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.  

SciTech Connect

Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

2010-09-01T23:59:59.000Z

336

Anti-gravity: The key to 21st century physics  

Science Conference Proceedings (OSTI)

The masses coupling constants and cosmological parameters obtained using our discrete and combinatorial physics based on discrimination between bit-strings indicate that we can achieve the unification of quantum mechanics with relativity which had become the goal of twentieth century physics. To broaden our case we show that limitations on measurement of the position and velocity of an individual massive particle observed in a colliding beam scattering experiment imply real, rational commutation relations between position and velocity. Prior to this limit being pushed down to quantum effects, the lower bound is set by the available technology, but is otherwise scale invariant. Replacing force by force per unit mass and force per unit charge allows us to take over the Feynman-Dyson proof of the Maxwell Equations and extend it to weak gravity. The crossing symmetry of the individual scattering processes when one or more particles are replaced by anti-particles predicts both Coulomb attraction (for charged particles) and a Newtonian repulsion between any particle and its anti-particle. Previous quantum results remain intact, and predict the expected relativistic fine structure and spin dependencies. Experimental confirmation of this anti-gravity prediction would inaugurate the physics of the twenty-first century.

Noyes, H.P.

1993-01-01T23:59:59.000Z

337

Monthly Temperature Observations for Uganda  

Science Conference Proceedings (OSTI)

The International Surface Temperature Initiative is a worldwide effort to locate weather observations, digitize them for public access, and attach provenance to them. As part of that effort, this study sought documents of temperature observations ...

John R. Christy

2013-10-01T23:59:59.000Z

338

Marine Observations of Old Weather  

Science Conference Proceedings (OSTI)

Weather observations are vital for climate change monitoring and prediction. For the world's oceans, there are many meteorological and oceanographic observations available back to the mid-twentieth century, but coverage is limited in earlier ...

Philip Brohan; Rob Allan; J. Eric Freeman; Anne M. Waple; Dennis Wheeler; Clive Wilkinson; Scott Woodruff

2009-02-01T23:59:59.000Z

339

Ensemble Transformation and Adaptive Observations  

Science Conference Proceedings (OSTI)

Suppose that the geographical and temporal resolution of the observational network could be changed on a daily basis. Of all the possible deployments of observational resources, which particular deployment would minimize expected forecast error? ...

Craig H. Bishop; Zoltan Toth

1999-06-01T23:59:59.000Z

340

Stratospheric Satellites for Earth Observations  

Science Conference Proceedings (OSTI)

Advanced, robust, yet inexpensive observational platforms and networks of platforms will make revolutionary Earth science observations possible in the next 30 years. One new platform concept that is needed is a long-duration stratospheric balloon ...

Alexey Pankine; Kerry Nock; Zhanqing Li; David Parsons; Michael Purucker; Warren Wiscombe; Elliot Weinstock

2009-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Linux Kernel dns_resolver Key Processing Error Lets Local 1: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services March 7, 2011 - 3:05pm Addthis PROBLEM: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services. PLATFORM: Linux Kernel 2.6.37 and prior versions ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID:1025162 Latest Stable Kernel CVE-2011-1076 IMPACT ASSESSMENT: High Discussion: When a DNS resolver key is instantiated with an error indication, a local user can attempt to read the key to trigger a null pointer dereference and cause a kernel crash. A local user can cause the target system to crash.

342

Secure multi-party communication with quantum key distribution managed by trusted authority  

DOE Patents (OSTI)

Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

2013-07-09T23:59:59.000Z

343

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

344

Field observations and lessons learned  

SciTech Connect

This presentation outlines observations and lessons learned from the Megaports program. It provides: (1) details of field and technical observations collected during LANL field activities at ports around the world and details of observations collected during radiation detections system testing at Los Alamos National Laboratory; (2) provides suggestions for improvement and efficiency; and (3) discusses possible program execution changes for more effective operations.

Nielsen, Joh B [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

345

Observation  

NLE Websites -- All DOE Office Websites (Extended Search)

the large mass of the implies an affinity to Higgs bosons. Within the SM, the Higgs boson is related to the mechanism by which the quarks, leptons and force-carrying gauge...

346

Daylight operation of a free space, entanglement-based quantum key distribution system  

E-Print Network (OSTI)

Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

2008-01-01T23:59:59.000Z

347

Daylight operation of a free space, entanglement-based quantum key distribution system  

E-Print Network (OSTI)

Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

2008-12-10T23:59:59.000Z

348

Category Key Area Sub Area Do?an, .N., "Materials...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Papers funded by the Fuels Program (2013) Category Key Area Sub Area Doan, .N., "Materials Development for Fossil Fueled Energy Conversion Systems," Materials Science...

349

An Analysis of Bridge Abutment Shear Key Behavior due to Embankment Modeling and Earthquake Intensity  

E-Print Network (OSTI)

Maximum and Minimum Displacement Demands .Shear Key Maximum and Minimum Displacement Demands B Max Minunder 5, the maximum displacement ductility demand specified

Wasef, Nardin Mofid

350

Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols  

E-Print Network (OSTI)

Recently, Al-Riyami and Paterson [1] proposed four authenticated tripartite key agreement protocols which make use of Weil pairing. In this paper, we show...

Kyungah Shim

2003-01-01T23:59:59.000Z

351

0001 1-5 KEY VISUAL CUES: man, clutter, headphone 0001 ...  

Science Conference Proceedings (OSTI)

... 0290 1-5 KEY VISUAL CUES: Rudy Giuliani, giant head, Yankee Stadium, pennant 0290 QUERY: Find the video with Rudy Giuliani's giant talking ...

2011-01-06T23:59:59.000Z

352

Growing Green As part of its strategic plan to foster growth and development in key  

E-Print Network (OSTI)

in geomicrobiology, ecosystem health, nuclear waste technology and reactor safety, environmental science and ecology reconstruction, nuclear waste containment and disposal, and photochemical deconstruction of pollutants Key

Christensen, Dan

353

The Outlook for Electricity Supply and Demand to 2035: Key Drivers  

U.S. Energy Information Administration (EIA)

U.S. Energy Information Administration Independent Statistics & Analysis www.eia.gov The Outlook for Electricity Supply and Demand to 2035: Key Drivers

354

Improved practical decoy state method in quantum key distribution with parametric down conversion source  

E-Print Network (OSTI)

In this paper, a new decoy-state scheme for quantum key distribution with parametric down-conversion source is proposed. We use both three-intensity decoy states and their triggered and nontriggered components to estimate the fraction of single-photon counts and quantum bit-error rate of single-photon, and then deduce a more accurate value of key generation rate. The final key rate over transmission distance is simulated, which shows that we can obtain a higher key rate than that of the existing methods, including our own earlier work.

Qin Wang; Xiang-Bin Wang; Gunnar Bjork; Anders Karlsson

2007-03-27T23:59:59.000Z

355

0500 1-5 KEY VISUAL CUES: laptop, young man, swivel chair ...  

Science Conference Proceedings (OSTI)

... light, gold ring 0512 QUERY: Find a video by Stone Farm showing a ... 0514 1-5 KEY VISUAL CUES: sailboat anchored in the wind and waves, water ...

2012-01-11T23:59:59.000Z

356

TransForum v7n1 - Diversity of Choices: Key to Improving Transportatio...  

NLE Websites -- All DOE Office Websites (Extended Search)

Diversity of Choices: Key to Improving Transportation Energy Efficiency Argonne's Mobile Automotive Technology Testbed Argonne's Mobile Automotive Technology Testbed can be...

357

Modeling Metal Fatigue As a Key Step in PV Module Life Time Prediction (Presentation)  

DOE Green Energy (OSTI)

This presentation covers modeling metal fatigue as a key step in photovoltaic (PV) module lifetime predictions. Described are time-dependent and time-independent case studies.

Bosco, N.

2012-02-01T23:59:59.000Z

358

Security of high-dimensional quantum key distribution protocols using Franson interferometers  

E-Print Network (OSTI)

Franson interferometers are increasingly being proposed as a means of securing high-dimensional energy-time entanglement-based quantum key distribution (QKD) systems. Heuristic arguments have been proposed that purport to demonstrate the security of these schemes. We show, however, that such systems are vulnerable to attacks that localize the photons to several temporally separate locations. This demonstrates that a single pair of Franson interferometers is not a practical approach to securing high-dimensional energy-time entanglement based QKD. This observations leads us to investigate the security of modified Franson-based-protocols, where Alice and Bob have two or more Franson interferometers. We show that such setups can improve the sensitivity against attacks that localize the photons to multiple temporal locations. While our results do not constituting a full security proof, they do show that a single pair of Franson interferometers is not secure and that multiple such interferometers could be a promising candidate for experimentally realizable high-dimensional QKD.

Thomas Brougham; Stephen M. Barnett; Kevin T. McCusker; Paul G. Kwiat; Daniel J. Gauthier

2013-05-20T23:59:59.000Z

359

Atmospheric Carbon Dioxide and the Global Carbon Cycle: The Key Uncertainties  

DOE R&D Accomplishments (OSTI)

The biogeochemical cycling of carbon between its sources and sinks determines the rate of increase in atmospheric CO{sub 2} concentrations. The observed increase in atmospheric CO{sub 2} content is less than the estimated release from fossil fuel consumption and deforestation. This discrepancy can be explained by interactions between the atmosphere and other global carbon reservoirs such as the oceans, and the terrestrial biosphere including soils. Undoubtedly, the oceans have been the most important sinks for CO{sub 2} produced by man. But, the physical, chemical, and biological processes of oceans are complex and, therefore, credible estimates of CO{sub 2} uptake can probably only come from mathematical models. Unfortunately, one- and two-dimensional ocean models do not allow for enough CO{sub 2} uptake to accurately account for known releases. Thus, they produce higher concentrations of atmospheric CO{sub 2} than was historically the case. More complex three-dimensional models, while currently being developed, may make better use of existing tracer data than do one- and two-dimensional models and will also incorporate climate feedback effects to provide a more realistic view of ocean dynamics and CO{sub 2} fluxes. The instability of current models to estimate accurately oceanic uptake of CO{sub 2} creates one of the key uncertainties in predictions of atmospheric CO{sub 2} increases and climate responses over the next 100 to 200 years.

Peng, T. H.; Post, W. M.; DeAngelis, D. L.; Dale, V. H.; Farrell, M. P.

1987-12-00T23:59:59.000Z

360

Observation Wells | Open Energy Information  

Open Energy Info (EERE)

Observation Wells Observation Wells Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Technique: Observation Wells Details Activities (7) Areas (7) Regions (0) NEPA(15) Exploration Technique Information Exploration Group: Drilling Techniques Exploration Sub Group: Development Drilling Parent Exploration Technique: Development Drilling Information Provided by Technique Lithology: Stratigraphic/Structural: Hydrological: Total dissolved solids, fluid pressure, flow rates, and flow direction Thermal: Monitors temperature of circulating fluids Dictionary.png Observation Wells: An observation well is used to monitor important hydrologic parameters in a geothermal system that can indicate performance, longevity, and transient processes. Other definitions:Wikipedia Reegle

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

State observer for synchronous motors  

DOE Patents (OSTI)

A state observer driven by measurements of phase voltages and currents for estimating the angular orientation of a rotor of a synchronous motor such as a variable reluctance motor (VRM). Phase voltages and currents are detected and serve as inputs to a state observer. The state observer includes a mathematical model of the electromechanical operation of the synchronous motor. The characteristics of the state observer are selected so that the observer estimates converge to the actual rotor angular orientation and velocity, winding phase flux linkages or currents.

Lang, Jeffrey H. (Waltham, MA)

1994-03-22T23:59:59.000Z

362

Population Status and Evaluation of Landscape Change for the Lower Keys Marsh Rabbit  

E-Print Network (OSTI)

Wildlife biologists and land managers tasked with the recovery of the endangered Lower Keys marsh rabbit (LKMR; Sylvilagus palustris hefneri) were in need of a current population estimate as well as a method to estimate the LKMR population annually. Habitat loss and fragmentation from population growth and development have threatened the existence of the LKMR. Establishing and understanding long-term habitat availability for the LKMR is important for determining causes of historical population declines as well as designing and implementing successful recovery plans. I conducted a range-wide pellet survey and a mark-recapture study to estimate the LKMR population. I evaluated the fit of 5 models and considered the variation in behavioral response model the best model. I correlated (r2 = 0.913) this model's rabbit abundance estimates to pellet density in 11 patches and generated a range-wide population estimate of 317, a western clade population of 257, an eastern clade population of 25, and translocated LKMR populations of 35 and 0 on Little Pine and Water keys, respectively. This prediction equation provides managers a quick, efficient, and non-invasive method to estimate LKMR abundance from pellet counts. To quantify the amount of habitat loss and fragmentation that occurred over the last 50 years, I systematically delineated and compared potential LKMR habitat using 1959 and 2006 aerial photographs. Additionally, I investigated if other factors could have reduced the amount of suitable habitat available for the LKMR with a comparison of habitat loss and fragmentation on a developed island and an undeveloped island. Range-wide, I found that number of habitat patches increased by 38, total class area decreased by 49.0%, and mean patch size decreased by 44.3%. Mean shape index increased by 4.2% and mean proximity index decreased by 13%. Both the 1959 and 2006 connectance indices were low while the 2006 set decreased 12.1%. I observed the same patterns of habitat loss and fragmentation on both the developed and undeveloped islands as I did in the range-wide landscape analysis. I found that LKMR habitat has declined in area and become more fragmented over the last 50 years. Habitat loss and fragmentation by development have directly endangered the LKMR; however, sea level rise and woody encroachment also could have historically caused habitat loss and fragmentation. Although development in LKMR habitat was halted, sea-level rise and woody encroachment could continue to alter LKMR habitat.

Schmidt, Jason Alan

2009-12-01T23:59:59.000Z

363

ARM - Mobile Aerosol Observing System  

NLE Websites -- All DOE Office Websites (Extended Search)

FacilitiesMobile Aerosol Observing System FacilitiesMobile Aerosol Observing System AMF Information Science Architecture Baseline Instruments AMF1 AMF2 AMF3 Data Operations AMF Fact Sheet Images Contacts AMF Deployments Hyytiälä, Finland, 2014 Manacapuru, Brazil, 2014 Oliktok Point, Alaska, 2013 Los Angeles, California, to Honolulu, Hawaii, 2012 Cape Cod, Massachusetts, 2012 Gan Island, Maldives, 2011 Ganges Valley, India, 2011 Steamboat Springs, Colorado, 2010 Graciosa Island, Azores, 2009-2010 Shouxian, China, 2008 Black Forest, Germany, 2007 Niamey, Niger, 2006 Point Reyes, California, 2005 Mobile Aerosol Observing System Intensive aerosol observations conducted on the campus of Brookhaven National Laboratory on Long Island, New York, using the ARM Mobile Aerosol Observing System. Intensive aerosol observations conducted on the campus of Brookhaven

364

On the (Im)Possibility of Key Dependent Encryption Iftach Haitner  

E-Print Network (OSTI)

, queries h(k ), encrypt this with k itself, and gives the resulting ciphertext to Breaker. We prove for every key. In this case, Breaker finds a key k such that fk,r (h(k)) = c, where f is the pseudorandom given by Halevi and Krawczyk [HK07]), is that Breaker as defined above does not seem to give useful

International Association for Cryptologic Research (IACR)

365

Common randomness and secret key capacities of two-way channels  

Science Conference Proceedings (OSTI)

Common Randomness Generation (CRG) and Secret Key Establishment (SKE) are fundamental primitives in information theory and cryptography. We study these two problems over the two-way communication channel model, introduced by Shannon. In this model, the ... Keywords: common randomness capacity, secret key capacity, two-way channel, wiretap channel

Hadi Ahmadi; Reihaneh Safavi-Naini

2011-05-01T23:59:59.000Z

366

Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol  

E-Print Network (OSTI)

In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this paper, we show that by assigning different transmission probability to each transmitted qubit within a single polarization basis, we can generally improve the key generation rate of the BB84 protocol and achieve a higher key rate.

Sonny Lumbantoruan; Ryutaroh Matsumoto; Tomohiko Uyematsu

2010-03-11T23:59:59.000Z

367

Identity-based encryption: how to decrypt multiple ciphertexts using a single decryption key  

Science Conference Proceedings (OSTI)

The beauty of identity-based encryption (IBE) lies in the convenience of public key handling, in the sense that any identification such as an email address, a name, or an IP number can serve as a public key of a party. However, such convenience is not ... Keywords: ID-based encryption, pairing

Fuchun Guo; Yi Mu; Zhide Chen

2007-07-01T23:59:59.000Z

368

Key distribution and update for secure inter-group multicast communication  

Science Conference Proceedings (OSTI)

Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both intra and inter group multicast traffic must be protected by secret keys. ... Keywords: inter-group communication, key distribution and update, security

Weichao Wang; Bharat Bhargava

2005-11-01T23:59:59.000Z

369

Feasibility study of free-space quantum key distribution in the mid-infrared  

Science Conference Proceedings (OSTI)

We report on a feasibility study of a free-space Quantum Key Distribution setup operatingat a mid-infrared wavelength. Alice sends polarization-coded pseudo-single photonsfrom a Quantum Cascade Laser at 4.6 m to Bob, who uses a nonlinear crystal ... Keywords: free-space optics, frequency up-conversion, mid-infrared, quantum key distribution

Guilherme Temporao; Hugo Zibinden; Sebastien Tanzilli; Nicolas Gisin; Thierry Aellen; Marcella Giovannini; Jerome Faist; Jean von der Weid

2008-01-01T23:59:59.000Z

370

A Coarse to Fine Facial Key Landmark Points Locating Algorithm Based on Active Shape Model  

Science Conference Proceedings (OSTI)

In this paper, we proposed an improved coarse to fine improved algorithm to enhance the accuracy of facial key landmark points locating. Based on the analysis of PCA, the proposed algorithm redesigns the parameter update rule through adding a monotonically ... Keywords: ASM, facial key landmarks point locating

Bo Fan; Xiaokang Yang; Xi Zhou; Weiyao Lin; Changjian Chen

2012-12-01T23:59:59.000Z

371

SkimpyStash: RAM space skimpy key-value store on flash-based storage  

Science Conference Proceedings (OSTI)

We present SkimpyStash, a RAM space skimpy key-value store on flash-based storage, designed for high throughput, low latency server applications. The distinguishing feature of SkimpyStash is the design goal of extremely low RAM footprint at about 1 ( ... Keywords: flash memory, indexing, key-value store, log-structured index., ram space efficient index

Biplob Debnath; Sudipta Sengupta; Jin Li

2011-06-01T23:59:59.000Z

372

A brief history of provably-secure public-key encryption  

Science Conference Proceedings (OSTI)

Public-key encryption schemes are a useful and interesting field of cryptographic study. The ultimate goal for the cryptographer in the field of public-key encryption would be the production of a very efficient encryption scheme with a proof of security ...

Alexander W. Dent

2008-06-01T23:59:59.000Z

373

Cornman's definition of observation terms  

Science Conference Proceedings (OSTI)

reconcile what is described in mentalistic terms with materialism. ... It is clearly important that the observation terms should not include terms which are...

374

CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS June 1, 2010 - 12:00pm Addthis CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS Aiken, SC - Construction of a key cleanup facility at the Savannah River Site (SRS) is gaining some serious ground given the remarkable building progress since Fall 2009. Construction and operation of the Salt Waste Processing Facility (SWPF) is among the U.S. Department of Energy's (DOE) highest cleanup priorities. When operational, SWPF will treat millions of gallons of salt waste currently stored in 49 underground tanks at SRS by removing radioactive constituents for vitrification at the nearby Defense Waste Processing Facility. Disposition of the salt waste inventory is a

375

CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS June 1, 2010 - 12:00pm Addthis CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS Aiken, SC - Construction of a key cleanup facility at the Savannah River Site (SRS) is gaining some serious ground given the remarkable building progress since Fall 2009. Construction and operation of the Salt Waste Processing Facility (SWPF) is among the U.S. Department of Energy's (DOE) highest cleanup priorities. When operational, SWPF will treat millions of gallons of salt waste currently stored in 49 underground tanks at SRS by removing radioactive constituents for vitrification at the nearby Defense Waste Processing Facility. Disposition of the salt waste inventory is a

376

LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline | Open Energy  

Open Energy Info (EERE)

LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport

377

LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Create a Baseline) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

378

LEDSGP/Transportation Toolkit/Key Actions/Prioritize and Plan | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Prioritize and Plan < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Prioritize and Plan) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

379

LEDSGP/Transportation Toolkit/Key Actions/Implement and Monitor | Open  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Implement and Monitor < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Implement and Monitor) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

380

LEDSGP/Transportation Toolkit/Key Actions/Evaluate the System | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Evaluate the System < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Evaluate the System) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Moored Observations of Precipitation Temperature  

Science Conference Proceedings (OSTI)

Direct observations of precipitation temperature were made from a surface buoy deployed for four months in the western Pacific warm pool. The observed rain droplet temperatures are equal to the wet-bulb temperature to within the measured wet-bulb ...

Steven P. Anderson; Alan Hinton; Robert A. Weller

1998-08-01T23:59:59.000Z

382

KEY THEMES  

Science Conference Proceedings (OSTI)

... For senior leaders, the MAP database provides preprogrammed analyses, which include ... Team or the Chief Innovation Officer (CIO) and Channel ...

2012-10-10T23:59:59.000Z

383

KEY THEMES  

Science Conference Proceedings (OSTI)

... may find it difficult to evaluate the effectiveness of the organization's workforce engagement and environmental management processes and ...

2012-09-09T23:59:59.000Z

384

Key Outcomes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

curriculum development, course design and multi-media strategy. Initiate a tribal energy development issues and strategies matrix, which ICEIWG will iterate, pull data from...

385

Direct observation of a magnetic Bose glass  

Science Conference Proceedings (OSTI)

A Bose glass is a novel state of matter that emerges in systems of interacting bosons in the presence of quenched disorder. At sufficiently low temperatures, disorder-free bosons are subject to so-called Bose-Einstein condensation (BEC). BEC can involve atoms in liquid 4He, laser-cooled ions in magnetic traps,2 Cooper pairs in superconductors, or magnons in magnetic systems. Due to peculiarities of Bose statistics, particles lose their individuality and occupy a unique quantum-mechanical state. The wave function of this condensate establishes long-range quantum phase coherence across a macroscopic sample. This, in turn, spawns unique quantum phenomena such as superfluity,5 Josephson effect6 and vortex matter. For repulsive bosons, quenched disorder disrupts the condensate and interferes with phase coherence. The result is a peculiar glassy state with only short-range phase correlations. While some experimental evidence of this was found in ultracold atoms,9 novel high-temperature superconductors,10 and quantum magnets,11, 12 none of the studies were direct. The key characteristic, namely the wave function of the condensate disrupted by disorder on the microscopic scale, remained inaccessible. Hereby we report a direct neutron diffraction observation of short range correlations of the BEC order parameter in a magnetic Bose glass. This phase is realized in the quantum spin ladder compound IPA-Cu(Cl0.96Br0.04)3, where disorder is induced by random chemical substitution.

Hong, Tao [ORNL; Zheludev, Andrey I [ORNL; Manaka, H. [Kagoshima University, Kagoshima JAPAN; Regnault, L.-P. [CEA, Grenoble, France

2010-01-01T23:59:59.000Z

386

Quantum key distribution over 25 km with an all-fiber continuous-variable system  

E-Print Network (OSTI)

We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient LDPC error correcting codes.

Jerome Lodewyck; Matthieu Bloch; Raul Garcia-Patron; Simon Fossier; Evgueni Karpov; Eleni Diamanti; Thierry Debuisschert; Nicolas J. Cerf; Rosa Tualle-Brouri; Steven W. McLaughlin; Philippe Grangier

2007-06-28T23:59:59.000Z

387

Climate Action Planning: A Review of Best Practices, Key Elements, and  

Open Energy Info (EERE)

Planning: A Review of Best Practices, Key Elements, and Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to: navigation, search Name Climate Action Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Agency/Company /Organization Eastern Research Group Inc. Partner U.S. Environmental Protection Agency Sector Energy Focus Area Greenhouse Gas Phase Bring the Right People Together, Determine Baseline, Evaluate Options, Develop Goals, Prepare a Plan, Get Feedback, Create Early Successes Resource Type Lessons learned/best practices Availability Publicly available; free

388

Doppler Radar Observations of Mammatus  

Science Conference Proceedings (OSTI)

Observations of mammatus-like cloud features associated with a convective rain shower were obtained using a vertically pointing 8-mm-wavelength Doppler radar. The radar's excellent sensitivity and resolution allowed even very weak, finescale ...

Brooks E. Martner

1995-10-01T23:59:59.000Z

389

ARM - Field Campaign - Biomass Burning Observation Project - BBOP  

NLE Websites -- All DOE Office Websites (Extended Search)

govCampaignsBiomass Burning Observation Project - BBOP govCampaignsBiomass Burning Observation Project - BBOP Campaign Links BNL BBOP Website ARM Aerial Facility Payload Science Plan Comments? We would love to hear from you! Send us a note below or call us at 1-888-ARM-DATA. Send Campaign : Biomass Burning Observation Project - BBOP 2013.07.01 - 2013.10.24 Website : http://campaign.arm.gov/bbop/ Lead Scientist : Larry Kleinman For data sets, see below. Description This field campaign will address multiple uncertainties in aerosol intensive properties, which are poorly represented in climate models, by means of aircraft measurements in biomass burning plumes. Key topics to be investigated are: Aerosol mixing state and morphology Mass absorption coefficients (MACs) Chemical composition of non-refractory material associated with

390

LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative Scenarios |  

Open Energy Info (EERE)

Develop Alternative Scenarios Develop Alternative Scenarios < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Develop Alternative Scenarios) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport

391

LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative Scenarios |  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative Scenarios < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other

392

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

393

LEDSGP/Transportation Toolkit/Key Actions/Assess Opportunities | Open  

Open Energy Info (EERE)

Assess Opportunities Assess Opportunities < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Assess Opportunities) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport

394

Turbulence may be key to "fast magnetic reconnection" mystery  

NLE Websites -- All DOE Office Websites (Extended Search)

Turbulence may be key to "fast magnetic reconnection" mystery Turbulence may be key to "fast magnetic reconnection" mystery Turbulence may be key to "fast magnetic reconnection" mystery The new research could lead to better understanding of solar flares and ejections of material from the Sun's corona. July 11, 2013 Electric current intensity from a high-resolution simulation of a turbulent plasma Electric current intensity from a high-resolution simulation of a turbulent plasma. The phenomenon of "fast magnetic reconnection" of the plasmas has puzzled physicists for decades, because it violates Alfven's Theorem with striking manifestations, such as solar flares and coronal mass ejection. A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all

395

Could Solar Energy Storage be Key for Residential Solar? | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? October 26, 2010 - 4:52pm Addthis This is the silent power storage device the Sacramento Municipal Utility District intends to install in residential homes as part of its distributed solar power storage study. | Photo Courtesy of the Sacramento Municipal Utility District This is the silent power storage device the Sacramento Municipal Utility District intends to install in residential homes as part of its distributed solar power storage study. | Photo Courtesy of the Sacramento Municipal Utility District Lorelei Laird Writer, Energy Empowers What are the key facts? SolarSmart Homes storage pilot project gearing up in Sacramento. Pilot project is funded by a $4.3 million Recovery Act grant.

396

Geek-Up[6.10.2011]: Thermoelectrics' Great Power, Key Ingredient in Bone's  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10.2011]: Thermoelectrics' Great Power, Key Ingredient in 10.2011]: Thermoelectrics' Great Power, Key Ingredient in Bone's Nanostructure Geek-Up[6.10.2011]: Thermoelectrics' Great Power, Key Ingredient in Bone's Nanostructure June 10, 2011 - 5:07pm Addthis Data image on lead telluride thermal conductivity | Photo Courtesy of Oak Ridge National Laboratory Data image on lead telluride thermal conductivity | Photo Courtesy of Oak Ridge National Laboratory Niketa Kumar Niketa Kumar Public Affairs Specialist, Office of Public Affairs What does this mean for me? Identifying a key ingredient in bone's nanostructure may help treat and prevent bone diseases such as osteoporosis and develop new light-weight, high-strength materials for innovative technologies. Advanced thermoelectric materials could be used to develop vehicle

397

Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Booklet, DOE Subject Area Indicators and Key Word List for RD and Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 October 2005 The purpose of this booklet is to assist individuals of Government agencies who generate or review classified documents to recognize the presence of nuclear information that is potentially classified as Restricted Data (RD) or Formerly Restricted Data (FRD). This book is particularly helpful to document reviewers conducting declassification reviews pursuant to Executive orders. Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 More Documents & Publications Brochure, Classification Overview of RD and FRD - September 2010 Briefing, Restricted Data Classifiers - March 2013

398

LEDSGP/Transportation Toolkit/Key Actions/Assess Opportunities | Open  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Assess Opportunities < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other

399

Fossil Energy Announces Addition of Two Key Staff Members | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fossil Energy Announces Addition of Two Key Staff Members Fossil Energy Announces Addition of Two Key Staff Members Fossil Energy Announces Addition of Two Key Staff Members August 27, 2013 - 1:30pm Addthis Washington, D.C. - The Department of Energy's Office of Fossil Energy today announced the recent appointment of two key senior staff members to the Office of Fossil Energy - Julio Friedmann, Deputy Assistant Secretary for Clean Coal, and Paula Gant, Deputy Assistant Secretary for Oil and Natural Gas. "The Energy Department is fortunate to have attracted such qualified people with relevant industry and technical experience," said Christopher Smith, Acting Assistant Secretary for Fossil Energy. "Their expertise and experience make them the right people in the right jobs, and I'm proud to have them as part of our Fossil Energy team."

400

Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Booklet, DOE Subject Area Indicators and Key Word List for RD and Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 October 2005 The purpose of this booklet is to assist individuals of Government agencies who generate or review classified documents to recognize the presence of nuclear information that is potentially classified as Restricted Data (RD) or Formerly Restricted Data (FRD). This book is particularly helpful to document reviewers conducting declassification reviews pursuant to Executive orders. Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 More Documents & Publications Brochure, Classification Overview of RD and FRD - September 2010 Briefing, Restricted Data Classifiers - March 2013

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Turbulence may be key to "fast magnetic reconnection" mystery  

NLE Websites -- All DOE Office Websites (Extended Search)

Turbulence may be key to "fast magnetic reconnection" mystery Turbulence may be key to "fast magnetic reconnection" mystery Turbulence may be key to "fast magnetic reconnection" mystery The new research could lead to better understanding of solar flares and ejections of material from the Sun's corona. July 11, 2013 Electric current intensity from a high-resolution simulation of a turbulent plasma Electric current intensity from a high-resolution simulation of a turbulent plasma. The phenomenon of "fast magnetic reconnection" of the plasmas has puzzled physicists for decades, because it violates Alfven's Theorem with striking manifestations, such as solar flares and coronal mass ejection. A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all

402

On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols  

Science Conference Proceedings (OSTI)

No quantum key distribution (QKD) protocol has been proved fully secure. A remaining problem is the eavesdropper's ability to make coherent measurements on the joint properties of large composite systems. This problem has been recently solved by Yao ...

Dominic Mayers

1995-08-01T23:59:59.000Z

403

Rain Gauge and Disdrometer Measurements during the Keys Area Microphysics Project (KAMP)  

Science Conference Proceedings (OSTI)

Four impact disdrometers and 27 tipping bucket rain gauges were operated at 11 different sites during August and September 2001, as part of the Keys Area Microphysics Project. The rain gauge and disdrometer network was designed to study the range ...

Ali Tokay; David B. Wolff; Katherine R. Wolff; Paul Bashor

2003-11-01T23:59:59.000Z

404

Cryptographic security of the quantum key distribution from the triangle inequality  

E-Print Network (OSTI)

We show that the Csiszar-Korner sufficient condition for secure cryptographic key generation with the help of quantum theory can be easily derived using the triangle inequality for an information-theoretic distance.

Pawel Kurzynski; Marcin Markiewicz; Dagomir Kaszlikowski

2013-12-18T23:59:59.000Z

405

Chemistry 208--Spring 2012 Problem Set 6 Professor K. N. Raymond Answer Key  

E-Print Network (OSTI)

facilities help answer key, early ques- tions about the promise of technology options. Image credit: NASA #12; electrical power technologies such as batter- ies or fuel cells to reduce the amount of fuel needed. Green

406

May 19, 2011, HSS/Union Focus Group Meeting - Key Milestone Status...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HSS Directives Reform - Key Milestone Status Chart (June 15, 2011) 100 60 80 Directives 40 HSS D 0 20 1- Mar -10 1- Apr- 10 1- May -10 1- Jun -10 1- Jul- 10 1- Aug -10 1- Sep...

407

GE, Berkeley Lab-EETD Explore Possible Key to Energy Storage...  

NLE Websites -- All DOE Office Websites (Extended Search)

GE, Berkeley Lab-EETD Explore Possible Key to Energy Storage for Electric Vehicles August 2013 From a General Electric press release: It's a little more complex than making instant...

408

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agent Discloses Node Secret Encryption Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5...

409

0891 1-5 KEY VISUAL CUES: geysers, bus, flags 0891 ...  

Science Conference Proceedings (OSTI)

... 0913 1-5 KEY VISUAL CUES: web address of www.avezpasa.co.yu, older man with jacket, old woman in black with scarf, dog 0913 QUERY: Find ...

2013-01-23T23:59:59.000Z

410

Lab plays key role in Richard Tapia Diversity in Computing Conference  

NLE Websites -- All DOE Office Websites (Extended Search)

22713conf 02272013 Lab plays key role in Richard Tapia Diversity in Computing Conference Donald B Johnston, LLNL, (925) 423-4902, johnston19@llnl.gov Printer-friendly Elizabeth...

411

Potential for Producing Hydrogen from Key Renewable Resources in the United States  

DOE Green Energy (OSTI)

This study estimates the potential for hydrogen production from key renewable resources (onshore wind, solar photovoltaic, and biomass) by county in the United States. It includes maps that allow the reader to easily visualize the results.

Milbrandt, A.; Mann, M.

2006-02-01T23:59:59.000Z

412

Fossil Energy Announces Addition of Three Key Staff Members | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Announces Addition of Three Key Staff Members Energy Announces Addition of Three Key Staff Members Fossil Energy Announces Addition of Three Key Staff Members November 16, 2009 - 12:00pm Addthis Washington, D.C. - The Department of Energy today announced the recent appointment of three key senior staff members to the Office of Fossil Energy - James F. Wood, Deputy Assistant Secretary for Clean Coal; Christopher A. Smith, Deputy Assistant Secretary for Oil and Natural Gas; and Michelle Dallafior, Senior Policy Advisor to the Assistant Secretary. "The Energy Department is fortunate to have attracted such qualified people with relevant industry and Capitol Hill experience," said Dr. James Markowsky, Assistant Secretary for Fossil Energy. "Their familiarity with fossil energy issues makes them the right people in the right jobs, and I'm

413

TEC Working Group Topic Groups Section 180(c) Key Documents | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Section 180(c) Key Documents Section 180(c) Key Documents TEC Working Group Topic Groups Section 180(c) Key Documents Key Documents Briefing Package for Section 180(c) Implementation - July 2005 Executive Summary Introduction Appendix A - Funding Distribution Method Appendix B - Timing and Eligibility Appendix C - Allowable Activities/Training Appendix D - Definitions Appendix E - Pass-Through of Funds Appendix F - Contingency Re-Routing Appendix G - Policy on Rulemaking Appendix H - Funding Allocation Method Appendix I - State Fees Appendix J - Funding Operational Activities Appendix K - Matching Funds More Documents & Publications Implementation of Section 180(c) of the Nuclear Waste Policy Act TEC Working Group Topic Groups Section 180(c) Meeting Summaries TEC Working Group Topic Groups Tribal

414

Impact of key design parameters on neutron wall load in an ignited tokamak  

SciTech Connect

A study was performed to determine the impact of key design parameters on neutron wall load in an ignited deuterium-tritium (D-T) tokamak. Systems effects of parameter variations were determined using the Fusion Engineering Design Center (FEDC) Systems Code. Poloidal variations in neutron wall load were determined using the Monte Carlo Code for Neutron and Photon Transport (MCNP). The marked impact of key design parameters is quantitatively shown.

Reiersen, W.T.

1983-01-01T23:59:59.000Z

415

Security of differential phase shift quantum key distribution against individual attacks  

E-Print Network (OSTI)

We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

2005-08-15T23:59:59.000Z

416

Security bound of continuous-variable quantum key distribution with noisy coherent states and channel  

E-Print Network (OSTI)

Security of a continuous-variable quantum key distribution protocol based on noisy coherent states and channel is analyzed. Assuming the noise of coherent states is induced by Fred, a neutral party relative to others, we prove that the prepare and measurement scheme and entanglement-based scheme are equivalent. Then, we show that this protocol is secure against Gaussian collective attacks even if the channel is lossy and noisy, and further, a lower bound to the secure key rate is derived.

Yong Shen; Jian Yang; Hong Guo

2009-04-08T23:59:59.000Z

417

A Study of Channel Estimation and Postprocessing in Quantum Key Distribution Protocols  

E-Print Network (OSTI)

This thesis investigate the channel estimation and the postprocessing of the quantum key distribution protocols. In particular, we propose a new channel estimation procedure, in which we utilize the bit sequences transmitted and received by different bases, and a new postprocessing with two-way classical communication. Then, we show that the key generation rates of the QKD protocols with our channel estimation and/or our postprocessing are higher than those with conventional ones.

Shun Watanabe

2009-04-13T23:59:59.000Z

418

Generating Electricity with your Steam System: Keys to Long Term Savings  

E-Print Network (OSTI)

The application of combined heat and power principals to existing plant steam systems can help produce electricity at more than twice efficiency of grid generated electricity. In this way, steam plant managers can realize substantial savings with relatively quick payback of capital. Carefully planned and executed projects are the key to unlocking the maximum value of generating electricity from an existing steam system. This paper illustrates the key concepts of generating onsite power with backpressure steam turbine generators along with practical considerations.

Bullock, B.; Downing, A.

2010-01-01T23:59:59.000Z

419

ARM - Surface Aerosol Observing System  

NLE Websites -- All DOE Office Websites (Extended Search)

FacilitiesSurface Aerosol Observing System FacilitiesSurface Aerosol Observing System AMF Information Science Architecture Baseline Instruments AMF1 AMF2 AMF3 Data Operations AMF Fact Sheet Images Contacts AMF Deployments Hyytiälä, Finland, 2014 Manacapuru, Brazil, 2014 Oliktok Point, Alaska, 2013 Los Angeles, California, to Honolulu, Hawaii, 2012 Cape Cod, Massachusetts, 2012 Gan Island, Maldives, 2011 Ganges Valley, India, 2011 Steamboat Springs, Colorado, 2010 Graciosa Island, Azores, 2009-2010 Shouxian, China, 2008 Black Forest, Germany, 2007 Niamey, Niger, 2006 Point Reyes, California, 2005 Surface Aerosol Observing System The ARM Mobile Facility (AMF) is equipped to quantify the interaction between clouds and aerosol particles. A counter-flow virtual impactor (CVI) is used to selectively sample cloud drops. The CVI takes advantage of the

420

Biomimetic Cloning of Quantum Observables  

E-Print Network (OSTI)

We propose a bio-inspired sequential quantum protocol for the cloning and preservation of the statistics associated to quantum observables of a given system. It combines the cloning of a set of commuting observables, permitted by the no-cloning and no-broadcasting theorems, with a controllable propagation of the initial state coherences to the subsequent generations. The protocol mimics the scenario in which an individual in an unknown quantum state copies and propagates its quantum information into an environment of blank qubits. Finally, we propose a realistic experimental implementation of this protocol in trapped ions.

U. Alvarez-Rodriguez; M. Sanz; L. Lamata; E. Solano

2013-12-12T23:59:59.000Z

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Traffic observation and situation assessment  

Science Conference Proceedings (OSTI)

Utilization of camera systems for surveillance tasks (e. g. traffic monitoring) has become a standard procedure and has been in use for over 20 years. However, most of the cameras are operated locally and data analyzed manually. Locally means here a ... Keywords: cooperative distributed vision, multi-camera orientation, multi-camera system, multi-target tracking, situation, traffic observation

Ralf Reulke; Dominik Rue; Kristian Manthey; Andreas Luber

2011-06-01T23:59:59.000Z

422

Observation of relativistic antihydrogen atoms  

DOE Green Energy (OSTI)

An observation of relativistic antihydrogen atoms is reported in this dissertation. Experiment 862 at Fermi National Accelerator Laboratory observed antihydrogen atoms produced by the interaction of a circulating beam of high momentum (3 < p < 9 GeV/c) antiprotons and a jet of molecular hydrogen gas. Since the neutral antihydrogen does not bend in the antiproton source magnets, the detectors could be located far from the interaction point on a beamline tangent to the storage ring. The detection of the antihydrogen is accomplished by ionizing the atoms far from the interaction point. The positron is deflected by a magnetic spectrometer and detected, as are the back to back photons resulting from its annihilation. The antiproton travels a distance long enough for its momentum and time of flight to be measured accurately. A statistically significant sample of 101 antihydrogen atoms has been observed. A measurement of the cross section for {bar H}{sup 0} production is outlined within. The cross section corresponds to the process where a high momentum antiproton causes e{sup +} e{sup -} pair creation near a nucleus with the e{sup +} being captured by the antiproton. Antihydrogen is the first atom made exclusively of antimatter to be detected. The observation experiment's results are the first step towards an antihydrogen spectroscopy experiment which would measure the n = 2 Lamb shift and fine structure.

Blanford, Glenn DelFosse

1998-01-01T23:59:59.000Z

423

HERSCHEL OBSERVATIONS OF INTERSTELLAR CHLORONIUM  

Science Conference Proceedings (OSTI)

Using the Herschel Space Observatory's Heterodyne Instrument for the Far-Infrared, we have observed para-chloronium (H{sub 2}Cl{sup +}) toward six sources in the Galaxy. We detected interstellar chloronium absorption in foreground molecular clouds along the sight lines to the bright submillimeter continuum sources Sgr A (+50 km s{sup -1} cloud) and W31C. Both the para-H{sup 35}{sub 2}Cl{sup +} and para-H{sup 37}{sub 2}Cl{sup +} isotopologues were detected, through observations of their 1{sub 11}-0{sub 00} transitions at rest frequencies of 485.42 and 484.23 GHz, respectively. For an assumed ortho-to-para ratio (OPR) of 3, the observed optical depths imply that chloronium accounts for {approx}4%-12% of chlorine nuclei in the gas phase. We detected interstellar chloronium emission from two sources in the Orion Molecular Cloud 1: the Orion Bar photodissociation region and the Orion South condensation. For an assumed OPR of 3 for chloronium, the observed emission line fluxes imply total beam-averaged column densities of {approx}2 Multiplication-Sign 10{sup 13} cm{sup -2} and {approx}1.2 Multiplication-Sign 10{sup 13} cm{sup -2}, respectively, for chloronium in these two sources. We obtained upper limits on the para-H{sup 35}{sub 2}Cl{sup +} line strengths toward H{sub 2} Peak 1 in the Orion Molecular cloud and toward the massive young star AFGL 2591. The chloronium abundances inferred in this study are typically at least a factor {approx}10 larger than the predictions of steady-state theoretical models for the chemistry of interstellar molecules containing chlorine. Several explanations for this discrepancy were investigated, but none has proven satisfactory, and thus the large observed abundances of chloronium remain puzzling.

Neufeld, David A.; Indriolo, Nick [Department of Physics and Astronomy, Johns Hopkins University, 3400 N. Charles St., Baltimore, MD 21218 (United States); Roueff, Evelyne; Le Bourlot, Jacques; Le Petit, Franck [Observatoire de Paris-Meudon, LUTH UMR 8102, 5 Pl. Jules Janssen, F-92195 Meudon Cedex (France); Snell, Ronald L. [Astronomy Department, University of Massachusetts at Amherst, Amherst, MA 01003 (United States); Lis, Dariusz; Monje, Raquel; Phillips, Thomas G. [Astronomy Department, California Institute of Technology, 1200 East California Boulevard, Pasadena, CA 91125 (United States); Benz, Arnold O. [Institute of Astronomy, ETH Zurich, 8092 Zurich (Switzerland); Bruderer, Simon [Max Planck Institut fuer Extraterrestrische Physik, Giessenbachstrasse 1, D-85748, Garching (Germany); Black, John H.; Larsson, Bengt [Department of Earth and Space Sciences, Chalmers University of Technology, Onsala (Sweden); De Luca, Massimo; Gerin, Maryvonne [LERMA, UMR 8112 du CNRS, Observatoire de Paris, Ecole Normale Superieure, UPMC and UCP (France); Goldsmith, Paul F.; Gupta, Harshal [JPL, California Institute of Technology, Pasadena, CA (United States); Melnick, Gary J. [Harvard-Smithsonian Center for Astrophysics, 60 Garden St., Cambridge, MA 02138 (United States); Menten, Karl M. [Max-Planck-Institut fuer Radioastronomie, Auf dem Huegel 69, D-53121 Bonn (Germany); Nagy, Zsofia [Kapteyn Astronomical Institute University of Groningen, Groningen (Netherlands); and others

2012-03-20T23:59:59.000Z

424

Security of high speed quantum key distribution with finite detector dead time  

E-Print Network (OSTI)

The security of a high speed quantum key distribution system with finite detector dead time \\tau is analyzed. When the transmission rate becomes higher than the maximum count rate of the individual detectors (1/\\tau ), security issues affect the algorithm for sifting bits. Analytical calculations and numerical simulations of the Bennett-Brassard BB84 protocol are performed. We study Rogers et al.'s protocol (introduced in "Detector dead-time effects and paralyzability in high-speed quantum key distribution," New J. Phys. 9 (2007) 319) in the presence of an active eavesdropper Eve who has the power to perform an intercept-resend attack. It is shown that Rogers et al.'s protocol is no longer secure. More specifically, Eve can induce a basis-dependent detection efficiency at the receiver's end. Modified key sifting schemes that are secure in the presence of dead time and an active eavesdropper are then introduced. We analyze and compare these secure sifting schemes for this active Eve scenario, and calculate and simulate their key generation rate. It is shown that the maximum key generation rate is 1/(2\\tau ) for passive basis selection, and 1/\\tau for active basis selection. The security analysis for finite detector dead time is also extended to the decoy state BB84 protocol.

Viacheslav Burenkov; Bing Qi; Ben Fortescue; Hoi-Kwong Lo

2010-05-03T23:59:59.000Z

425

Factor Structure in Groups Selected on Observed Scores  

E-Print Network (OSTI)

corresponding to item format ('minor' answer key and 'other' answer key). There are two quantitative factors,into the full sample answer key factors (2 and 3). The five

Muthen, Bengt O.

1989-01-01T23:59:59.000Z

426

Biomass Burning Observation Project Specifically,  

NLE Websites -- All DOE Office Websites (Extended Search)

Burning Observation Project Burning Observation Project Specifically, the aircraft will obtain measurements of the microphysical, chemical, hygroscopic, and optical properties of aerosols. Data captured during BBOP will help scientists better understand how aerosols combine and change at a variety of distances and burn times. Locations Pasco, Washington. From July through September, the G-1 will be based out of its home base in Washington. From this location, it can intercept and measure smoke plumes from naturally occurring uncontrolled fires across Washington, Oregon, Idaho, Northern California, and Western Montana. Smoke plumes aged 0-5 hours are the primary targets for this phase of the campaign. Memphis, Tennessee. In October, the plane moves to Tennessee to sample prescribed

427

Spectra Observed Following Cargo Interrogation  

SciTech Connect

The authors present calculations of photon spectra observed following irradiation of bare HEU, HEU embedded in steel and wood cargos, and steel and wood alone. These spectra might be useful starting points for statistical detection efforts aimed at determining whether fissile material is present in a cargo. Detailed comparisons between calculations and experiments are presented and overall quite good (small {chi}{sup 2}) agreement is found. they do not present a complete solution to the problem of determining whether a given spectrum contains contributions from post-fission photons. However, it is shown that a brute-force fitting of observed spectra in terms of a few calculated ''basis'' spectra gives meaningful predictions about the presence of {sup 235}U in cargo. Though this may not be the most powerful method, it does give well defined confidence limits and seems to have strong predictive power.

Pruet, J; Prussin, S; Descalle, M; Hall, J

2005-11-15T23:59:59.000Z

428

Gamma Ray Pulsars: Multiwavelength Observations  

E-Print Network (OSTI)

High-energy gamma rays are a valuable tool for studying particle acceleration and radiation in the magnetospheres of energetic pulsars. The seven or more pulsars seen by instruments on the Compton Gamma Ray Observatory (CGRO) show that: the light curves usually have double-peak structures (suggesting a broad cone of emission); gamma rays are frequently the dominant component of the radiated power; and all the spectra show evidence of a high-energy turnover. For all the known gamma-ray pulsars, multiwavelength observations and theoretical models based on such observations offer the prospect of gaining a broad understanding of these rotating neutron stars. The Gamma-ray Large Area Space Telescope (GLAST), now in planning for a launch in 2007, will provide a major advance in sensitivity, energy range, and sky coverage.

David J. Thompson

2003-12-10T23:59:59.000Z

429

Spectra Observed Following Cargo Interrogation  

DOE Green Energy (OSTI)

The authors present calculations of photon spectra observed following irradiation of bare HEU, HEU embedded in steel and wood cargos, and steel and wood alone. These spectra might be useful starting points for statistical detection efforts aimed at determining whether fissile material is present in a cargo. Detailed comparisons between calculations and experiments are presented and overall quite good (small {chi}{sup 2}) agreement is found. they do not present a complete solution to the problem of determining whether a given spectrum contains contributions from post-fission photons. However, it is shown that a brute-force fitting of observed spectra in terms of a few calculated ''basis'' spectra gives meaningful predictions about the presence of {sup 235}U in cargo. Though this may not be the most powerful method, it does give well defined confidence limits and seems to have strong predictive power.

Pruet, J; Prussin, S; Descalle, M; Hall, J

2005-11-15T23:59:59.000Z

430

Definition: Observation Wells | Open Energy Information  

Open Energy Info (EERE)

Observation Wells Jump to: navigation, search Dictionary.png Observation Wells An observation well is used to monitor important hydrologic parameters in a geothermal system that...

431

Observation of the Top Quark  

E-Print Network (OSTI)

The D collaboration reports on a search for the Standard Model top quark in pp collisions at p s = 1:8 TeV at the Fermilab Tevatron, with an integrated luminosity of approximately 50 pb \\Gamma1 . We have searched for t t production in the dilepton and single-lepton decay channels, with and without tagging of b-quark jets. We observed 17 events with an expected background of 3:8 \\Sigma 0:6 events. The probability for an upward fluctuation of the background to produce the observed signal is 2 \\Theta 10 \\Gamma6 (equivalent to 4.6 standard deviations). The kinematic properties of the excess events are consistent with top quark decay. We conclude that we have observed the top quark and measure its mass to be 199 +19 \\Gamma21 (stat.) \\Sigma22 (syst.) GeV/c 2 and its production cross section to be 6:4 \\Sigma 2:2 pb. Typeset using REVT E X 3 In the Standard Model (SM), the top quark is the weak isospin partner of the b quark. The D collaboration published a lower limit on the mas...

Abachi Abbott Abolins

1995-01-01T23:59:59.000Z

432

Observation of the Top Quark  

E-Print Network (OSTI)

The D collaboration reports on a search for the Standard Model top quark in pp collisions at p s = 1:8 TeV at the Fermilab Tevatron, with an integrated luminosity of approximately 50 pb \\Gamma1 . We have searched for t t production in the dilepton and single-lepton decay channels, with and without tagging of b-quark jets. We observed 17 events with an expected background of 3:8 \\Sigma 0:6 events. The probability for an upward fluctuation of the background to produce the observed signal is 2 \\Theta 10 \\Gamma6 (equivalent to 4.6 standard deviations). The kinematic properties of the excess events are consistent with top quark decay. We conclude that we have observed the top quark and measure its mass to be 199 +19 \\Gamma21 (stat.) \\Sigma22 (syst.) GeV/c 2 and its production cross section to be 6:4 \\Sigma 2:2 pb. Typeset using REVT E X In the Standard Model (SM), the top quark is the weak isospin partner of the b quark. The D collaboration published a lower limit on the m...

Abachi Abbott

1995-01-01T23:59:59.000Z

433

Observation of Geo-Neutrinos  

E-Print Network (OSTI)

Geo-neutrinos, electron anti-neutrinos produced in beta decays of naturally occurring radioactive isotopes in the Earth, are a unique direct probe of our planet's interior. We report the first observation at more than 3$\\sigma$ C.L. of geo-neutrinos, performed with the Borexino detector at Laboratori Nazionali del Gran Sasso. Anti-neutrinos are detected through the neutron inverse beta decay reaction. With a 252.6 ton-yr fiducial exposure after all selection cuts, we detected 9.9^{+4.1}_{-3.4}(^{+14.6}_{-8.2}) geo-neutrino events, with errors corresponding to a 68.3%(99.73%) C.L. From the $\\ln{\\cal{L}}$ profile, the statistical significance of the Borexino geo-neutrino observation corresponds to a 99.997% C.L. Our measurement of the geo-neutrinos rate is 3.9^{+1.6}_{-1.3}(^{+5.8}_{-3.2}) events/(100ton-yr). This measurement rejects the hypothesis of an active geo-reactor in the Earth's core with a power above 3 TW at 95% C.L. The observed prompt positron spectrum above 2.6 MeV is compatible with that expected from european nuclear reactors (mean base line of approximately 1000 km). Our measurement of reactor anti-neutrinos excludes the non-oscillation hypothesis at 99.60% C.L.

Borexino Collaboration

2010-03-01T23:59:59.000Z

434

Website Provides Data for Key Oil Play in North Dakota, Eastern Montana |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Website Provides Data for Key Oil Play in North Dakota, Eastern Website Provides Data for Key Oil Play in North Dakota, Eastern Montana Website Provides Data for Key Oil Play in North Dakota, Eastern Montana July 19, 2011 - 1:00pm Addthis Washington, DC - A new web-based geographic information system designed to improve oil production in North Dakota and eastern Montana has been launched with support from the U.S. Department of Energy. The Bakken Decision Support System (BDSS) assembles data for the Bakken and Three Forks Formations into an application that enables a user to visualize geologic and oil production information.The online tool, called the Bakken Decision Support System (BDSS), assembles data for the Bakken and Three Forks Formations into an application that enables a user to visualize geologic and oil production information. The system was developed by the

435

LEDSGP/Transportation Toolkit/Key Actions/Implement and Monitor | Open  

Open Energy Info (EERE)

Actions/Implement and Monitor Actions/Implement and Monitor < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport sector, choosing from relevant resources to achieve a comprehensive action

436

NERSC Global Filesystem Played a Key Role in Discovery of the Last Neutrino  

NLE Websites -- All DOE Office Websites (Extended Search)

NGFS Played a Key NGFS Played a Key Role in Neutrino Finding NERSC Global Filesystem Played a Key Role in Discovery of the Last Neutrino Mixing Angle February 7, 2013 | Tags: High Energy Physics (HEP), NERSC Global Filesystems (NGF), Science Gateways John Hules, JAHules@lbl.gov, +1 510 486 6008 XBD201107-00790-183.jpg Daya Bay Neutrino Facility in China. Photo by Roy Kaltschmidt, Lawrence Berkeley National Laboratory. Discovery of the last neutrino mixing angle - one of Science magazine's top ten breakthroughs of the year 2012 - was announced in March 2012, just a few months after the Daya Bay Neutrino Experiment's first detectors went online in southeast China. Collaborating scientists from China, the United States, the Czech Republic, and Russia were thrilled that their experiment was producing more data than expected, and that a positive

437

Effect of Key Parameters on the Photocatalytic Oxidation of Toluene at Low  

NLE Websites -- All DOE Office Websites (Extended Search)

Effect of Key Parameters on the Photocatalytic Oxidation of Toluene at Low Effect of Key Parameters on the Photocatalytic Oxidation of Toluene at Low Concentrations in Air under 254 + 185 nm UV Irradiation Title Effect of Key Parameters on the Photocatalytic Oxidation of Toluene at Low Concentrations in Air under 254 + 185 nm UV Irradiation Publication Type Journal Article Year of Publication 2010 Authors Quici, Natalia, María L. Vera, Hyeok Choi, Gianluca Li Puma, Dionysios D. Dionysiou, Marta I. Litter, and Hugo Destaillats Journal Applied Catalysis B: Environmental Volume 95 Issue 3-4 Pagination 312-319 Date Published 04/2010 Keywords air treatment, environmental chemistry, exposure & risk group, heterogeneous photocatalysis, indoor environment department, indoors, oxidation, photocatalytic, tio2, titania, toluene, uvpco, volatile organic compounds

438

Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy: Critical Infrastructure and Key Resources Sector-Specific Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) In June 2006, the U.S. Department of Homeland Security (DHS) announced completion of the National Infrastructure Protection Plan (NIPP) Base Plan, a comprehensive risk management framework that defines critical infrastructure protection (CIP) roles and responsibilities for all levels of government, private industry, and other security partners. The U.S. Department of Energy (DOE) has been designated the Sector-Specific Agency (SSA) for the Energy Sector,and is tasked with coordinating preparation of

439

Tuesday Webcast for Industry: Key Energy-Saving Projects for Smaller Facilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Energy-Saving Key Energy-Saving Projects for Smaller Facilities January 10, 2012 Program Name or Ancillary Text eere.energy.gov Key Energy-Saving Activities for Small and Medium Sized Facilities Thomas Wenning Oak Ridge National Laboratory Tuesday Webcast for Industry January 10, 2012 3 | Advanced Manufacturing Office eere.energy.gov Percent of Total U.S. Manufacturing Energy Small 5% Mid-Size 37% Large 58% 0 50000 100000 150000 200000 250000 U.S. Manufacturing Plants: By Size Small Plants Mid-Size Plants Large Plants Number of U.S. Plants All Plants 84,298 112,398 4,014 200,710 System-Specific Assessments Crosscutting Assessments Industry Breakdown 4 | Advanced Manufacturing Office eere.energy.gov 4,014 large plants use 58% of the energy Energy Saving

440

SECA Fuel Cell Program Moves Two Key Projects Into Next Phase | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SECA Fuel Cell Program Moves Two Key Projects Into Next Phase SECA Fuel Cell Program Moves Two Key Projects Into Next Phase SECA Fuel Cell Program Moves Two Key Projects Into Next Phase February 5, 2009 - 12:00pm Addthis Washington, D.C. - The U.S. Department of Energy (DOE) has selected two projects for continuation within the Department's Solid State Energy Conversion Alliance (SECA) Program research portfolio. The projects--led by FuelCell Energy, in partnership with VersaPower Systems, and Siemens Energy--have successfully demonstrated solid oxide fuel cells (SOFCs) designed for aggregation and use in coal-fueled central power generation. Further development of these low-cost, near-zero emission fuel cell systems will substantially contribute to solving the Nation's energy security, climate, and water challenges.

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Materials as a Key to Electro-Mobility with Rechargeable LI Batteries  

NLE Websites -- All DOE Office Websites (Extended Search)

Materials as a Key to Electro-Mobility with Rechargeable LI Batteries Materials as a Key to Electro-Mobility with Rechargeable LI Batteries Speaker(s): Martin Winter Date: February 11, 2013 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: Robert Kostecki The lithium ion technology is playing a key role in the electrification of the propulsion system in hybrid electric vehicles (HEVs) and in pure electric vehicles (EVs). The chemist and materials scientists faces this challenge, which derives from the demands for large-scale energy storage and conversion devices for electric propulsion purposes, by development and application of innovative battery components and concepts. The lithium ion battery has been introduced into the market by 1990/1991 and only by the mid 1990ies significant numbers of batteries have been produced. Within a

442

Key Findings from the NBI PIER Project: Optimization of Airside Design  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Findings from the NBI PIER Project: Optimization of Airside Design Key Findings from the NBI PIER Project: Optimization of Airside Design Speaker(s): Mark Hydeman Date: April 29, 2004 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Philip Haves Mark Hydeman, PE, Principal from Taylor Engineering will present key results from the NBI PIER research on built-up VAV systems for which he was the Principal Investigator. These include the potential for supply pressure reset for energy savings and to prevent operation in surge; a new way of modeling fan performance; and an optimized approach for selecting and controlling VAV boxes. The project produced a design guide on air-side VAV systems that is available from the CEC website at http://www.energy.ca.gov/reports/2003-11-17_500-03-082_A-11.PDF a new model for the evaluation of fan system design and controls and a series of

443

Security analysis of the time-coding quantum key distribution protocols  

E-Print Network (OSTI)

We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security analysis of both protocols and find that the secure rates can be similar to those obtained with the BB84 protocol. We then calculate the secure distance for those protocols over standard fibre links. When using low-noise superconducting single photon detectors, secure distances over 200 km can be foreseen. Finally, we analyse the consequences of photon-number splitting attacks when faint pulses are used instead of single photon pulses. A decoy states technique can be used to prevent such attacks.

Thierry Debuisschert; Simon Fossier

2011-08-31T23:59:59.000Z

444

U.S. Department of Energy and NTI Announce Key Nonproliferation Project  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy and NTI Announce Key Nonproliferation U.S. Department of Energy and NTI Announce Key Nonproliferation Project with Kazakhstan U.S. Department of Energy and NTI Announce Key Nonproliferation Project with Kazakhstan September 29, 2006 - 9:01am Addthis Agreement Reached To Downblend HEU and Convert Reactor WASHINGTON, D.C. - The U.S. Department of Energy and the Nuclear Threat Initiative (NTI) today announced that they have reached an important agreement-in-principle with the Government of Kazakhstan to move forward with the down-blending of highly enriched uranium (HEU) currently stored at Kazakhstan's Institute of Nuclear Physics. The agreement also calls for the conversion of the VVR-K research reactor to operate on low enriched uranium fuel instead of HEU, which can be used in nuclear weapons. The

445

Estimates of Duck Breeding Populations in the Nebraska Sandhills Using Double Observer Methodology  

E-Print Network (OSTI)

of breeding duck populations in the Nebraska Sandhills. Aerial transect surveys were conducted using be considered for adjusting duck counts that cannot be corrected using additional aerial or ground surveys. Key words.--Aerial survey, Anas, detection probabilities, double observer, Nebraska, population

Powell, Larkin A.

446

Lightweight key exchange and stream cipher based solely on tree parity machines  

E-Print Network (OSTI)

Secure key exchange is considered most critical and complex in this context and of major importance with regard to security. Regarding applications in embedded systems, asymmetric (public-key) group-based cryptosystems based on Elliptic Curve Cryptography (ECC), the generalization to Hyper-Elliptic Curves (see e.g. [6]) and hardware-specific extensions for efficient arithmetic [7] are stateof-the-art. Without a reduction of the security, these representations allow to reduce the size of the numbers to calculate with. Yet, more complex expressions

Markus Volkmer; Sebastian Wallner

2005-01-01T23:59:59.000Z

447

Key Issues in Designing Mechanisms to Reduce Greenhouse Gas Emissions from Deforestation and Degradation (REDD)  

Science Conference Proceedings (OSTI)

In 2008, EPRI launched the EPRI Greenhouse Gas (GHG) Emissions Offset Policy Dialogue project. The goals of this project are 1) to inform key constituencies involved in the development of U.S. climate mitigation strategies and policies about GHG emissions offsetrelated policies and design issues and 2) to provide a forum in which representatives of key sectors of the U.S. economy and communities involved in the ongoing development and debate on climate change policies can discuss these issues. On May 13...

2009-07-13T23:59:59.000Z

448

Simple and efficient quantum key distribution with parametric down-conversion  

E-Print Network (OSTI)

We propose an efficient quantum key distribution protocol based on the photon-pair generation from parametric down-conversion (PDC). It uses the same experimental setup as the conventional protocol, but a refined data analysis enables detection of photon-number splitting attacks by utilizing information from a built-in decoy state. Assuming the use of practical detectors, we analyze the unconditional security of the new scheme and show that it improves the secure key generation rate by several orders of magnitude at long distances, using a high intensity PDC source.

Yoritoshi Adachi; Takashi Yamamoto; Masato Koashi; Nobuyuki Imoto

2006-10-15T23:59:59.000Z

449

Satellite Microwave Surface Observations in Tropical Cyclones  

Science Conference Proceedings (OSTI)

Sea surface estimates of local winds, waves, and rain-rate conditions are crucial to complement infrared/visible satellite images in estimating the strength of tropical cyclones (TCs). Satellite measurements at microwave frequencies are thus key ...

Yves Quilfen; Bertrand Chapron; Jean Tournadre

2010-02-01T23:59:59.000Z

450

Jet Observables Without Jet Algorithms  

E-Print Network (OSTI)

We introduce a new class of event shapes to characterize the jet-like structure of an event. Like traditional event shapes, our observables are infrared/collinear safe and involve a sum over all hadrons in an event, but like a jet clustering algorithm, they incorporate a jet radius parameter and a transverse momentum cut. Three of the ubiquitous jet-based observables---jet multiplicity, summed scalar transverse momentum, and missing transverse momentum---have event shape counterparts that are closely correlated with their jet-based cousins. Due to their "local" computational structure, these jet-like event shapes could potentially be used for trigger-level event selection at the LHC. Intriguingly, the jet multiplicity event shape typically takes on non-integer values, highlighting the inherent ambiguity in defining jets. By inverting jet multiplicity, we show how to characterize the transverse momentum of the n-th hardest jet without actually finding the constituents of that jet. Since many physics applications do require knowledge about the jet constituents, we also build a hybrid event shape that incorporates (local) jet clustering information. As a straightforward application of our general technique, we derive an event-shape version of jet trimming, allowing event-wide jet grooming without explicit jet identification. Finally, we briefly mention possible applications of our method for jet substructure studies.

Daniele Bertolini; Tucker Chan; Jesse Thaler

2013-10-28T23:59:59.000Z

451

Observation of the Top Quark  

DOE R&D Accomplishments (OSTI)

Top quark production is observed in{bar p}p collisions at{radical}s= 1.8 TeV at the Fermilab Tevatron. The Collider Detector at Fermilab (CDF) and D{O} observe signals consistent with t{bar t} to WWb{bar b}, but inconsistent with the background prediction by 4.8{sigma} (CDF), 4.6a (D{O}). Additional evidence for the top quark Is provided by a peak in the reconstructed mass distribution. The kinematic properties of the excess events are consistent with the top quark decay. They measure the top quark mass to be 176{plus_minus}8(stat.){plus_minus}10(sys.) GeV/c{sup 2} (CDF), 199{sub -21}{sup+19}(stat.){plus_minus}22(sys.) GeV/c{sup 2} (D{O}), and the t{bar t} production cross section to be 6.8{sub -2.4}{sup+3.6}pb (CDF), 6.4{plus_minus}2.2 pb (D{O}).

Kim, S. B.

1995-08-00T23:59:59.000Z

452

Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1  

Science Conference Proceedings (OSTI)

This memo represents a republication of PKCS #1 v2.1 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document is taken directly from the PKCS #1 v2.1 document, ...

J. Jonsson; B. Kaliski

2003-02-01T23:59:59.000Z

453

Key elements for a sensitive 77 K direct current superconducting quantum interference device magnetometer  

E-Print Network (OSTI)

B is the applied field and sq is the flux coupled to the SQUID. Aeff is determined by the design determined by the smaller inductance, but flux linking the pickup loop induces a current which couples fluxKey elements for a sensitive 77 K direct current superconducting quantum interference device

Lee, Luke P.

454

Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry  

E-Print Network (OSTI)

High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate (SKR) with high photon-information efficiency (PIE). We consider HDQKD based on the time-energy entanglement (TEE) produced by spontaneous parametric downconversion (SPDC), and show that it is secure against collective attacks. Its security rests upon visibility data---obtained from Franson and conjugate-Franson interferometers---that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable QKD so that it applies to our HDQKD protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, SKR lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results suggest that TEE-based HDQKD could permit a 650 bit/sec SKR over 200 km transmission distance in optical fiber with a PIE of 1.9 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

2013-11-04T23:59:59.000Z

455

Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives  

E-Print Network (OSTI)

Better Technologies Key to Addressing Climate Change Energy Department official explains U.S emissions and addressing climate change, according to a U.S. Department of Energy (DOE) official speaking of the DOE statement follows: [U.S. Department of Energy] Intervention by the United States Panel

456

Verifying object-oriented programs with KeY: a tutorial  

Science Conference Proceedings (OSTI)

This paper is a tutorial on performing formal specification and semi-automatic verification of Java programs with the formal software development tool KeY. This tutorial aims to fill the gap between elementary introductions using toy examples and state-of-art ...

Wolfgang Ahrendt; Bernhard Beckert; Reiner Hhnle; Philipp Rmmer; Peter H. Schmitt

2006-11-01T23:59:59.000Z

457

Generation and characterization of a source of wavelength division multiplexing quantum key distribution  

E-Print Network (OSTI)

Using spontaneous parametric down-conversion, photon pairs entangled in frequency and polarization were generated. After frequency resolving the photon pairs, the polarization correlations were measured on several polarization basis, and it was confirmed that the frequency resolved photon pairs were entangled in polarization, indicating the photon pairs can be used as a source of wavelength division multiplexing quantum key distribution.

Atsushi Yabushita; Takayoshi Kobayashi

2004-04-05T23:59:59.000Z

458

ROSENSTIEL SCHOOL OF MARINE AND ATMOSPHERIC SCIENCE November 2000University of Miami, Virginia Key Campus  

E-Print Network (OSTI)

ROSENSTIEL SCHOOL OF MARINE AND ATMOSPHERIC SCIENCE November 2000University of Miami, Virginia Key. Maybe it was because everyone had been carbo-loading with pizza and beverage or maybe it was the festive. The University of Miami hosted the 3rd symposium at Coral Gables in 1977. Top row (left to right): Iliana Baums

Miami, University of

459

Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks  

Science Conference Proceedings (OSTI)

A sensor network is a network consisting of small, inexpensive, low-powered sensor nodes that communicate to complete a common task. Sensor nodes are characterized by having limited communication and computation capabilities, energy, and storage. They ... Keywords: cc2420 security, group key distribution, sensor network security

Morten Tranberg Hansen

2009-03-01T23:59:59.000Z

460

Energy Foresight as Support for European Policy Making. Some Key Challenges  

E-Print Network (OSTI)

Energy Foresight as Support for European Policy Making. Some Key Challenges Presentation at the ERA setting, policy making 6. Communication, advocacy #12;Nordic Hydrogen Energy Foresight Some experiences-NET ForSociety Future Dialog on European Energy Futures 27 February 2007, Copenhagen Per Dannemand

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

74 Scientific AmericAn January 2010 Key conceptS  

E-Print Network (OSTI)

74 Scientific AmericAn January 2010 Key conceptS Nuclear bombs dropped on cities and industrial Worry has focused on the U.S. versus Russia, but a regional nuclear war between India and Pakistan could ago international teams of scientists showed that a nuclear war between the U.S. and the Soviet Union

Robock, Alan

462

A new class of Hash-Chain based key pre-distribution schemes for WSN  

Science Conference Proceedings (OSTI)

In the last decade, we witness a proliferation of potential application domains of wireless sensor networks (WSN). Therefore, a host of research works have been conducted by both academic and industrial communities. Nevertheless, given the sensitivity ... Keywords: Key management, Resilience, Security, Wireless sensor networks

Walid Bechkit; Yacine Challal; Abdelmadjid Bouabdallah

2013-02-01T23:59:59.000Z

463

Trapdoor security in a searchable public-key encryption scheme with a designated tester  

Science Conference Proceedings (OSTI)

We study a secure searchable public-key encryption scheme with a designated tester (dPEKS). The contributions of this paper are threefold. First, we enhance the existing security model to incorporate the realistic abilities of dPEKS attackers. Second, ... Keywords: Data security, Designated tester, Keyword search on encrypted data

Hyun Sook Rhee; Jong Hwan Park; Willy Susilo; Dong Hoon Lee

2010-05-01T23:59:59.000Z

464

Determining Key Model Parameters of Rapidly Intensifying Hurricane Guillermo (1997) Using the Ensemble Kalman Filter  

Science Conference Proceedings (OSTI)

In this work the authors determine key model parameters for rapidly intensifying Hurricane Guillermo (1997) using the ensemble Kalman filter (EnKF). The approach is to utilize the EnKF as a tool only to estimate the parameter values of the model ...

Humberto C. Godinez; Jon M. Reisner; Alexandre O. Fierro; Stephen R. Guimond; Jim Kao

2012-11-01T23:59:59.000Z

465

Plant Engineering: Critical Motor Refurbishment and Procurement Checklist - Key Project Phases and Considerations  

Science Conference Proceedings (OSTI)

This report provides guidance for projects involving procurement and refurbishment of motors. These projects are complex and include many steps that are critical for success. Key steps and activities (including oversight) that are required to ensure a successful outcome when procuring or refurbishing motors in accordance with rigid specifications are included in this guidance.

2013-06-19T23:59:59.000Z

466

Proof of Security of a High-Capacity Quantum Key Distribution Protocol  

E-Print Network (OSTI)

We prove the security of a high-capacity quantum key distribution protocol over noisy channels. By using entanglement purification protocol, we construct a modified version of the protocol in which we separate it into two consecutive stages. We prove their securities respectively and hence the security of the whole protocol.

Xiao-Wei Zhang; Kai Wen; Gui Lu Long

2005-12-25T23:59:59.000Z

467

Transaction-based authentication and key agreement protocol for inter-domain VoIP  

Science Conference Proceedings (OSTI)

We present an authentication and key agreement protocol to secure Voice over IP call establishment between interconnection proxies of different domains. The protocol operates on a transaction basis. Each transaction is defined as the set of operations ... Keywords: Authentication, DDoS Protection, Inter-domain VoIP, Synchronisation, VoIP security

Patrick Battistello; Joaquin Garcia-Alfaro; Cyril DelTr

2012-09-01T23:59:59.000Z

468

Waves in the chromosphere: observations  

E-Print Network (OSTI)

I review the literature on observational aspects of waves in the solar chromosphere in the first part of this contribution. High-frequency waves are invoked to build elaborate cool-star chromosphere heating theories but have not been detected decisively so far, neither as magnetic modes in network elements nor as acoustic modes in below-the-canopy internetwork regions. Three-minute upward-propagating acoustic shocks are thoroughly established through numerical simulation as the cause of intermittent bright internetwork grains, but their pistoning and their role in the low-chromosphere energy budget remain in debate. Three-minute wave interaction with magnetic canopies is a newer interest, presently progressing through numerical simulation. Three-minute umbral flashes and running penumbral waves seem a similar acoustic-shock phenomenon awaiting numerical simulation. The low-frequency network Doppler modulation remains enigmatic. In the second part, I address low-frequency ultraviolet brightness variations of t...

Rutten, R J

2010-01-01T23:59:59.000Z

469

Aerosol Observing System (AOS) Handbook  

Science Conference Proceedings (OSTI)

The Aerosol Observing System (AOS) is a suite of in situ surface measurements of aerosol optical and cloud-forming properties. The instruments measure aerosol properties that influence the earths radiative balance. The primary optical measurements are those of the aerosol scattering and absorption coefficients as a function of particle size and radiation wavelength and cloud condensation nuclei (CCN) measurements as a function of percent supersaturation. Additional measurements include those of the particle number concentration and scattering hygroscopic growth. Aerosol optical measurements are useful for calculating parameters used in radiative forcing calculations such as the aerosol single-scattering albedo, asymmetry parameter, mass scattering efficiency, and hygroscopic growth. CCN measurements are important in cloud microphysical models to predict droplet formation.

Jefferson, A

2011-01-17T23:59:59.000Z

470

Observation of the sling effect  

E-Print Network (OSTI)

When cloud particles are small enough, they move with the turbulent air in the cloud. On the other hand, as particles become larger their inertia affects their motions, and they move differently than the air. These inertial dynamics impact cloud evolution and ultimately climate prediction, since clouds govern the earth's energy balances. Yet we lack a simple description of the dynamics. Falkovich et al. describes theoretically a new dynamical mechanism called the "sling effect" by which extreme events in the turbulent air cause idealized inertial cloud particles to break free from the airflow (Falkovich G, Fouxon A, Stepanov MG 2002 Nature 419, 151). The sling effect thereafter causes particle trajectories to cross each other within isolated pockets in the flow, which increases the chance of collisions that form larger particles. We combined experimental techniques that allow for precise control of a turbulent flow with three-dimensional tracking of multiple particles at unprecedented resolution. In this way, we could observe both the sling effect and crossing trajectories between real particles. We isolated the inertial sling dynamics from those caused by turbulent advection by conditionally averaging the data. We found the dynamics to be universal in terms of a local Stokes number that quantifies the local particle velocity gradients. We measured the probability density of this quantity, which shows that sharp gradients become more frequent as the global Stokes number increases. We observed that sharp compressive gradients in the airflow initiated the sling effect, and that thereafter gradients in the particle flow ran away and steepened in a way that produced singularities in the flow in finite time. During this process both the fluid motions and gravity became unimportant. The results underpin a framework for describing a crucial aspect of inertial particle dynamics.

Gregory P. Bewley; Ewe Wei Saw; Eberhard Bodenschatz

2013-12-10T23:59:59.000Z

471

Simultaneous Observations of Thin Humidity Gradients in the Lower Troposphere with a Raman Lidar and the Very High-Frequency Middle- and Upper-Atmosphere Radar  

Science Conference Proceedings (OSTI)

Humidity is, among other things, a key parameter in the evolution of atmospheric dynamics and in the formation of clouds and precipitation through latent heat release. The continuous observation of its vertical distribution is thus important in ...

H. Luce; T. Takai; T. Nakamura; M. Yamamoto; S. Fukao

2010-05-01T23:59:59.000Z

472

Autonomous observations of the ocean biological carbon pump  

Science Conference Proceedings (OSTI)

Prediction of the substantial biologically mediated carbon flows in a rapidly changing and acidifying ocean requires model simulations informed by observations of key carbon cycle processes on the appropriate space and time scales. From 2000 to 2004, the National Oceanographic Partnership Program (NOPP) supported the development of the first low-cost fully-autonomous ocean profiling Carbon Explorers that demonstrated that year-round real-time observations of particulate organic carbon (POC) concentration and sedimentation could be achieved in the world's ocean. NOPP also initiated the development of a sensor for particulate inorganic carbon (PIC) suitable for operational deployment across all oceanographic platforms. As a result, PIC profile characterization that once required shipboard sample collection and shipboard or shore based laboratory analysis, is now possible to full ocean depth in real time using a 0.2W sensor operating at 24 Hz. NOPP developments further spawned US DOE support to develop the Carbon Flux Explorer, a free-vehicle capable of following hourly variations of particulate inorganic and organic carbon sedimentation from near surface to kilometer depths for seasons to years and capable of relaying contemporaneous observations via satellite. We have demonstrated the feasibility of real time - low cost carbon observations which are of fundamental value to carbon prediction and when further developed, will lead to a fully enhanced global carbon observatory capable of real time assessment of the ocean carbon sink, a needed constraint for assessment of carbon management policies on a global scale.

Bishop, James K.B.

2009-03-01T23:59:59.000Z

473

Population modeling in conservation planning of the Lower Keys marsh rabbit  

E-Print Network (OSTI)

Rapid development and urbanization of the Lower Florida Keys in the last 30 years has fragmented the habitat of the Lower Keys marsh rabbit (Sylvilagus palustris hefneri) and threatened it with extinction. Current threats exist at multiple spatiotemporal scales and include threats due to development, invasive species, and global climate change. On Boca Chica Key, the Lower Keys marsh rabbit (LKMR) exists as a metapopulation on Naval Air Station-Key West (NASKW). I conducted a population viability analysis to determine the metapopulation's risk of extinction under multiple management scenarios by developing a spatially-explicit, stage-structured, stochastic matrix model using the programs RAMAS Metapop and ArcGIS. These management scenarios include clearance of airfield vegetation, habitat conversion, and control of feral cats as an invasive species. Model results provided the Navy with relative risk estimates under these different scenarios. Airfield clearance with habitat conversion increased extinction risk, but when coupled with feral cat control, risk was decreased. Because of the potential of sea-level rise due to human-induced global climate change, and its projected impact on the biodiversity of the Florida Keys, I estimated the impacts of rising sea levels on LKMR across its geographic distribution under scenarios of no, low (0.3m), medium (0.6m), and high (0.9m) sea-level rise. I also investigated impacts due to 2 treatments (allowing vegetation to migrate upslope and not allowing migration), and 2 land-use planning decisions (protection and abandonment of humandominated areas). Not surprisingly, under both treatments and both land-use planning decisions, I found a general trend of decreasing total potential LKMR habitat with increasing sea-level rise. Not allowing migration and protecting human-dominated areas both tended to decrease potential LKMR habitat as compared with allowing migration and abandoning human-dominated areas. In conclusion, conservation strategies at multiple scales need to be implemented in order to reduce threats to LKMR, such as development, invasive species, and global climate change.

LaFever, David Howard

2006-08-01T23:59:59.000Z

474

Observation of GRBs with AGILE  

E-Print Network (OSTI)

Since its early phases of operation, the AGILE satellite is observing Gamma Ray Bursts (GRBs) over an energy range potentially spanning six orders of magnitude. In the hard X-ray band the SuperAGILE imager provides localization of about one GRB/month plus the detection of 1-2 GRBs per month out of its field of view. The Mini-Calorimeter detects about one GRB/week in the 350keV - 100MeV energy range, plus several other transients at very short time scales. In fact, the on-board MCAL trigger logic, implemented for the first time on time windows as short as 300 microseconds, is particularly suitable for very short bursts detection. The Gamma-Ray Imaging Detector (GRID), sensitive in the 30MeV - 30GeV range, firmly detected three GRBs (GRB080514B, GRB090401B and GRB090510) plus some other candidates at a lower significance level. Moreover, all GRBs localized by other spacecrafts inside the GRID field of view are currently searched for possible detection, and upper limits are provided. In this paper we review the ...

Marisaldi, M; Costa, E; Cutini, S; Del Monte, E; Donnarumma, I; Evangelista, Y; Feroci, M; Fuschino, F; Galli, M; Giuliani, A; Labanti, C; Lapshov, I; Lazzarotto, F; Lipari, P; Longo, F; Mereghetti, S; Moretti, E; Pacciani, L; Rapisarda, M; Soffitta, P; Tavani, M; Trifoglio, M; Vercellone, S

2009-01-01T23:59:59.000Z

475

The Death of a Massive Star Holds Key to Early Universe | U.S. DOE Office  

Office of Science (SC) Website

The Death of The Death of a Massive Star Holds Key to Early Universe News Featured Articles 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 Science Headlines Presentations & Testimony News Archives Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 12.16.09 The Death of a Massive Star Holds Key to Early Universe Scientists found the remains of a massive star, providing them with new information to reassess the environment of the early Universe. Print Text Size: A A A Subscribe FeedbackShare Page Imagine if paleontologists found the fossilized remains of a long-hypothesized, but never discovered dinosaur deep in the Amazon rainforest. Well, physicists participating in the international Supernova Factory, a Department of Energy sponsored project at Lawrence Berkeley

476

Potential for Hydrogen Production from Key Renewable Resources in the United States  

NLE Websites -- All DOE Office Websites (Extended Search)

Potential for Hydrogen Production Potential for Hydrogen Production from Key Renewable Resources in the United States A. Milbrandt and M. Mann Technical Report NREL/TP-640-41134 February 2007 NREL is operated by Midwest Research Institute ● Battelle Contract No. DE-AC36-99-GO10337 Potential for Hydrogen Production from Key Renewable Resources in the United States A. Milbrandt and M. Mann Prepared under Task No. H278.2100 Technical Report NREL/TP-640-41134 February 2007 National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov Operated for the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy by Midwest Research Institute * Battelle Contract No. DE-AC36-99-GO10337 NOTICE This report was prepared as an account of work sponsored by an agency of the United States government.

477

Key energy efficiency measures signed into law by President Obama | OpenEI  

Open Energy Info (EERE)

Key energy efficiency measures signed into law by President Obama Key energy efficiency measures signed into law by President Obama Home > Groups > OpenEI Community Central Graham7781's picture Submitted by Graham7781(1992) Super contributor 2 January, 2013 - 12:53 energy efficiency legislation OpenEI President Obama President Obama recently signed into law the American Energy Manufacturing Technical Corrections Act, a piece of legislation that includes provisions that are aimed at aggressively moving clean energy and energy efficiency forward. For a more in-depth article, visit Smartgridnews.com To view the full bill, click here Groups: OpenEI Community Central Login to post comments Graham7781's blog Latest blog posts Jweers New Robust References! Posted: 7 Aug 2013 - 18:23 by Jweers 1 comment(s) Graham7781 Geothermal Regulatory Roadmap featured on NREL Now

478

"The Ambassadors are key leaders in industry, government, academia, and nonpro  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ambassadors are key leaders in industry, government, academia, and nonprofits Ambassadors are key leaders in industry, government, academia, and nonprofits who are committed to lending their voices and vision to inform and inspire Americans about the critical need for greater diversity in STEM professions, energy entrepreneurship, and climate change adaptation and mitigation." The Honorable Dr. Ernest J. Moniz Secretary U.S. Department of Energy The Honorable Eddie Bernice Johnson is serving her 11th term representing the 30th Congressional District of Texas. In December 2010, Congresswoman Johnson was elected as the first African-American and the first female Ranking Member of the House Committee on Science, Space and Technology. From 2000 to 2002, she was the Ranking Member of the Subcommittee on Research and Science

479

A Key Step in Repairing DNA Double-Strand Breaks | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

X-ray Rainbow X-ray Rainbow An Insulating Breakthrough Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Step in Repairing DNA Double-Strand Breaks JANUARY 10, 2007 Bookmark and Share The atomic structure of the protein 53BP1 identified by Mayo researchers. (Courtesy: Mayo Clinic) A team of Mayo Clinic researchers has uncovered a key step in the molecular pathway of repairing DNA double-strand breaks. The studies were carried out using the 19-ID beamline (SBC-CAT) at the Advanced Photon Source (APS, Argonne) and the X12-C beamline at the National Synchrotron Light Source (NSLS, Brookhaven National Laboratory). Both the APS and the NSLS are funded by the U.S. Department of Energy's Office of Basic Energy

480

Expert Meeting Report: Key Innovations for Adding Energy Efficiency to Maintenance Projects  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Innovations for Key Innovations for Adding Energy Efficiency to Maintenance Projects A. Wood and J. Wiehagen NAHB Research Center September 2012 NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, subcontractors, or affiliated partners makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply

Note: This page contains sample records for the topic "kop key observation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Demand Response in the U.S. - Key trends and federal facility participation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in the U.S. in the U.S. Key trends and federal facility participation Phil Coleman Lawrence Berkeley National Lab FUPWG Williamsburg Meeting November 19, 2008 OUTLINE * Demand response defined * Current status in U.S. * Key trends - Increasing opportunities in "economic" DR - Rise of DR in "capacity" markets - Rise of dynamic pricing - Rise of automated DR ("auto-DR") * Federal participation is small - why? * Ramping up federal participation Demand Response * Def.: A short-term decrease in electrical consumption by end-use customers due to either a) increased electricity prices, or b) incentive payments (triggered by high wholesale market prices or compromised grid reliability). * DR participation can be either through load curtailment (short-term

482

NREL: News Feature - Super-Efficient Cells Key to Low-Cost Solar Power  

NLE Websites -- All DOE Office Websites (Extended Search)

Super-Efficient Cells Key to Low-Cost Solar Power Super-Efficient Cells Key to Low-Cost Solar Power February 16, 2011 This photo shows eight Amonix 7700 solar power generators, those in front tilted horizontally, those in the rear tilted near vertically. Each is a huge rectangle divided into hundreds of squares holding cells and lenses. Enlarge image The Amonix 7700 Concentrated Photovoltaic (CPV) Solar Power Generators are showcasing reliability and undergoing validation-of-performance measurements at the SolarTAC facility in Aurora, Colo. Credit: Dennis Schroeder In this photo, a man in an orange safety vest and hardhat is using a laptop, with large concentrated photovoltaic generators in the background. Enlarge image A technician at SolarTAC in Aurora, CO, enters some numbers into a laptop as he monitors validation of the Amonix 7700 Solar Power Generators.

483

Controlling excess noise in fiber optics continuous variables quantum key distribution  

E-Print Network (OSTI)

We describe a continuous variables coherent states quantum key distribution system working at 1550 nm, and entirely made of standard fiber optics and telecom components, such as integrated-optics modulators, couplers and fast InGaAs photodiodes. The setup is composed of an emitter randomly modulating a coherent state in the complex plane with a doubly Gaussian distribution, and a receiver based on a shot noise limited time-resolved homodyne detector. By using a reverse reconciliation protocol, the device can transfer a raw key rate up to 1 Mb/s, with a proven security against Gaussian or non-Gaussian attacks. The dependence of the secret information rate of the present fiber set-up is studied as a function of the line transmission and excess noise.

Jrme Lodewyck; Thierry Debuisschert; Rosa Tualle-Brouri; Philippe Grangier

2005-11-10T23:59:59.000Z

484

Grid Parity for Residential Photovoltaics in the United States: Key Drivers and Sensitivities; Preprint  

DOE Green Energy (OSTI)

In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that electricity price rather than technical parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

Ong, S.; Denholm, P.; Clark, N.

2012-08-01T23:59:59.000Z

485

Structure of the MTIP-MyoA Complex, a Key Component of the Malaria Parasite  

NLE Websites -- All DOE Office Websites (Extended Search)

the MTIP-MyoA Complex, a Key the MTIP-MyoA Complex, a Key Component of the Malaria Parasite Invasion Motor Malaria is one of the most devastating parasitic diseases worldwide, amounting to 300 to 500 million cases and ~2 million deaths per year (1). Multiple species of Plasmodium infect the human host, the most important ones being P. falciparum and P. vivax. Increased occurrence of multi-drug resistant Plasmodium strains reflects the need for new effective antimalarials. Human infection starts when Anopheline mosquitoes inject sporozoites into the skin during a blood meal. The sporozoites gain access to the blood stream and invade liver cells where they develop and multiply. Upon rupture of the infected liver cell, merozoites are released and rapidly enter red blood cells, where they undergo schizogony (cell multiplication) and propagate the blood cycle of the infection that causes the malaria symptoms (2).

486

Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities  

NLE Websites -- All DOE Office Websites (Extended Search)

09 09 December 2009 Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities Paul Denholm, Robert M. Margolis, Sean Ong, and Billy Roberts National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Operated by the Alliance for Sustainable Energy, LLC Contract No. DE-AC36-08-GO28308 Technical Report NREL/TP-6A2-46909 December 2009 Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities Paul Denholm, Robert M. Margolis, Sean Ong, and Billy Roberts Prepared under Task No. PVD9.1210 NOTICE This report was prepared as an account of work sponsored by an agency of the United States government.

487

Blending Hydrogen into Natural Gas Pipeline Networks: A Review of Key Issues  

NLE Websites -- All DOE Office Websites (Extended Search)

Blending Hydrogen into Blending Hydrogen into Natural Gas Pipeline Networks: A Review of Key Issues M. W. Melaina, O. Antonia, and M. Penev Technical Report NREL/TP-5600-51995 March 2013 NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency & Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. National Renewable Energy Laboratory 15013 Denver West Parkway Golden, Colorado 80401 303-275-3000 * www.nrel.gov Contract No. DE-AC36-08GO28308 Blending Hydrogen into Natural Gas Pipeline Networks: A Review of Key Issues M. W. Melaina, O. Antonia, and M. Penev Prepared under Task No. HT12.2010 Technical Report NREL/TP-5600-51995 March 2013 NOTICE This report was prepared as an account of work sponsored by an agency of the United States government.

488

Security and entanglement in differential-phase-shift quantum key distribution  

E-Print Network (OSTI)

The differential-phase-shift quantum key distribution protocol is formalised as a prepare-and-measure scheme and translated into an equivalent entanglement-based protocol. A necessary condition for security is that Bob's measurement can detect the entanglement of the distributed state in the entanglement-based translation, which implies that his measurement is described by non-commuting POVM elements. This condition is shown to be met.

Adriana Marais; Thomas Konrad; Francesco Petruccione

2010-02-04T23:59:59.000Z

489

Key Climate Variables Relevant to the Energy Sector and Electric Utilities  

Science Conference Proceedings (OSTI)

Changes in climate affect the energy sector and electric utilities through changes in demand, altered production and transmission capabilities, and effects on the operation of utility infrastructure. Unfortunately, few studies have been conducted on the impacts of climate change on the energy sector. This report outlines some key climate variables that may affect the energy sector, including long-term trends such as increases in air temperature, water temperatures, and sea-level rise; changes in precipit...

2009-03-31T23:59:59.000Z

490

Expert Meeting Report: Key Innovations for Adding Energy Efficiency to Maintenance Projects  

SciTech Connect

This report describes an expert meeting hosted by the Building America research team NAHB Research Center, which was held on February 8, 2012, in Orlando, Florida. The topic, Key Innovations for Adding Energy Efficiency to Maintenance Projects, was intended to provide direction to more focused efforts to increase the efficiency of existing homes; in this meeting, the focus was specifically for re-roofing and the opportunities for adding energy efficiency upgrades during this major home repair activity.

Wood, A.; Wiehagen, J.

2012-09-01T23:59:59.000Z

491

NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions  

SciTech Connect

This document provides key definitions, plant capabilities, and inputs and assumptions related to the Next Generation Nuclear Plant to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor. These definitions, capabilities, and assumptions were extracted from a number of NGNP Project sources such as licensing related white papers, previously issued requirement documents, and preapplication interactions with the Nuclear Regulatory Commission (NRC).

Wayne Moe

2013-05-01T23:59:59.000Z

492

Analysis of the Past and Future Trends of Energy Use in Key Medium- and  

NLE Websites -- All DOE Office Websites (Extended Search)

the Past and Future Trends of Energy Use in Key Medium- and the Past and Future Trends of Energy Use in Key Medium- and Large-Sized Chinese Steel Enterprises, 2000-2030 Title Analysis of the Past and Future Trends of Energy Use in Key Medium- and Large-Sized Chinese Steel Enterprises, 2000-2030 Publication Type Report LBNL Report Number LBNL-6380E Year of Publication 2013 Authors Hasanbeigi, Ali, Zeyi Jiang, and Lynn K. Price Date Published 09/2013 Publisher Lawrence Berkeley National Laboratory Keywords china, decomposition, iron and steel industry, Low Emission & Efficient Industry Abstract The iron and steel industry is one of the most energy-intensive and polluting industries in China. This industry accounted for approximately 27% of China's primary energy use for the manufacturing industry in 2010. Also, China's steel production represented around 47% of the world steel production that year. Hence, reducing energy use and air pollutant emissions from the Chinese steel industry not only has significant implications for China but also for the entire world. For this reason, it is crucial and it is the aim of this study to analyze influential factors that affected the energy use of the steel industry in the past in order to try to quantify the likely effect of those factors in the future.

493

Scalar Reconciliation for Gaussian Modulation of Two-Way Continuous-Variable Quantum Key Distribution  

E-Print Network (OSTI)

The two-way continuous-variable quantum key distribution (CVQKD) systems allow higher key rates and improved transmission distances over standard telecommunication networks in comparison to the one-way CVQKD protocols. To exploit the real potential of two-way CVQKD systems a robust reconciliation technique is needed. It is currently unavailable, which makes it impossible to reach the real performance of a two-way CVQKD system. The reconciliation process of correlated Gaussian variables is a complex problem that requires either tomography in the physical layer that is intractable in a practical scenario, or high-cost calculations in the multidimensional spherical space with strict dimensional limitations. To avoid these issues, we propose an efficient logical layer-based reconciliation method for two-way CVQKD to extract binary information from correlated Gaussian variables. We demonstrate that by operating on the raw-data level, the noise of the quantum channel can be corrected in the scalar space and the reconciliation can be extended to arbitrary high dimensions. We prove that the error probability of scalar reconciliation is zero in any practical CVQKD scenario, and provides unconditional security. The results allow to significantly improve the currently available key rates and transmission distances of two-way CVQKD. The proposed scalar reconciliation can also be applied in one-way systems as well, to replace the existing reconciliation schemes.

Laszlo Gyongyosi

2013-08-06T23:59:59.000Z

494

Key Issues for the control of refueling outage duration and costs in PWR Nuclear Power Plants  

SciTech Connect

For several years, EDF, within the framework of the CIDEM1 project and in collaboration with some German Utilities, has undertaken a detailed review of the operating experience both of its own NPP and of foreign units, in order to improve the performances of future units under design, particularly the French-German European Pressurized Reactor (EPR) project. This review made it possible to identify the key issues allowing to decrease the duration of refueling and maintenance outages. These key issues can be classified in 3 categories Design, Maintenance and Logistic Support, Outage Management. Most of the key issues in the design field and some in the logistic support field have been studied and could be integrated into the design of any future PWR unit, as for the EPR project. Some of them could also be adapted to current plants, provided they are feasible and profitable. The organization must be tailored to each country, utility or period: it widely depends on the power production environment, particularly in a deregulation context. (author)

Degrave, Claude [Electricite de France, EDF-SEPTEN, 12-14 avenue Dutrievoz 69628 Villeurbanne Cedex (France)

2002-07-01T23:59:59.000Z

495

Security of high speed quantum key distribution with finite detector dead time  

E-Print Network (OSTI)

The security of a high speed quantum key distribution system with finite detector dead time \\tau is analyzed. When the transmission rate becomes higher than the maximum count rate of the individual detectors (1/\\tau ), security issues affect the algorithm for sifting bits. Analytical calculations and numerical simulations of the Bennett-Brassard BB84 protocol are performed. We study Rogers et al.'s protocol (introduced in "Detector dead-time effects and paralyzability in high-speed quantum key distribution," New J. Phys. 9 (2007) 319) in the presence of an active eavesdropper Eve who has the power to perform an intercept-resend attack. It is shown that Rogers et al.'s protocol is no longer secure. More specifically, Eve can induce a basis-dependent detection efficiency at the receiver's end. Modified key sifting schemes that are secure in the presence of dead time and an active eavesdropper are then introduced. We analyze and compare these secure sifting schemes for this active Eve scenario, and calculate and...

Burenkov, Viacheslav; Fortescue, Ben; Lo, Hoi-Kwong

2010-01-01T23:59:59.000Z

496

Recent mophologic changes at Dog Keys Pass, Mississippi: formation and disappearance of Isle of Caprice  

SciTech Connect

Approximately 70 years ago the Isle of Caprice, originally known as Dog Island, emerged on the northern margin of an interchannel shoals in Dog Keys Pass, located between Horn and Ship Islands, 18 km southeast of Biloxi, Mississippi. The island was emergent for less than 15 years. The Isle of Caprice was not a true barrier island like neighboring Horn and Ship Islands, but rather an emergent shoal that developed from the coalescence of several small ephemeral sand keys known locally as the Dog Keys. The island formed and grew rapidly between 1917 and 1924, reaching a length of nearly 3000 m and a width of 400 m by 1924. Low dunes developed on the island, which were reportedly thinly vegetated with Uniola paniculata (sea oats). The sediment supply needed to nourish the Isle of Caprice diminished as the secondary channel reached equilibrium. The island then began to erode gradually in response to the normal effects of winds, waves, and tides. By 1931, the island was reduced to a duneless sand bar; a year later it was completely awash.

Rucker, J.B.; Snowden, J.O.

1988-09-01T23:59:59.000Z

497

Trigger-disabling Acquisition System for Quantum Key Distribution failsafe against Self-blinding  

E-Print Network (OSTI)

Modern single-photon detectors based on avalanche photodiodes offer increasingly higher triggering speeds, thus fostering their use in several fields, prominently in the recent area of Quantum Key Distribution. To reduce the probability of an afterpulse, these detectors are usually equipped with a circuitry that disables the trigger for a certain time after a positive detection event, known as dead time. If the acquisition system connected to the detector is not properly designed, efficiency issues arise when the triggering rate is faster than the inverse of detector's dead-time. Moreover, when this happens with two or more detectors used in coincidence, a security risk called "self-blinding" can jeopardize the distribution of a secret quantum key. In this paper we introduce a trigger-disabling circuitry based on an FPGA-driven feedback loop, so to avoid the above-mentioned inconveniences. In the regime of single-photon-attenuated light, the electronics dynamically accept a trigger only after detectors' complete recovery from dead-time. This technique proves useful to work with detectors at their maximum speed and to increase the security of a quantum key distribution setup.

M. Bawaj; M. Lucamarini; R. Natali; G. Di Giuseppe; P. Tombesi

2011-10-25T23:59:59.000Z

498

Unsuspected Pulmonary Embolism in Observation Unit Patients  

E-Print Network (OSTI)

department observation unit. Emerg Med Clin North Am. 2001;ED) managed acute care unit on ED overcrowding and emergencyof a chest pain observation unit compared with routine care.

Limkakeng, Alexander T.; Glickman, Seth W; Cairns, Charles B; Chandra, Abhinav

2009-01-01T23:59:59.000Z

499

First Observation of Plasmarons in Graphene  

NLE Websites -- All DOE Office Websites (Extended Search)

First Observation of Plasmarons in Graphene First Observation of Plasmarons in Graphene Print Wednesday, 30 June 2010 00:00 An international team of scientists performing...

500

Spin Observables in Kaon Electroproduction  

DOE Green Energy (OSTI)

The CEBAF accelerator at Jefferson Lab has proven to be a powerful tool for use in studying the electromagnetic production of hadronic systems containing a strange constituent quark. The electromagnetic probe only marginally disturbs the system being investigated, and is well understood. Its use as a means to probe the internal structure of hadronic systems has been well documented. Among the most studied of these hadronic systems, currently, is the nucleon. The unique opportunities afforded by the use of polarized, high-current, high-duty-factor electron beams provides an even more powerful probe of the electromagnetic structure of hadronic systems; the study of the spin dependence of the electromagnetic production and weak decay of the hyperon, specifically the {Lambda}-hyperon, becomes feasible. An experiment to study the electroproduction of the {Lambda} as a function of virtual photon momentum transfer, angle, and energy, using spin polarization observables in order to extract insights into its production and weak decay dynamics has already been approved at Jefferson Lab (E98-101; Spin Polarization in Kaon Electroproduction). The experiment aims to study the mechanism of polarization transfer in the reaction e + p {yields} e' + K + {Lambda}. The experiment requires only moderate momentum resolution and no specialized equipment other than that associated with the polarized beam. The data quality is expected to improve with higher electron beam energies, for higher Q{sup 2} measurements. Additionally, at higher energies the increased virtual photon flux allows the 4experiment to be run at lower currents (and therefore high beam polarization). A polarized electron beam and an unpolarized cryogenic hydrogen target are required. The study uses the electron arm spectrometer and the hadron arm spectrometer to detect the scattered electron and the electroproduced kaon before it decays in flight, respectively. Additionally, the hadron arm will be used to detect the proton from the hyperon decay. The hadron arm used as a hyperon tagger, in general terms, will detect the protons resulting from the weak decays of the hyperons in {Lambda} {yields} p + {pi}.

O.K. Baker

1998-06-01T23:59:59.000Z