Powered by Deep Web Technologies
Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Kyoto Protocol | Open Energy Information  

Open Energy Info (EERE)

Kyoto Protocol Kyoto Protocol Jump to: navigation, search http://www.wired.com/thisdayintech/tag/climate-change/ Kyoto protocol negotiation The Kyoto Protocol, negotiated in 1997 and into force in 2005, is a binding agreement in which industrialized nations will seek emission-reducing strategies for the future years to come. "The Kyoto Protocol is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by 5.2% compared to the year 1990 (but note that, compared to the emissions levels that would be expected by 2010 without the Protocol, this target represents a 29% cut). The goal is to lower overall emissions from six greenhouse gases - carbon dioxide, methane, nitrous oxide, sulfur hexafluoride, HFCs, and PFCs - calculated as an average over

2

Kyoto Protocol Response (Alabama) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) < Back Eligibility Commercial Developer Fed. Government Industrial Local Government Program Info State Alabama Program Type Climate Policies Environmental Regulations Effective immediately, the Director of the Alabama Department of Environmental Management shall refrain from proposing or promulgating any new regulations intended in whole or in part to reduce emissions of greenhouse gases, as such gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors unless such reductions are required under existing statutes. In the absence of a resolution or other act of the Legislature of the State of Alabama approving same, the Director of the Alabama Department of

3

The Kyoto Protocol and developing countries  

E-Print Network (OSTI)

Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

4

The Kyoto Protocol: A business perspective  

SciTech Connect

Governments have made a tentative start in responding to climate change. In marathon negotiating sessions that extended into an extra day Dec. 1--11 in Kyoto, Japan, representatives from more than 160 governments hammered out the Kyoto Protocol to the United Nations Framework Convention on Climate Change (FCCC). The protocol calls for developed countries to reduce emissions of greenhouse gases (GHGs) on averaged by 5.2% below 1990 levels by the years 2008--2012. Developing countries have no new obligations. The paper discusses the agreement, ratification, future questions, business role, and the challenge.

Malin, C.B. [International Chamber of Commerce, Paris (France)

1998-01-19T23:59:59.000Z

5

Russia's role in the Kyoto Protocol  

E-Print Network (OSTI)

As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

Bernard, Alain.

6

Kyoto Protocol: Enforcement Prohibitions (West Virginia) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol: Enforcement Prohibitions (West Virginia) Kyoto Protocol: Enforcement Prohibitions (West Virginia) Kyoto Protocol: Enforcement Prohibitions (West Virginia) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State West Virginia Program Type Climate Policies The West Virginia division of environmental protection shall refrain from proposing or promulgating any new rule intended, in whole or in part, to reduce emissions of greenhouse gases from the residential, commercial,

7

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network (OSTI)

renewable energy. Instead, the Kyoto Protocol CDM process encourages carbon reduction in developing countries,

Ferrey, Steven

2010-01-01T23:59:59.000Z

8

Kyoto Protocol Act of 1998 (Illinois) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol Act of 1998 (Illinois) Kyoto Protocol Act of 1998 (Illinois) Kyoto Protocol Act of 1998 (Illinois) < Back Eligibility State/Provincial Govt Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Program Info State Illinois Program Type Climate Policies Environmental Regulations Provider Illinois Pollution Control Board Effective immediately, the Illinois Environmental Protection Agency and the Pollution Control Board shall not propose or adopt any new rule for the intended purpose of addressing the adverse effects of climate change which in whole or in part reduces emissions of greenhouse gases, as those gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors. In the absence of

9

The effect of the Kyoto Protocol on carbon dioxide emissions  

Science Journals Connector (OSTI)

In this paper, we investigate the impact of the Kyoto Protocol on world emissions of a greenhouse gas, carbon dioxide. We use a large unbalanced panel data ... the effects of the international agreement. While carbon

Risa Kumazawa; Michael S. Callaghan

2012-01-01T23:59:59.000Z

10

Carbon Sequestration, Soil Conservation, and the Kyoto Protocol: Summary of Implications  

Science Journals Connector (OSTI)

This paper discusses relationships between soil conservation, carbon sequestration, and the Kyoto Protocol. The Kyoto ... particularly true for soil conservation, where the sequestration of carbon above and below...

Julian Dumanski

2004-08-01T23:59:59.000Z

11

Multi-Gas Assessment of the Kyoto Protocol John Reilly,*  

E-Print Network (OSTI)

Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

12

Carbon sinks and emissions trading under the Kyoto Protocol: a legal analysis  

Science Journals Connector (OSTI)

...Saunders Carbon sinks and emissions trading under the Kyoto Protocol: a...the issues of carbon sinks and emissions trading nearly aborted the Kyoto Protocol...third flexibility mechanism, emissions trading, compounded the complexity...

2002-01-01T23:59:59.000Z

13

Impacts of the Kyoto Protocol on Energy Markets and Economic Activity  

Reports and Publications (EIA)

Analyzes the impacts on the Kyoto Protocol on U.S. energy markets and the economy in the 2008-2012 time frame.

1998-01-01T23:59:59.000Z

14

UNFINISHED BUSINESS: The Economics of The Kyoto Protocol  

SciTech Connect

The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of carbon if a global system of emissions mitigation could be quickly and effectively implemented. But it could also exceed $250 per tonne of carbon if the US must meet its emissions limitations entirely through domestic actions, and if mitigation obligations are not adequately anticipated by decision-makers.

JA Edmonds; CN MacCracken; RD Sands; SH Kim

2000-07-06T23:59:59.000Z

15

Global warming mitigation and renewable energy policy development from the Kyoto Protocol to the Copenhagen Accord—A comment  

Science Journals Connector (OSTI)

Global warming is a grave environmental issue that has caught the attention of the globe. Due to the consequences of global warming, UNFCCC has established the Kyoto Protocol and the Copenhagen Accord as measures of combating climate change due to the emission of greenhouse gases. It has been three years since the first commitment period of the Kyoto Protocol and the Copenhagen Accord was just newly established. Therefore, there is a necessity to evaluate the performance of the Kyoto Protocol and to comment upon the Copenhagen Accord in its contributions toward climate change mitigation. Major greenhouse gas (GHG) emitters who are among the Kyoto Protocol ratifying developed nations exhibit the potential to achieve the desired Kyoto pledges through the aid of Clean Development Mechanisms (mainly from using renewable energy), as proposed in the Kyoto Protocol. However, the nullifying effects from non-ratified major emitters like the US and ratified but still developing countries have difficulties in adhering to the Kyoto Protocol. The Copenhagen Accord, on the other hand, is considered to be less ambitious and provides limited financial aid through the Copenhagen Green Climate Fund. The formulation of such a document indicates that modern societies continues to waste time in negotiations that emphasize on individual economic and political advantages, rather than taking into account true global considerations. It raises questions regarding how much time is needed before we decide to fully commit to the effective and collective efforts of climate change mitigation.

Lee Chung Lau; Keat Teong Lee; Abdul Rahman Mohamed

2012-01-01T23:59:59.000Z

16

A game of climate chicken : can EPA regulate greenhouse gases before the U.S. Senate ratifies the Kyoto Protocol?  

E-Print Network (OSTI)

EPA's legal authority to regulate greenhouse gas emissions under the Clean Air Act is reviewed. While EPA clearly does not have the authority to implement the precise terms of the Kyoto Protocol, arguments could be put ...

Bugnion, Véronique.; Reiner, David M.

17

Impacts of the Kyoto protocol on U.S. energy markets and economic activity  

SciTech Connect

The Intergovernmental Panel on Climate Change (IPCC) was established by the World Meteorological Organization and the United Nations Environment Program in 1988 to assess the available scientific, technical, and socioeconomic information in the field of climate change. The most recent report of the IPCC concluded that ``Our ability to quantify the human influence on global climate is currently limited because the expected signal is still emerging from the noise of natural variability, and because there are uncertainties in key factors. These include the magnitudes and patterns of long-term variability and the time-evolving pattern of forcing by, and response to, changes in concentrations of greenhouse gases and aerosols, and land surface changes. Nevertheless the balance of evidence suggests that there is a discernible human influence on global climate. The first and second Conference of the Parties in 1995 and 1996 agreed to address the issue of greenhouse gas emissions for the period beyond 2000, and to negotiate quantified emission limitations and reductions for the third Conference of the Parties. On December 1 through 11, 1997, representatives from more than 160 countries met in Kyoto, Japan, to negotiate binding limits on greenhouse gas emissions for developed nations. The resulting Kyoto Protocol established emissions targets for each of the participating developed countries--the Annex 1 countries--relative to their 1990 emissions levels. 114 refs., 138 figs., 33 tabs.

NONE

1998-10-01T23:59:59.000Z

18

Analysis of the Impacts of an Early Start for Compliance with the Kyoto Protocol  

Gasoline and Diesel Fuel Update (EIA)

2 2 Analysis of the Impacts of an Early Start for Compliance with the Kyoto Protocol July 1999 Energy Information Administration Office of Integrated Analysis and Forecasting U.S. Department of Energy Washington, DC 20585 This report was prepared by the Energy Information Administration, the independent statistical and analytical agency within the Department of Energy. The information contained herein should be attributed to the Energy Information Administration and should not be construed as advocating or reflecting any policy position of the Department of Energy or of any other organization. Service Reports are prepared by the Energy Information Administration upon special request and are based on assumptions specified by the requester. Preface The analysis in this report was undertaken at the request of the Committee on Science of the U.S.

19

Kyoto's Unfinished Business  

E-Print Network (OSTI)

The authors offer a provisional assessment of where the Kyoto negotiations have left the climate change issue. They present a few widely divergent assesments of what the Kyoto Protocol on Climate Change will accomplish, ...

Jacoby, Henry D.; Prinn, Ronald G.; Schmalensee, Richard.

20

kyoto1.htm  

Gasoline and Diesel Fuel Update (EIA)

THE COMMITTEE ON SCIENCE THE COMMITTEE ON SCIENCE U.S. HOUSE OF REPRESENTATIVES OCTOBER 9, 1998 At the request of the House of Representatives' Committee on Science, the Energy Information Administration has completed a detailed study of the potential, carbon-related impacts of the Kyoto Protocol on the price of energy in the United States and on the overall economy. The uncertainties involved in such an analysis are many, not the least of which is ambiguity about how much carbon emissions from energy use would actually have to be reduced in the United States versus how much of the Kyoto Protocol requirement could be met by other factors, such as reduced emissions from other greenhouse gases and international emissions trading. For this reason, further studies will clearly be needed.

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Japanese nuclear power and the Kyoto agreement  

E-Print Network (OSTI)

We find that, on an economic basis, nuclear power could make a substantial contribution for meeting the emissions target Japan agreed to in the Kyoto Protocol. It is unlikely however that the contribution would be as large ...

Babiker, Mustafa H.M.; Reilly, John M.; Ellerman, A. Denny.

22

A concrete roadmap toward a low-carbon society in case of Kyoto City  

Science Journals Connector (OSTI)

Although several central and local governments around the world have set long term low-carbon targets they do not always have concrete plans toward the goals. In order to reduce greenhouse gas(GHG) emission significantly various kinds of measures in various sectors will be required. Some measures reduce GHG emissions directly and are called “direct measures” in this study. To implement those direct measures by the target year indirect measures are also required such as economic incentives regulations and urban planning. This study proposes a method to develop a concrete long-term schedule of direct and indirect measures a “roadmap ” based on the idea of backcasting. To formulate the implementation of and relations between measures and to estimate the concrete schedule to achieve the targets we developed a model called “backcasting tool” (BCT). Given the information of measures including GHG emission reduction by measures required resource input and maximum total resource input and so on BCT estimates the progress of the measures from the current to the target year. The method was applied in Kyoto City with a low-carbon target 40% reduction in CO 2 emission from fossil fuel by 2030 compared with 1990. Using BCT we showed that a detailed schedule consists of about 100 measures classified into six fields. The result shows it is possible to achieve the target if all the measures both direct and indirect are implemented in time.

Kei Gomi; Yuki Ochi; Yuzuru Matsuoka

2010-01-01T23:59:59.000Z

23

Cost saving in meeting the commitments of the Kyoto Protocol through the abatement of non-CO2 greenhouse gas emissions  

Science Journals Connector (OSTI)

Reduction of CO2 emissions has proved to he difficult in Finland and it is therefore essential to find the optimal allocation of reduction measures between different greenhouse gases mentioned in the Kyoto Protoc...

S. Tuhkanen; R. Pipatti

2000-01-01T23:59:59.000Z

24

Southeast Asia and Kyoto University  

E-Print Network (OSTI)

, Kyoto University opened its ASEAN Center in Bangkok, Thailand (p.11), the latest development in over

Takada, Shoji

25

Carbon Sequestered, Carbon Displaced and the Kyoto Context  

SciTech Connect

The integrated system that embraces forest management, forest products, and land-use change impacts the global carbon cycle - and hence the net emission of the greenhouse gas carbon dioxide - in four fundamental ways. Carbon is stored in living and dead biomass, carbon is stored in wood products and landfills, forest products substitute in the market place for products made from other materials, and forest harvests can be used wholly or partially to displace fossil fuels in the energy sector. Implementation of the Kyoto Protocol to the United Nations Framework Convention on Climate Change would result in the creation of international markets for carbon dioxide emissions credits, but the current Kyoto text does not treat all carbon identically. We have developed a carbon accounting model, GORCAM, to examine a variety of scenarios for land management and the production of forest products. In this paper we explore, for two simple scenarios of forest management, the carbon flows that occur and how these might be accounted for under the Kyoto text. The Kyoto protocol raises questions about what activities can result in emissions credits, which carbon reservoirs will be counted, who will receive the credits, and how much credit will be available? The Kyoto Protocol would sometimes give credits for carbon sequestered, but it would always give credits when fossil-fuel carbon dioxide emissions are displaced.

Marland, G.; Schlamadinger, B.

1999-04-18T23:59:59.000Z

26

Carbon emissions and the Kyoto commitment in the European Union  

E-Print Network (OSTI)

We estimate reference CO? emission projections in the European Union, and quantify the economic impacts of the Kyoto commitment on Member States. We consider the case where each EU member individually meets a CO? emissions ...

Viguier, Laurent L.; Babiker, Mustafa H.M.; Reilly, John M.

27

RPL Routing Protocol a Case Study: Precision Agriculture  

E-Print Network (OSTI)

released, this protocol algorithms and its four application scenario, such as home automation, industrial.g., industrial, urban, home and buildings automation or smart grid [3]. ROLL's charter ensures that the designed control, urban environment and building automation, have been nearly grounded. However, it is still very

Paris-Sud XI, Université de

28

Post-Kyoto GHG-Offset Project Eligibility Criteria  

Science Journals Connector (OSTI)

A major question that was addressed in COP15 (Copenhagen) concerns which institutional changes are recommended for the Kyoto flexible mechanisms in the post-Kyoto regime. The Clean Development Mechanism (CDM) has...

Brian Robertson

2011-01-01T23:59:59.000Z

29

Special Features: Kyoto University with ASEAN and Beyond  

E-Print Network (OSTI)

Special Features: Kyoto University with ASEAN and Beyond Kyoto University Vol.4 No.2 September 2014 #12;Contents 1 Message from the President Kyoto University with ASEAN and Beyond 2 History Southeast in ASEAN Region 22 Fostering the Next Generation -- The Hakubi Project A Unique Opportunity

Takada, Shoji

30

Simulation of the RPL Routing Protocol for IPv6 Sensor Networks: two cases studies Leila Ben Saad  

E-Print Network (OSTI)

by our own RPL module. We then focus on the performance comparison of simulated sensor networks and real global lifetime. Keywords-Network Simulation, RPL, PLC, IPv6, Mobile Sinks, Energy Optimization, WSN, 802Simulation of the RPL Routing Protocol for IPv6 Sensor Networks: two cases studies Leila Ben Saad

Boyer, Edmond

31

E-Print Network 3.0 - applications kyoto japan Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

kyoto japan Search Powered by Explorit Topic List Advanced Search Sample search results for: applications kyoto japan Page: << < 1 2 3 4 5 > >> 1 Japan-Taiwan Joint...

32

E-Print Network 3.0 - advanced applications kyoto Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

index.html Summary: Kyoto University of Foreign Studies (KUFS): http... that of Japan and other Asian countries. Exchange stu- dents studying at the Kyoto University of...

33

Greetings from Kyoto-U SPRING 2010 C O N T E N T S  

E-Print Network (OSTI)

signed with the ASEAN University Network (AUN) Foreign language Publication of "MANGA Kyoto University" 8

Takada, Shoji

34

Kyoto-Related Fossil-Fuel CO2 Emission Totals  

NLE Websites -- All DOE Office Websites (Extended Search)

Kyoto-Related Emissions Kyoto-Related Emissions Kyoto-Related Fossil-Fuel CO2 Emission Totals DOI: 10.3334/CDIAC/ffe.007_V2012 world map Kyoto-Related Fossil-Fuel CO2 Emission Totals Year Annex B Countries Non Annex B Countries Fossil-Fuel CO2 Emissions (million metric tonnes C) Bunkers (million metric tonnes C) Fossil-Fuel CO2 Emissions (million metric tonnes C) Bunkers (million metric tonnes C) 1990 3894 90 2111 46 1991 3801 94 2299 38 1992 3750 109 2263 44 1993 3685 107 2339 48 1994 3656 107 2469 54 1995 3681 110 2570 59 1996 3704 111 2657 72 1997 3727 114 2737 74 1998 3746 118 2698 82 1999 3678 124 2718 90 2000 3725 130 2821 90 2001 3781 120 2936 92 2002 3764 128 3013 94 2003 3853 123 3347 98 2004 3888 135 3683 107 2005 3933 142 3926 106

35

KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers  

E-Print Network (OSTI)

............................................. 16 Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market Other City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University Kyoto International Community House

Takada, Shoji

36

(mercury.yukawa.kyoto-u.ac.jp)ssh Permission denied (publickey).  

E-Print Network (OSTI)

SSH Q&A (mercury.yukawa.kyoto-u.ac.jp)ssh Permission denied (publickey). (1) ID ID ID (2) ssh -i () ssh -i $HOME/.ssh/id_yitp_rsa (UID)@mercury.yukawa.kyoto-u.ac.jp (3) (1)(2) Permission denied support@yukawa.kyoto-u.ac.jp (mercury

Shimizu, Akira

37

Kyoto University has launched a Japan-Thailand collaborative research  

E-Print Network (OSTI)

Kyoto University has launched a Japan-Thailand collaborative research project titled "Development of clean and efficient utilization of low rank coals and biomass by solvent treatment," supported biomass waste as well as low-rank coals into valuable products such as carbon fiber, biofuel, and high

Takada, Shoji

38

News Letter Institute of Advanced Energy, Kyoto University  

E-Print Network (OSTI)

;"Energy Research Issue" The IAE has many groups researching various fields of energy related issues. Abstract definition of energy consists of two parts: Energy = Exergy +Anergy Exergy is a part of energyNews Letter Institute of Advanced Energy, Kyoto University ISSN 1342-3193 IAE-NL-2014 No.54 http

Takada, Shoji

39

News Letter Institute of Advanced Energy, Kyoto University  

E-Print Network (OSTI)

Materials Science Workshop" Institute of Advanced Energy, Kyoto University #12; 25 1 22 ASEAN 5 ASEANNational University of SingaporeChulalongkorn UniversityASEAN University Network AUN Nantana Gajaseni Institut Teknologi Bandung Akhmaloka Gajaseni "Student Mobility and ASEAN Credit Transfer System" Agreement

Takada, Shoji

40

The road from Kyoto: The evolution of carbon dioxide emissions from energy use in IEA countries  

SciTech Connect

Building on earlier analysis of energy use and CO{sub 2} emissions in 13 member countries of the International Energy Agency (IEA), the authors quantify energy use and carbon emissions for nearly three dozen activities and economic branches from the early 1970s to the mid 1990s. They show how lifestyles, economic structure, and overall economic growth affect the structure and rate of CO{sub 2} emissions. Similarly they show how energy intensities, final fuel mixes, and utility fuel mixes shape emissions. Using Laspeyres indices, they calculate the relative importance of each of these factors in affecting sectoral and total emissions over time. They focus on consumer sectors, homes and personal travel, but extend the analysis to all sectors of the economies studied. The authors find that emissions reductions in all sectors after 1990 have been slower than in the previous fifteen years, a period that saw emissions reductions in spite of economic growth. Manufacturing and households led the reductions in most cases, but progress has slowed markedly. In almost all cases, emissions from the transportation sector showed the least reduction and indeed some increases. Findings do not give an optimistic view of the recently concluded accords at the Third Conference of Parties (COP-3) in Kyoto, Japan. The authors conclude that the current rate of energy saving and fuel switching must be greatly accelerated if the IEA countries studied here are to affect reductions in CO{sub 2} emissions to meet their Kyoto targets.

Schipper, L.; Unander, F.; Marie, C.; Gorham, R.; Justus, D.; Ting, M.; Khrushch, M.; Krackeler, T.

1998-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Spatial GHG Inventory: Analysis of Uncertainty Sources. A Case Study for Ukraine  

Science Journals Connector (OSTI)

The Kyoto Protocol to the United Nations Framework Convention on Climate Change (UNFCCC) defines obligations for its parties to reduce their greenhouse gas (GHG) emissions compared with those of a base ... ) has ...

R. Bun; M. Gusti; L. Kujii; O. Tokar; Y. Tsybrivskyy…

2007-09-01T23:59:59.000Z

42

A Proposal for the Design of the Successor to the Kyoto Protocol  

E-Print Network (OSTI)

in managing climate change does require developing countryclimate change agreement, and that developing countries willby developing countries (through CDM). Third, climate change

Karp, Larry; Zhao, Jinhua

2008-01-01T23:59:59.000Z

43

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network (OSTI)

1, 34. 214. Three of the 10 RGGI states, regulating carbonof dollars each from the RGGI revenue raised from auc-allowances. See States Raid RGGI Funds to Fill Budget Gap,

Ferrey, Steven

2010-01-01T23:59:59.000Z

44

Compliance and Emissions Trading under the Kyoto Protocol: Rules for Uncertain Inventories  

Science Journals Connector (OSTI)

A solution is proposed for proving compliance with emission targets and for emissions trading in the event of uncertainties in reported...? and calculating effective emissions for trading are derived. Based on th...

Zbigniew Nahorski; Joanna Horabik; Matthias Jonas

2007-09-01T23:59:59.000Z

45

Energy Policy 31 (2003) 459481 The costs of the Kyoto Protocol in the European Union  

E-Print Network (OSTI)

``flexible mechanisms'' (emission trading, clean development mechanism, and Joint Implementation) in order emissions trading within the European Union'' that proposes to introduce in 2005 an EU trading system be implemented at national level: e.g., emissions trading systems are in the process of being established

46

Flexibility and Legitimacy — The Emissions Trading System under the Kyoto Protocol  

Science Journals Connector (OSTI)

In the field of environmental law, be it on the domestic or the international level, it is especially difficult to develop effective regulatory systems and systems for sanctions to enforce obligations. The leg...

Petra Lea Láncos

2010-01-01T23:59:59.000Z

47

Energy efficient service delivery in clouds in compliance with the kyoto protocol  

Science Journals Connector (OSTI)

Cloud computing is revolutionizing the ICT landscape by providing scalable and efficient computing resources on demand. The ICT industry --- especially data centers, are responsible for considerable amounts of CO2 emissions and will ...

Drazen Lucanin; Michael Maurer; Toni Mastelic; Ivona Brandic

2012-05-01T23:59:59.000Z

48

Concerns About Climate Change Mitigation Projects: Summary of Findings from Case Studies in Brazil, India, Mexico, and South Africa  

E-Print Network (OSTI)

and Findings for Climate Change Projects ..3 Table 2.Case Studies: Climate-Change Projects andin the debate on climate change projects under the Kyoto

1998-01-01T23:59:59.000Z

49

Kyoto: Think Global, Act Local (K:TGAL) | Open Energy Information  

Open Energy Info (EERE)

Kyoto: Think Global, Act Local (K:TGAL) Kyoto: Think Global, Act Local (K:TGAL) Jump to: navigation, search Name Kyoto: Think Global, Act Local (K:TGAL) Agency/Company /Organization Netherlands Development Cooperation Sector Land, Climate Topics GHG inventory Website http://www.communitycarbonfore Program Start 2003 Program End 2009 References K:TGAL[1] Kyoto: Think Global, Act Local (K:TGAL) Screenshot "Kyoto: Think Global, Act Local (K:TGAL) is a research and capacity building program, financed by the Netherlands Development Cooperation, it is investigating the possibilities and potential for Community Based Forest Management of existing natural forest to be included as an eligible carbon mitigation activity under international climate change agreements in the future, particularly under REDD policy. The program involves research teams

50

KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers  

E-Print Network (OSTI)

Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market Interpretation ....................................... 35 Access to Kyoto Station from Kansai International Airport Access to Katsura Station from Kansai

Takada, Shoji

51

KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers  

E-Print Network (OSTI)

............................................. 16 Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market ....................................... 35 Access to Kyoto Station from Kansai International Airport Access to Katsura Station from Kansai

Takada, Shoji

52

Extremal quantum protocols  

E-Print Network (OSTI)

Generalized quantum instruments correspond to measurements where the input and output are either states or more generally quantum circuits. These measurements describe any quantum protocol including games, communications, and algorithms. The set of generalized quantum instruments with a given input and output structure is a convex set. Here we investigate the extremal points of this set for the case of finite dimensional quantum systems and generalized instruments with finitely many outcomes. We derive algebraic necessary and sufficient conditions for extremality.

Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

2011-01-25T23:59:59.000Z

53

http://www.ms.u-tokyo.ac.jp/~yasuyuki/rims2011.htm April 1, 2011 March 31, 2012 RIMS, Kyoto University, Japan  

E-Print Network (OSTI)

University, Japan M. Izumi (Kyoto University),Y. Kawahigashi (University of Tokyo), H. Matui (Chiba) Organized by: September 5 - 9, 2011 (RIMS, Kyoto University, Japan) Invited Speakers: N. Brown, M. Dadarlat and Mathematical Physics December 7 - 16, 2011 (RIMS, Kyoto University, Japan) Invited Speakers: J. Cuntz, D

Kawahigashi, Yasuyuki

54

It's too late to seal a global climate deal. But we need action, not Kyoto II  

E-Print Network (OSTI)

to economic development, with development based on cleaner, sustainable technologies for power, transport, buildings and industry. The rich world will benefit as the poor world goes green, and will have to pay much wait It's too late to seal a global climate deal. But we need action, not Kyoto II |... http://www.guardian.co.uk/commentisfree/cif-green

55

On June 21, 2013, Kyoto University and Daikin Industries, Ltd. concluded a collaboration agreement  

E-Print Network (OSTI)

, and the pursuit of innovation. Under the agreement, the Daikin-Kyoto University Innovation Program (DK Program the following goals in three years. 1. Create new themes focusing on social values (drawing on the knowledge's partner universities) 3. Develop technology management methods (to continuously foster innovation

Takada, Shoji

56

Global Network Kyoto University has opened a new center in Bangkok, Thailand, dedicated to supporting research,  

E-Print Network (OSTI)

to supporting research, education, and international collaborations across the ASEAN region. To mark the launch of these activities, an official opening ceremony and a symposium titled "Kyoto University in ASEAN -- Past, Present, government, and industry from ASEAN member states and Japan convened at the opening ceremony

Takada, Shoji

57

Response Protocol Distressed Students  

E-Print Network (OSTI)

Response Protocol Distressed Students REFERRAL IDENTIFIERS: Student distress may manifest, the Distressed Student Protocol will assist you in responding to the student and providing appropriate referrals

California at Santa Barbara, University of

58

Analysis of the Impact of Hello Protocol Parameters over a Wireless Network Self-Organization  

E-Print Network (OSTI)

Analysis of the Impact of Hello Protocol Parameters over a Wireless Network Self of the HELLO protocol. This makes this HELLO protocol very important for wireless networks especially for self- organizing the network. Most of layer-3 protocols assume an ideal MAC layer. In such a case, HELLO protocol

Paris-Sud XI, Université de

59

L'INITIATIVE EUROPEENNE "SUIVI GLOBAL POUR L'ENVIRONNEMENT ET LA SECURITE" (GMES) ET LE PROTOCOLE DE KYOTO1  

E-Print Network (OSTI)

, Belgique H. LE TREUT, UPMC, France A. MOREL, LPCM, France E. RASCHKE, GKSS Forschungszentrum Geesthacht

60

Changes in the use and management of forests for abating carbon emissions: issues and challenges under the Kyoto Protocol  

Science Journals Connector (OSTI)

...establishing plantations on non-forested...sustainably grown wood for energy intensive...quantities of biomass, which converts...Establishment of fuel-wood plantations can reduce impacts...outlook for future wood supply from forest plantations. Working paper...

2002-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Kyoto & Kyoto University Kyoto: A Heartland  

E-Print Network (OSTI)

. It was also where the first hydroelectric power plant and tram system were developed, and the location

Takada, Shoji

62

Webinar: Hydrogen Refueling Protocols  

Energy.gov (U.S. Department of Energy (DOE))

Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

63

Application Protocol Reference Architecture Application Protocol Reference Architecture  

E-Print Network (OSTI)

Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

van Sinderen, Marten

64

Stream Control Transmission Protocol  

Science Journals Connector (OSTI)

This document describes the Stream Control Transmission Protocol (SCTP). SCTP is designed to transport PSTN signaling messages over IP networks, but is capable of broader applications.

R. Stewart; Q. Xie; K. Morneault; C. Sharp; H. Schwarzbauer; T. Taylor; I. Rytina; M. Kalla; L. Zhang; V. Paxson

2000-10-01T23:59:59.000Z

65

Kyoto Workshop  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Center for Reliable Electric Power Transmission Center for Reliable Electric Power Transmission Alan Mantooth, University of Arkansas 1 1 National Center for Reliable Electric Power Transmission A Center for Advanced Power Electronics Dr. H. Alan Mantooth, Director Dr. Simon Ang, Associate Director Dr. Juan Carlos Balda, Associate Director Dr. Roy McCann, Associate Director University of Arkansas - Fayetteville http://ncrept.eleg.uark.edu Silicon Carbide Research for Reliable Electric Power: Design and Test National Center for Reliable Electric Power Transmission Alan Mantooth, University of Arkansas 2 Research advanced power electronic solutions for grid- connected applications Fault currents continue to rise in urban centers and the use of FCLs provides an attractive way to extend the useful life of

66

Kyoto Workshop  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Arkansas 15 15 UA Proposed Solution Multiport converter topology uses common transformer, reducing part count for total system. High frequency transformer link results...

67

Memory cost of quantum protocols  

E-Print Network (OSTI)

In this paper we consider the problem of minimizing the ancillary systems required to realize an arbitrary strategy of a quantum protocol, with the assistance of classical memory. For this purpose we introduce the notion of memory cost of a strategy, which measures the resources required in terms of ancillary dimension. We provide a condition for the cost to be equal to a given value, and we use this result to evaluate the cost in some special cases. As an example we show that any covariant protocol for the cloning of a unitary transformation requires at most one ancillary qubit. We also prove that the memory cost has to be determined globally, and cannot be calculated by optimizing the resources independently at each step of the strategy.

Alessandro Bisio; Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

2011-12-16T23:59:59.000Z

68

Office Protocols | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Oversight » Safety & Emergency Management Evaluations Services » Oversight » Safety & Emergency Management Evaluations » Office Protocols Office Protocols July 22, 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents December 4, 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 Protocol for High Hazard Nuclear Facility Project Oversight June 26, 2012 Protocol, Required Reading - June 2012 Protocol for Required Reading June 26, 2012 Protocol, Small Team Oversight Activities - June 2012 Protocol for Small Team Oversight Activities (Rev. 1) May 13, 2011 Protocol, Site Leads - May 2011 Protocol for Site Leads May 13, 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011

69

Response Protocol Distressed Students  

E-Print Network (OSTI)

Response Protocol Distressed Students REFERRAL IDENTIFIERS: Student distress may manifest, the Distressed Student Protocol will assist you in responding to the student and providing appropriate referrals not know which office to contact.The coordinators will consult about a student, provide referrals to campus

California at Santa Barbara, University of

70

POST-KYOTO POLICY IMPLICATIONS ON THE ENERGY SYSTEM: A TIAM-FR LONG-TERM PLANNING EXERCISE  

E-Print Network (OSTI)

marginal costs, the primary energy consumption and the energy mix. This paper compares global efforts of CO. Keywords CO2 mitigation targets, global energy system, long-term modelling Acknowledgement This researchPOST-KYOTO POLICY IMPLICATIONS ON THE ENERGY SYSTEM: A TIAM-FR LONG-TERM PLANNING EXERCISE Sandrine

Paris-Sud XI, Université de

71

International Energy Conference, 19 -21 May 2003 Energy Technologies for post-Kyoto targets in the medium term  

E-Print Network (OSTI)

Aquifers and Hydrocarbon Structures Power & Heat Air Air O2 N2 & O2 CO2 CO2 CO2 Compression & DehydrationInternational Energy Conference, 19 - 21 May 2003 Energy Technologies for post-Kyoto targets in the medium term CO2 Capture & Geological Storage Niels Peter Christensen International Ventures Director

72

The cost efficiency of Kyoto flexible mechanisms: a top-down study with the GEM-E3 world model  

Science Journals Connector (OSTI)

Among Kyoto flexible mechanisms, emission trading (ET) shows more promise in cost efficiency but less flexibility in practice than Joint Implementation (JI) and the Clean Development Mechanism (CDM). The problem draws our attention to whether JI and ... Keywords: C68, Clean Development Mechanisms, Cost efficiency, Emission trading, Joint Implementation, Q43, Q48

Haoran Pan

2005-11-01T23:59:59.000Z

73

Office Protocols | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol for the Development and Maintenance of Criteria and Review Approach Documents December 4, 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012...

74

SCADA protocol vulnerabilities  

Science Journals Connector (OSTI)

The majority of network traffic in process control networks is generated by industrial communication protocols, whose implementation represents a considerable part of the code that runs in process control systems. Consequently a large number of attack ...

Julian L. Rrushi

2012-01-01T23:59:59.000Z

75

Protocol design contests  

E-Print Network (OSTI)

In fields like data mining and natural language processing, design contests have been successfully used to advance the state of the art. Such contests offer an opportunity to bring the excitement and challenges of protocol ...

Winstein, Keith

76

Optimal protocols for nonlocality distillation  

SciTech Connect

Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

Hoeyer, Peter; Rashid, Jibran [Department of Computer Science, University of Calgary, 2500 University Drive N.W., Calgary, Alberta, 2N 1N4 (Canada)

2010-10-15T23:59:59.000Z

77

Efficient Data Transfer Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

Efficient Efficient Data Transfer Protocols for Big Data Brian Tierney ∗ , Ezra Kissel † , Martin Swany † , Eric Pouyoul ∗ ∗ Lawrence Berkeley National Laboratory, Berkeley, CA 94270 † School of Informatics and Computing, Indiana University, Bloomington, IN 47405 Abstract-Data set sizes are growing exponentially, so it is important to use data movement protocols that are the most efficient available. Most data movement tools today rely on TCP over sockets, which limits flows to around 20Gbps on today's hardware. RDMA over Converged Ethernet (RoCE) is a promising new technology for high-performance network data movement with minimal CPU impact over circuit-based infrastructures. We compare the performance of TCP, UDP, UDT, and RoCE over high latency 10Gbps and 40Gbps network paths, and show that RoCE-based data transfers can fill a 40Gbps path using much less CPU than other protocols.

78

APS Protocol for  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocol for Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material regulated by the U.S. Department of Transportation as a hazardous material. This procedure governs APS Beamline acceptance of all packages known or suspected to contain hazardous materials. It applies not only to shipments delivered to Argonne National Laboratory by common carriers, but also to materials brought to the laboratory by researchers in personal, rental, or institutionally owned vehicles. There is no threshold quantity below which the procedure need not be followed. Purpose This procedure is intended to minimize the negative consequences that could result from

79

MAPS MANUAL 2010 PROTOCOL  

E-Print Network (OSTI)

MAPS MANUAL 2010 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

80

MAPS MANUAL 2014 PROTOCOL  

E-Print Network (OSTI)

MAPS MANUAL 2014 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

MAPS MANUAL 2008 PROTOCOL  

E-Print Network (OSTI)

MAPS MANUAL 2008 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Jim Saracco

DeSante, David F.

82

MAPS MANUAL 2013 PROTOCOL  

E-Print Network (OSTI)

MAPS MANUAL 2013 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

83

MAPS MANUAL 2011 PROTOCOL  

E-Print Network (OSTI)

MAPS MANUAL 2011 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

84

MAPS MANUAL 2012 PROTOCOL  

E-Print Network (OSTI)

MAPS MANUAL 2012 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

85

The Cisco SRP MAC Layer Protocol  

Science Journals Connector (OSTI)

This document specifies the MAC layer protocol, "Spatial Reuse Protocol" (SRP) for use with ring based media. This is a second version of the protocol (V2).

D. Tsiang; G. Suwala

2000-08-01T23:59:59.000Z

86

Supplement No. 2 to the FUSRAP Summary Protocol – Verification and Certification Protocol  

Energy.gov (U.S. Department of Energy (DOE))

Supplement No. 2 to the FUSRAP Summary Protocol – Verification and Certification Protocol (November 1985, Rev. 1)

87

Communication complexity protocols for qutrits  

SciTech Connect

Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

Tamir, Boaz [Department of History and Philosophy of Science, Bar-Ilan University, Ramat-Gan (Israel)

2007-03-15T23:59:59.000Z

88

Energy Efficiency Savings Protocols | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols In April 2013 the U.S. Department of Energy published the first set of protocols for determining energy savings from energy efficiency measures and programs. You can read individual protocols below or all of them combined into a single report titled The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures. Acknowledgements Introduction Commercial and Industrial Lighting Evaluation Protocol Commercial and Industrial Lighting Controls Evaluation Protocol Small Commercial and Residential Unitary and Split System HVAC Cooling Equipment-Efficiency Upgrade Evaluation Protocol Residential Furnaces and Boilers Evaluation Protocol Residential Lighting Evaluation Protocol

89

Life Validation Testing Protocol Development | Department of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Validation Testing Protocol Development Life Validation Testing Protocol Development Presentation from the U.S. DOE Office of Vehicle Technologies "Mega" Merit Review 2008 on...

90

Former Worker Program Medical Protocol  

Energy.gov (U.S. Department of Energy (DOE))

The medical protocol is intended to identify work-related health outcomes of relevance to DOE workers for which there are screening tests that are reasonably likely to be effective and beneficial to program participants.

91

Superior Energy Performance Certification Protocol  

Energy.gov (U.S. Department of Energy (DOE))

The Superior Energy Performance® (SEP™) Certification Protocol describes the purpose of the SEP program and defines the steps required for participation—from initial application through certification by an ANSI-ANAB accredited Verification Body.

92

Neonatal euthanasia: Lessons from the Groningen Protocol  

Science Journals Connector (OSTI)

Summary Decisions about neonatal end-of-life care have been studied intensely over the last 20 years in The Netherlands. Nationwide surveys were done to quantify these decisions, provide details and monitor the effect of guidelines, new regulations and other interventions. One of those interventions was the Groningen Protocol for newborn euthanasia in severely ill newborns, published in 2005. Before publication, an estimated 20 cases of euthanasia per year were performed. After publication, only two cases in five years were reported. Studies suggested that this might be partly caused by the lack of consensus about the dividing line between euthanasia and palliative care. New recommendations about paralytic medication use in dying newborns were issued to increase transparency and to improve reporting of euthanasia. New surveys will be needed to measure the effects of these interventions. This cycle of interventions and measurements seems useful for continuous improvement of end-of-life care in newborns.

A.A. Eduard Verhagen

2014-01-01T23:59:59.000Z

93

Summary Protocol: Identification, Characterization, Designation, Remedial  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary Protocol: Identification, Characterization, Designation, Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) More Documents & Publications Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol Pre-MARSSIM Surveys in a MARSSIM World: Demonstrating How Pre-MARSSIM Radiological Data Demonstrate Protectiveness at Formerly Utilized Sites Remedial Action Program Sites U.S. Department of Energy Guidelines for Residual Radioactive Material at

94

Building Technologies Office: House Simulation Protocols Report  

NLE Websites -- All DOE Office Websites (Extended Search)

House Simulation House Simulation Protocols Report to someone by E-mail Share Building Technologies Office: House Simulation Protocols Report on Facebook Tweet about Building Technologies Office: House Simulation Protocols Report on Twitter Bookmark Building Technologies Office: House Simulation Protocols Report on Google Bookmark Building Technologies Office: House Simulation Protocols Report on Delicious Rank Building Technologies Office: House Simulation Protocols Report on Digg Find More places to share Building Technologies Office: House Simulation Protocols Report on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America Research Innovations Research Tools Building Science Education Climate-Specific Guidance Solution Center

95

The Groningen Protocol — Euthanasia in Severely Ill Newborns  

Science Journals Connector (OSTI)

...prosecutors. To provide all the information needed for assessment and to prevent interrogations by police officers, we developed a protocol, known as the Groningen protocol, for cases in which a decision is made to actively end the life of a newborn. During the past few months, the international press has been... Drs. Eduard Verhagen and Pieter Sauer state that of the 200,000 children born in the Netherlands every year, about 1000 die during the first year of life. For 600 of these infants, death is preceded by a medical decision regarding the end of life. The ...

Verhagen E.; Sauer P.J.J.

2005-03-10T23:59:59.000Z

96

E-Print Network 3.0 - additional protocol ratification Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

of Stuttgart Poul Erik Morthorst, Ris National Laboratory Summary: .1.2 Scenario: Russia ratifies the Protocol While the case of ratification only by the EU shows result in a...

97

Shear Transformation Zones: State Determined or Protocol Dependent?  

E-Print Network (OSTI)

The concept of a Shear Transformation Zone (STZ) refers to a region in an amorphous solid that undergoes a plastic event when the material is put under an external mechanical load. An important question that had accompanied the development of the theory of plasticity in amorphous solids for many years now is whether an STZ is a {\\em region} existing in the material (which can be predicted by analyzing the unloaded material), or is it an {\\em event} that depends on the loading protocol (i.e., the event cannot be predicted without following the protocol itself). In this Letter we present strong evidence that the latter is the case. Infinitesimal changes of protocol result in macroscopically big jumps in the positions of plastic events, meaning that these can never be predicted from considering the unloaded material.

Oleg Gendelman; Prabhat K. Jaiswal; Itamar Procaccia; Bhaskar Sen Gupta; Jacques Zylberg

2014-08-18T23:59:59.000Z

98

Experimental study on the thorium-loaded accelerator-driven system at the Kyoto Univ. critical assembly  

SciTech Connect

The experimental study on the thorium-loaded accelerator-driven system (ADS) is conducted in the Kyoto Univ. Critical Assembly (KUCA). The experiments are carried out in both the critical and subcritical states for attaining the reaction rates of the thorium capture and fission reactions. In the critical system, the thorium plate irradiation experiment is carried out for the thorium capture and fission reactions. From the results of the measurements, the thorium fission reactions are obtained apparently in the critical system, and the C/E values of reaction rates show the accuracy of relative difference of about 30%. In the ADS experiments with 14 MeV neutrons and 100 MeV protons, the subcritical experiments are carried out in the thorium-loaded cores to obtain the capture reaction rates through the measurements of {sup 115}In(n, {gamma}){sup 116m}In reactions. The results of the experiments reveal the difference between the reaction rate distributions for the change in not only the neutron spectrum but also the external neutron source. The comparison between the measured and calculated reaction rate distributions demonstrates a discrepancy of the accuracy of reaction rate analyses of thorium capture reactions through the thorium-loaded ADS experiments with 14 MeV neutrons. Hereafter, kinetic experiments are planned to be carried out to deduce the delayed neutron decay constants and subcriticality using the pulsed neutron method. (authors)

Pyeon, C. H.; Yagi, T.; Lim, J. Y.; Misawa, T. [Nuclear Science Engineering Div., Research Reactor Inst., Kyoto Univ., Asashiro-nishi, Kumatori-cho, Sennan-gun, Osaka 590-0494 (Japan)

2012-07-01T23:59:59.000Z

99

UCSB Distressed Students Response Protocol  

E-Print Network (OSTI)

about a student, provide referrals to campus departments, develop action plans, and follow up academic or personal issues REFERRAL IDENTIFIERS: Student distress may manifest in behavior Student Protocol will assist you in responding to the student and providing appropriate referrals. Student

California at Santa Barbara, University of

100

Library Protocol Safety and Security  

E-Print Network (OSTI)

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Accelerated Stress Test Protocols for PEM...

102

Membrane and MEA Accelerated Stress Test Protocols | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Membrane and MEA Accelerated Stress Test Protocols Membrane and MEA Accelerated Stress Test Protocols This presentation on fuel cell membrane and MEA stress test protocols was...

103

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells This document describes test protocols...

104

Knowledge Flow Analysis for Security Protocols  

E-Print Network (OSTI)

Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this ...

Torlak, Emina

2005-10-19T23:59:59.000Z

105

Computer Networking : Principles, Protocols and Practice  

E-Print Network (OSTI)

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure December 24 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 3.8 The Transmission Control Protocol

Bonaventure, Olivier

106

Computer Networking : Principles, Protocols and Practice  

E-Print Network (OSTI)

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure September 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 3.8 The Transmission Control Protocol

Bonaventure, Olivier

107

TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM  

E-Print Network (OSTI)

RFC: 793 TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 Admiralty Way Marina del Rey, California 90291 #12;#12;September 1981 Transmission Control Protocol TABLE ........................................... 12 2.9 Precedence and Security ...................................... 13 2.10 Robustness Principle

McBrien, Peter

108

Independent Oversight Appraisal Process Protocols  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

109

Independent Oversight Appraisal Process Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

110

Chapter 14: Chiller Evaluation Protocol  

SciTech Connect

This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

Tiessen, A.

2014-09-01T23:59:59.000Z

111

Multiple protocol fluorometer and method  

DOE Patents (OSTI)

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

112

Evaluation of a Swiss carbon tax with the Computable General Equilibrium Model  

E-Print Network (OSTI)

of the Kyoto protocol in Switzerland with and without international emissions trading [7], or assess

Lausanne, Ecole Polytechnique Fédérale de

113

Kyoto University International Center  

E-Print Network (OSTI)

and Astronautics, Nuclear Engineering, (6-year program) Faculty of Engineering Bachelor of Engineering Global Engineering, Architecture, Engineering Science, Electrical and Electronic Engineering, Informatics and Mathematical Science, Industrial

Takada, Shoji

114

Transportation Protocols Working Group First Conference Call...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

115

SSF Experimental Protocols -- Lignocellulosic Biomass Hydrolysis...  

NLE Websites -- All DOE Office Websites (Extended Search)

SSF Experimental Protocols - Lignocellulosic Biomass Hydrolysis and Fermentation Laboratory Analytical Procedure (LAP) Issue Date: 10302001 N. Dowe and J. McMillan Technical...

116

ESPC ENABLE Measurement and Verification Protocol  

Energy.gov (U.S. Department of Energy (DOE))

Document provides an overview of the Measurement and Verification (M&V) Protocol utilized within ENABLE energy savings performance contract projects.

117

Superior Energy Performance Measurement and Verification Protocol...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

and Verification Protocol for Industry (November 2012) More Documents & Publications Energy Intensity Baselining and Tracking Guidance EnPI V4.0 Tool Algorithm Superior Energy...

118

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol  

E-Print Network (OSTI)

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol Xi in this paper. The proposed protocol is not only fair and optimistic, but also efficient and abuse the Internet. In such scenario, fairness is critical, because they may be potentially mistrusted. That is

119

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network (OSTI)

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

120

Adaptive best effort protocols for video delivery  

E-Print Network (OSTI)

This thesis describes the design and implementation of ics. transport level protocols running on top of the IP layer to transmit video data over packet switched networks. These protocols address the issues of meeting real-time deadlines of the video...

Madhwaraj, Ashwin Raj

2012-06-07T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Advantages of a Leveled Commitment Contracting Protocol  

E-Print Network (OSTI)

Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R. Lesser 7, 1995 #12; Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R, contracts have traditionally been binding. Such contracts do not al­ low agents to efficiently accommodate

Massachusetts at Amherst, University of

122

The Bitcoin Backbone Protocol: Analysis and Applications  

E-Print Network (OSTI)

The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay.leonardos@gmail.com November 16, 2014 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone

123

House Simulation Protocols Report | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Residential Buildings » Building America » House Simulation Residential Buildings » Building America » House Simulation Protocols Report House Simulation Protocols Report This image shows a cover of a report titled Building America House Simulation Protocols. The Building America logo is shown in the lower left corner of the report cover. Building America's House Simulation Protocols report is designed to assist researchers in tracking the progress of multiyear, whole-building energy reduction against research goals for new and existing homes. These protocols are preloaded into BEopt and use a consistent approach for defining a reference building, so that all projects can be compared to each other. The steps involved in conducting performance analysis include: Defining the appropriate reference building Various climate regions, house sizes, and house ages require slightly

124

Cryptanalysis of the arbitrated quantum signature protocols  

SciTech Connect

As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

2011-08-15T23:59:59.000Z

125

DAD-MPR Flooding Protocol, Convergence Evaluation Through Simulation  

Science Journals Connector (OSTI)

In this paper, we present the convergence evaluation of DAD-MPR flooding protocol through simulation. DAD-MPR flooding protocol is the autoconfiguration protocol we proposed ... OLSR nodes with multiple interface...

Saadi Boudjit; Cédric Adjih; Paul Muhlethaler

2007-01-01T23:59:59.000Z

126

Protective Force Protocols for ESS Supported Performance Tests...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12,...

127

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Ash Loading Protocol Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on Diesel Aftertreatment (Agreement 13415) Neutron Imaging of Advanced Engine Technologies...

128

International performance measurement and verification protocol for new construction  

E-Print Network (OSTI)

Performance Measurement and Verification Protocol for New1. INTRODUCTION Measurement and Verification (M&V) of energyPerformance Measurement & Verification Protocol.

2002-01-01T23:59:59.000Z

129

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol...

130

A Discussion of Testing Protocols and LANL's Contribution to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes...

131

Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx | Department...  

Office of Environmental Management (EM)

Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx More Documents & Publications Slide 1 LPP Risk Management Plan...

132

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Download the webinar slides from the U.S. Department...

133

A Case Study of a Commissioning Process for Demand Side Energy Conservation of the Large Heat Source Plant in Kyoto Station Building-APCBC  

E-Print Network (OSTI)

-09-20 Proceedings of the 14th International Conference for Enhanced Building Operations, Beijing, China, September 14-17, 2014 21 Total effect by turning for both substation and plant control (FY2011 vs FY2013) ? The electric power consumption compared for 3 years.... ? In the first year (FY2012), we carried out only the parameter tuning for substation control based on the data analysis. ? In the second year (FY2013), we carried out the control parameter tuning of the heat source side in addition to the tuning...

Matsushita, N.; Yoshida,H.

2014-01-01T23:59:59.000Z

134

STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING  

SciTech Connect

Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

2002-02-25T23:59:59.000Z

135

PEP Classroom Observation Protocol Project # _______ District __________________________ School ________________________________________  

E-Print Network (OSTI)

PEP Classroom Observation Protocol Project # _______ District __________________________ School (mark all that apply) Demonstrate or confirm known concepts/procedures Demonstrate or confirm known concepts/procedures Explore ideas, test conjectures, look for patterns Explore ideas, test conjectures

Lee, Carl

136

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network (OSTI)

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

137

Entanglement Distillation Protocols and Number Theory  

E-Print Network (OSTI)

We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension $D$ benefits from applying basic concepts from number theory, since the set $\\zdn$ associated to Bell diagonal states is a module rather than a vector space. We find that a partition of $\\zdn$ into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analitically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension $D$. When $D$ is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

H. Bombin; M. A. Martin-Delgado

2005-03-01T23:59:59.000Z

138

Entanglement distillation protocols and number theory  

SciTech Connect

We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z{sub D}{sup n} associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z{sub D}{sup n} into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

Bombin, H.; Martin-Delgado, M.A. [Departamento de Fisica Teorica I, Universidad Complutense, 28040 Madrid (Spain)

2005-09-15T23:59:59.000Z

139

Adaptive protocols for the quantum depolarizing channel  

E-Print Network (OSTI)

In the first part, we present a family of entanglement purification protocols that generalize four previous methods, namely the recurrence method, the modified recurrence method, and the two methods proposed by Maneva-Smolin ...

Leung, Alan W

2007-01-01T23:59:59.000Z

140

NREL Test-to-Failure Protocol (Presentation)  

SciTech Connect

The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

Hacke, P.

2012-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Membrane and MEA Accelerated Stress Test Protocols  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and MEA Accelerated Stress Test Protocols Presented at High Temperature Membrane Working Group Meeting Washington, DC May 14, 2007 T.G. Benjamin Argonne National Laboratory 2 0 10...

142

BPA's Proposed Oversupply Management Protocol Presentation  

NLE Websites -- All DOE Office Websites (Extended Search)

M I N I S T R A T I O N BPA's Proposed Oversupply Management Protocol February 14, 2012 BPA Rates Hearing Room To participate by phone please call (888) 296-1938 and enter 563088...

143

Sensornet Protocol Tuning Using Principled Engineering Methods  

Science Journals Connector (OSTI)

......equally applicable to both energy-ignorant and energy-aware protocols...reasons including high cost, risk of low solution...3. 2. RELATED WORK Energy awareness and energy...typically small and non- renewable. Energy consumption......

Jonathan Tate; Iain Bate

2010-09-01T23:59:59.000Z

144

Verifying multicast-based security protocols using the inductive method  

Science Journals Connector (OSTI)

Multicast, originally designed as an efficient way of broadcasting content, is being used in security protocols. Multicast security protocols are difficult to verify using model checking because they typically involve a large number of participants. ... Keywords: formal verification, multicast protocols, security protocols

Jean E. Martina; Lawrence C. Paulson

2013-03-01T23:59:59.000Z

145

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network (OSTI)

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan Vaidyanathan-point of proposing a new transport protocol called ATP #12;Outline Problems with TCP ATP design elements ATP Protocol to the characteristics of the reverse path in wireline networks #12;ATP: Ad-hoc Transport Protocol TCP's components

Sivakumar, Raghupathy

146

Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software  

E-Print Network (OSTI)

time.   Savings   measurement   and   verification   (M&V)  Performance   Measurement   and   Verification   Protocol:  

Jump, David

2014-01-01T23:59:59.000Z

147

FLIP: an Internetwork Protocol for Supporting Distributed Systems  

E-Print Network (OSTI)

are not well supported by protocols such as TCP/IP, X.25, and OSI TP4. As part of our ongoing research protocol, called FLIP (Fast Local Internet Protocol), is the subject of this paper. Although the ISO OSI a byte�stream protocol like TCP or OSI TP4

148

FLIP: an Internetwork Protocol for Supporting Distributed Systems  

E-Print Network (OSTI)

of communication are not well supported by protocols such as TCP/IP, X.25, and OSI TP4. As part of our ongoing. Although the ISO OSI protocols are not widely used, the OSI model is con- venient for describing where-performance RPC protocol rather than a byte-stream protocol like TCP or OSI TP4

Tanenbaum, Andrew S.

149

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells  

Energy.gov (U.S. Department of Energy (DOE))

Accelerated Stress Test Protocols for PEM Fuel Cells, Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies

150

Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Refueling Hydrogen Refueling Protocols Webinar (Text Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications

151

Presentation 2.8: Program for the conversion of Russian municipal boilers with 20MW maximum capacity to biofuel due to funds from the emissions reduction units sell, under the Kyoto Protocol  

E-Print Network (OSTI)

economy in XXI century · High consumption of basic and service equipment · Low efficiency of equipment. roubles. Reconstruction period: 3 months Basic results: · Increased boiler's efficiency factor from 50Presentation 2.8: Program for the conversion of Russian municipal boilers with 20MW maximum

152

Bounds for nonlocality distillation protocols  

SciTech Connect

Nonlocality can be quantified by the violation of a Bell inequality. Since this violation may be amplified by local operations, an alternative measure has been proposed--distillable nonlocality. The alternative measure is difficult to calculate exactly due to the double exponential growth of the parameter space. In this paper, we give a way to bound the distillable nonlocality of a resource by the solutions to a related optimization problem. Our upper bounds are exponentially easier to compute than the exact value and are shown to be meaningful in general and tight in some cases.

Forster, Manuel [Computer Science Department, ETH Zuerich, CH-8092 Zuerich (Switzerland)

2011-06-15T23:59:59.000Z

153

A calculus for cryptographic protocols: The spi calculus  

E-Print Network (OSTI)

We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as processes in the spi calculus and state their security properties in terms of coarsegrained notions of protocol equivalence.

Martin Abadi; Andrew D. Gordon

1999-01-01T23:59:59.000Z

154

Hybrid protocol of remote implementations of quantum operations  

E-Print Network (OSTI)

We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum state teleportation's (BQST) and Wang's one. The protocol is available for remote implemetations of quantum operations in the restricted sets specified in Sec. III. We also give the proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to BQST and Wang protocols.

Ning Bo Zhao; An Min Wang

2007-08-04T23:59:59.000Z

155

Interpolation of recurrence and hashing entanglement distillation protocols  

SciTech Connect

We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

Vollbrecht, Karl Gerd H.; Verstraete, Frank [Max-Planck-Institut fuer Quantenoptik, Hans-Kopfermann-Str. 1, D-85748 Garching (Germany)

2005-06-15T23:59:59.000Z

156

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS  

E-Print Network (OSTI)

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS #12 ASSESSMENT IN THE NETHERLANDS Published VSNU, KNAW and NWO 2009 This document is available through internet: Royal Netherlands Academy of Arts and Sciences (KNAW) The Academy's mission: As the forum, conscience

Franssen, Michael

157

Chapter 15: Commercial New Construction Protocol  

SciTech Connect

This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

Keates, S.

2014-09-01T23:59:59.000Z

158

Chapter 22: Compressed Air Evaluation Protocol  

SciTech Connect

Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

Benton, N.

2014-11-01T23:59:59.000Z

159

ITC Filing of Operational Protocols - August 9, 2011 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ITC Filing of Operational Protocols - August 9, 2011 ITC Filing of Operational Protocols - August 9, 2011 ITC Filing of Operational Protocols - August 9, 2011 These supplemental comments complete ITC's response to the comments filed in this proceeding in March, 2009 by the Midwest Independent Transmission System Operator, Inc., and the Independent Electricity System Operator of Ontario. The operational agreements required to complete ITC's application in this case are attached to the supplemental comments, and ITC respectfully requests that the application be approved as promptly as possible. DOE_Docket_No_PP-230-4_8-9-2011_Public.pdf More Documents & Publications Application for Presidential permit OE Docket No. PP-230-4 International Transmission Company: Comments and Supplemental Documents Application for Presidential Permit OE Docket No. PP-230-4 International

160

Protocol, Small Team Oversight Activities - June 2012 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Small Team Oversight Activities - June 2012 Small Team Oversight Activities - June 2012 Protocol, Small Team Oversight Activities - June 2012 June 2012 Protocol for Small Team Oversight Activities The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing an Office of Health, Safety and Security (HSS) small team oversight activity. These activities are the primary means of gathering independent performance data to support the independent oversight function. This protocol further discusses and categorizes these activities as oversight and operational awareness activities. Protocol, Small Team Oversight Activities - June 2012 More Documents & Publications Protocol, Site Leads - May 2011 Independent Oversight Assessment, Waste Treatment and Immobilization Plant

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Secure SCADA Communication ProtocolPerformance Test Results | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Communication ProtocolPerformance Test Results SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication Protocol Performance Test Results More Documents & Publications AGA-12, Part 2 Performance Test Results AGA 12, Part 2 Performance Test Plan Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device

162

Optimal Decentralized Protocols for Electric Vehicle Charging  

E-Print Network (OSTI)

1 Optimal Decentralized Protocols for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low Abstract--We propose decentralized algorithms for optimally scheduling electric vehicle (EV) charging. The algorithms exploit the elasticity and controllability of electric vehicle loads in order to fill the valleys

Low, Steven H.

163

Measuring Transport Protocol Potential for Energy Efficiency  

E-Print Network (OSTI)

Measuring Transport Protocol Potential for Energy Efficiency S. Kontogiannis, L. Mamatas, I. Psaras, Greece {skontog, emamatas, ipsaras, vtsaousi}@ee.duth.gr Abstract. We investigate the energy-saving potential of transport pro- tocols. We focus on the system-related aspect of energy. Do we have to damage

Tsaoussidis, Vassilis

164

Utility, informativity and protocols Robert van Rooy  

E-Print Network (OSTI)

Utility, informativity and protocols Robert van Rooy ILLC/University of Amsterdam R particular natural assumptions the utility of questions and answers reduces to their informativity, and that the ordering relation induced by utility sometimes even reduces to the logical relation of entailment

van Rooij, Robert

165

Transport Control Protocol (TCP) In Heterogeneous Networks  

E-Print Network (OSTI)

Sprint Transport Control Protocol (TCP) In Heterogeneous Networks Objectives · Principles of TCP functional modules: slow start, congestion avoidance, fast transmission and fast recovery. ­ Maintain · Packet dropping is the only indication signal for network congestion (Maybe?) · Different transmission

Shihada, Basem

166

Routing protocols in ad hoc networks  

Science Journals Connector (OSTI)

Ad hoc networking involves computers, typically wireless mobile nodes (MNs), that cooperatively form a network without specific user administration or configuration. In other words, ad hoc networking allows an arbitrary collection of MNs to create a ... Keywords: associativity-based routing (ABR), distributed bellman-ford (DBF), dynamic source routing (DSR), on-demand routing protocols

Dan Galatchi; Roxana Zoican

2005-03-01T23:59:59.000Z

167

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

DOE Webinar Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol U.S. DOE WEBINAR ON H2 FUELING PROTOCOLS: PARTICIPANTS Rob Burgess Moderator Jesse Schneider TIR J2601,...

168

A New Protocol for Evaluating Concrete Curing Effectiveness  

E-Print Network (OSTI)

and qualify the curing compound, a new evaluation protocol is introduced in this study. The new protocol consists of using measured relative humidity and temperature to calculate an effectiveness index (EI) which serves as an indicator of the effectiveness...

Sun, Peizhi

2013-07-22T23:59:59.000Z

169

THE HISTORY, TECHNOLOGY, AND CARE OF FOLDING SCREENS: CASE STUDIES OF THE CONSERVATION TREATMENT OF  

E-Print Network (OSTI)

Kyoto congress, Kyoto, 19-23 September 1988 / Mills, John (ed.); Smith, Perry (ed.); Yamasaki, Kazuo (ed screen; translates roughly as 'protection from the wind' (Also referred to in English as 'beoube

Mathis, Wayne N.

170

Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley  

E-Print Network (OSTI)

and relies on the skill of the protocol designer. Saidi [32] proposes a semi-automatic design tool based

Foley, Simon

171

Using CSP for protocol analysis: the Needham-Schroeder  

E-Print Network (OSTI)

Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

Doran, Simon J.

172

ESTR -Energy Saving Token Ring Protocol for Wireless Sensor Networks  

E-Print Network (OSTI)

ESTR - Energy Saving Token Ring Protocol for Wireless Sensor Networks Faruk Bagci, Theo Ungerer a long lifetime of the sensor network and the application it is important to save energy. A sensor node control (MAC) protocol for wireless sensor networks, called Energy Saving Token Ring Protocol (ESTR). ESTR

Ungerer, Theo

173

A semantic translation method for data communication protocols  

Science Journals Connector (OSTI)

Protocol translation is a method for transforming pieces of information from a source protocol into relevant target protocol formats in order to communicate between heterogeneous legacy systems in interoperability environments. There are some existing ... Keywords: Gateway system, Heterogeneous system, Interoperability, Message translation, Semantic translation, Semantic-centric communication

Jingyu Kim; Sungwon Kang; Jihyun Lee; Bong Wan Choi

2012-12-01T23:59:59.000Z

174

A Program Logic for Verifying Secure Routing Protocols  

E-Print Network (OSTI)

reasoning. Existing protocol analysis tools [7, 12, 14] are rarely used in analyzing rout- ing protocolsA Program Logic for Verifying Secure Routing Protocols Chen Chen1 , Limin Jia2 , Hao Xu1 , Cheng done to understand and verify the formal security guarantees of proposed secure inter-domain routing

Pennsylvania, University of

175

A Program Logic for Verifying Secure Routing Protocols  

E-Print Network (OSTI)

protocol analysis tools [7, 11, 13] are rarely used in analyzing routing protocols becauseA Program Logic for Verifying Secure Routing Protocols (Technical Report) Chen Chen1 , Limin Jia2 done to understand and verify the formal security guarantees of proposed secure inter-domain routing

Sandholm, Tuomas W.

176

A Formal Framework for Secure Routing Protocols Wenchao Zhou3  

E-Print Network (OSTI)

verifies its security claims. Existing model-checking-based protocol analysis tools cannot be directlyA Formal Framework for Secure Routing Protocols Chen Chen1 Limin Jia2 Hao Xu1 Cheng Luo1 Wenchao routing protocol, is vulner- able to various attacks. Redesigns of Internet routing infrastructure (e.g. S

Sandholm, Tuomas W.

177

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network (OSTI)

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan, Vaidyanathan protocol for ad-hoc net- works called ATP (ad-hoc transport protocol). We show through ns2 based simulations that ATP outperforms both default TCP and TCP-ELFN. Categories and Subject Descriptors C.2

Sivakumar, Raghupathy

178

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network (OSTI)

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

179

Utilisation des Protocoles HARQ pour la Radio Cognitive  

E-Print Network (OSTI)

Utilisation des Protocoles HARQ pour la Radio Cognitive Romain Tajan encadré/01/2012 #12;Plan 1 Introduction 2 La Radio Cognitive Techniques de la Radio Cognitive Méthodes d'accès 3 performances du protocole IR-HARQ 4 Utilisation des protocoles HARQ pour la Radio Cognitive Utilisation de l

Dobigeon, Nicolas

180

Simplified VO M&V Protocol Simplified Voltage Optimization (VO)  

E-Print Network (OSTI)

Simplified VO M&V Protocol 1 Simplified Voltage Optimization (VO) Measurement and Verification Protocol 1.0 Introduction 1.1 Purpose The Simplified Voltage Optimization (VO) Measurement and Verification requirements, and measurement and verification formulations are included as part of this Protocol. 1

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

A Multi-Sender Asynchronous Extension to the AER Protocol  

E-Print Network (OSTI)

A Multi-Sender Asynchronous Extension to the AER Protocol John Lazzaro and John Wawrzynek Computer-event representation (AER) is an asynchronous point-to-point communi- cations protocol for silicon neural systems. This paper describes an extension of the AER protocol that allows multiple AER senders to share a common bus

Lazzaro, John

182

Lab protocols A. Preparation of competent Cells  

E-Print Network (OSTI)

for 30- 60 min. #12;Lab protocols C. Solutions RF1 Compound RbCl MnCl2 4H2O Potassium acetate CaCl2.2H2O-rinsed 0.22 u membrane. RF2 Compound MOPS RbCl CaCl2.2H2O Glycerol Amount/liter 20 ml of 0.5 M (pH6.8) 1

Oliver, Douglas L.

183

Building America 2014 House Simulation Protocols  

Energy.gov (U.S. Department of Energy (DOE))

The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

184

Nuclear Energy Governance and the Politics of Social Justice: Technology, Public Goods, and Redistribution in Russia and France  

E-Print Network (OSTI)

Energy Agency. "Nuclear Energy and the Kyoto Protocol" OECD/Energy Agency. "Nuclear Energy and the Kyoto Protocol" OECD/et al. "Perception of Nuclear Energy and Coal in France and

Grigoriadis, Theocharis N

2009-01-01T23:59:59.000Z

185

A new fair non-repudiation protocol for secure negotiation and contract signing  

Science Journals Connector (OSTI)

In some scenarios, such as B2B or IPR contracting, or by legal requirement, the participation of an e-notary in the contract signing is required in many cases, that is, an on-line TTP. This e-notary gives validity to the contract or performs some tasks ... Keywords: abuse freeness, confidentiality, contract negotiation, contract signing protocol, e-commerce, fair-exchange, security

A. Ruiz-Martínez; C. I. Marín-López; L. Baño-López; A. F. Gómez Skarmeta

2006-10-01T23:59:59.000Z

186

Protocol, Site Leads - May 2011 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 May 2011 Protocol for Site Leads The purpose of this protocol is to establish the requirements and responsibilities for the Office of Safety and Emergency Management Evaluations Site Leads. The Site Lead's primary responsibility is to perform independent safety oversight at their assigned site(s). Site Leads are assigned to Department of Energy (DOE) sites with nuclear facilities to maintain operational awareness, establish and implement a prioritized set of oversight activities focused on high hazard nuclear facilities and tailored to site conditions, activities and issues. Protocol, Site Leads - May 2011 More Documents & Publications Appraisal Process Protocols, Independent Oversight - November 2012

187

Building Technologies Office: Open-Protocol Platform for Commercial  

NLE Websites -- All DOE Office Websites (Extended Search)

Open-Protocol Platform Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project to someone by E-mail Share Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Facebook Tweet about Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Twitter Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Google Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Delicious Rank Building Technologies Office: Open-Protocol Platform for

188

An Implementation of the PCP, SRP, DPCP, MPCP, and FMLP RealTime Synchronization Protocols in LITMUS RT  

E-Print Network (OSTI)

An Implementation of the PCP, SRP, D­PCP, M­PCP, and FMLP Real­Time Synchronization Protocols­case blocking bounds. Further, we present the first implementation of the PCP, SRP, D­PCP, M­PCP, and FMLP to the PCP, Baker proposed the stack resource policy (SRP) [4]. Both the SRP and the PCP have received

Anderson, James

189

KYOTO UNIVERSITYKYOTO UNIVERSITY Kyoto University Financial Report 2013 09  

E-Print Network (OSTI)

Report 201312 #12; 30 11 13AUN 2ASEAN+3 Educational Forum and Young Speakers Contest3 AUNASEAN University Network21 ASEAN+3 4 ASEAN+3 24 ...... 3,027 ...... 3,447 2451 ......13,403 ...... 9 Century Collections Online 1 KULINE 13AUN2 ASEAN+3 Educational Forum and Young Speakers Contest 6

Takada, Shoji

190

2014 Building America House Simulation Protocols  

SciTech Connect

As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

2014-03-01T23:59:59.000Z

191

Robust video authentication system over internet protocol  

Science Journals Connector (OSTI)

This paper presents a video authentication system over internet protocol that is insusceptible to illumination and expression variations. The illumination and expression invariant features are extracted using multi-band feature extraction. These features are classified by a radial basis function neural network. A new adaptive decision fusion method is proposed to combine the scores from different modalities and the different frames during the authentication process. Three levels of decision fusion are carried out in the proposed adaptive decision fusion. Depending on the level of decision fusion, the level of illumination influence is taken into account during the decision making.

Sue Inn Ch'ng; Kah Phooi Seng; Li-Minn Ang; Fong Tien Ong; Yee Wan Wong

2011-01-01T23:59:59.000Z

192

Kyoto University 1 Year Contents  

E-Print Network (OSTI)

and Plasma Physics Laboratory merged into the Institute of Advance Energy. Student Counseling Center in Humanities established. 1941 Chest Disease Research Institute and Institute of Atomic Energy established Laboratory established. 1996 Graduate School of Energy Science established. Institute of Atomic Energy

Takada, Shoji

193

Kyoto University 1 Year Contents  

E-Print Network (OSTI)

and Plasma Physics Laboratory merged into the Institute of Advance Energy. Student Counseling Center Chest Disease Research Institute and Institute of Atomic Energy established. 1944 Wood Research Laboratory established. 1996 Graduate School of Energy Science established. Institute of Atomic Energy

Takada, Shoji

194

KYOTO UNIVERSITYKYOTO UNIVERSITY Financial Report  

E-Print Network (OSTI)

Report 201312 #12; 30 11 13AUN 2ASEAN+3 Educational Forum and Young Speakers Contest3 AUNASEAN University Network21 ASEAN+3 4 ASEAN+3 24 ...... 3,027 ...... 3,447 2451 ......13,403 ...... 9 Century Collections Online 1 KULINE 13AUN2 ASEAN+3 Educational Forum and Young Speakers Contest 6

Takada, Shoji

195

GGREENHOUSE JJUSTICE MOVING BEYOND KYOTO  

E-Print Network (OSTI)

and forestry MtC Million tons carbon MtCO2-e Million tons carbon dioxide equivalent OECD Organization equivalent UNFCCC United Nations Framework Convention on Climate Change WTO World Trade Organization #12 or constructive engagement. Essentially, actions of many in civil society now con- stitute resistance to the COP

Delaware, University of

196

PROCEEDINGS OF RIKEN BNL RESEARCH CENTER WORKSHOP ON RHIC SPIN PHYSICS III AND IV, POLARIZED PARTONS AT HIGH Q2 REGION, AUGUST 3, 2000 AT BNL, OCTOBER 14, 2000 AT KYOTO UNIVERSITY.  

SciTech Connect

International workshop on II Polarized Partons at High Q2 region 11 was held at the Yukawa Institute for Theoretical Physics, Kyoto University, Kyoto, Japan on October 13-14, 2000, as a satellite of the international conference ''SPIN 2000'' (Osaka, Japan, October 16-21,2000). This workshop was supported by RIKEN (The Institute of Physical and Chemical Research) and by Yukawa Institute. The scientific program was focused on the upcoming polarized collider RHIC. The workshop was also an annual meeting of RHIC Spin Collaboration (RSC). The number of participants was 55, including 28 foreign visitors and 8 foreign-resident Japanese participants, reflecting the international nature of the RHIC spin program. At the workshop there were 25 oral presentations in four sessions, (1) RHIC Spin Commissioning, (2) Polarized Partons, Present and Future, (3) New Ideas on Polarization Phenomena, (4) Strategy for the Coming Spin Running. In (1) the successful polarized proton commissioning and the readiness of the accelerator for the physics program impressed us. In (2) and (3) active discussions were made on the new structure function to be firstly measured at RHIC, and several new theoretical ideas were presented. In session (4) we have established a plan for the beam time requirement toward the first collision of polarized protons. These proceedings include the transparencies presented at the workshop. The discussion on ''Strategy for the Coming Spin Running'' was summarized by the chairman of the session, S. Vigdor and G. Bunce.

BUNCE, G.; VIGDOR, S.

2001-03-15T23:59:59.000Z

197

Security Proof of a Semi-Quantum Key Distribution Protocol  

E-Print Network (OSTI)

Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their security analysis is difficult and little is known concerning how secure they are compared to their fully quantum counterparts. In this paper we prove the unconditional security of a particular semi-quantum protocol. We derive an expression for the key rate of this protocol, in the asymptotic scenario, as a function of the quantum channel's noise. Finally, we will show that this semi-quantum protocol can tolerate a maximal noise level comparable to certain fully quantum protocols.

Walter O. Krawec

2014-11-30T23:59:59.000Z

198

The Greenhouse Gas Protocol Initiative: Sector Specific Tools | Open Energy  

Open Energy Info (EERE)

Gas Protocol Initiative: Sector Specific Tools Gas Protocol Initiative: Sector Specific Tools Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Sector Specific Tools Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Industry, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity[1] The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion[2] The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources[3]

199

Error tolerance of two-basis quantum-key-distribution protocols using qudits and two-way classical communication  

SciTech Connect

We investigate the error tolerance of quantum cryptographic protocols using d-level systems. In particular, we focus on prepare-and-measure schemes that use two mutually unbiased bases and a key-distillation procedure with two-way classical communication. For arbitrary quantum channels, we obtain a sufficient condition for secret-key distillation which, in the case of isotropic quantum channels, yields an analytic expression for the maximally tolerable error rate of the cryptographic protocols under consideration. The difference between the tolerable error rate and its theoretical upper bound tends slowly to zero for sufficiently large dimensions of the information carriers.

Nikolopoulos, Georgios M.; Ranade, Kedar S.; Alber, Gernot [Institut fuer Angewandte Physik, Technische Universitaet Darmstadt, 64289 Darmstadt (Germany)

2006-03-15T23:59:59.000Z

200

Separable states improve protocols with restricted randomness  

E-Print Network (OSTI)

It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterise the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models and separable, i.e. disentangled, states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that in particular, separable states may improve the so-called random access codes, which is a class of communication problems where one party tries to read a portion of the data held by another distant party in presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord.

T. K. Chuan; T. Paterek

2014-10-07T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Fibred Coalgebraic Logic and Quantum Protocols  

E-Print Network (OSTI)

Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

Daniel Marsden

2014-12-30T23:59:59.000Z

202

Chapter 18: Variable Frequency Drive Evaluation Protocol  

SciTech Connect

An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

Romberger, J.

2014-11-01T23:59:59.000Z

203

ASHRAE's New Performance Measurement Protocols for Commercial Buildings  

E-Print Network (OSTI)

Services Administration. 10 IEA is the International Energy Agency. ESL-IC-08-10-11 Proceedings of the Eighth International Conference for Enhanced Building Operations, Berlin, Germany, October 20-22, 2008 2 The resultant protocols are intended to provide... Building Operations, Berlin, Germany, October 20-22, 2008 3 Chapter 1: Energy (Authors: MacDonald, Haberl). In Chapter 1 the protocols for measuring the building?s energy useare presented. These protocols begin with acollection of facility information...

Haberl, J.; Davies, H.; Owens, B.; Hunn, B.

204

XML-based security for JXTA core protocols  

Science Journals Connector (OSTI)

JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form autonomous peer groups. This paper presents a satisfactory ... Keywords: JXTA, P2P computing, PRP, XML, XMLdsig, XMLenc, ad hoc computing, authenticity, integrity, multi-hop computing, non-repudiation, peer, peer group, peer resolver protocol, peer-to-, pervasive computing, privacy, security

Joan Arnedo-Moreno; Jordi Herrera-Joancomarti

2010-12-01T23:59:59.000Z

205

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Stationary Combustion Guidance[1] The Greenhouse Gas Protocol tool for stationary combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

206

Formal Modelling and Analysis of the NORM Multicast Protocol  

E-Print Network (OSTI)

Formal Modelling and Analysis of the NORM Multicast Protocol Using Real-Time Maude Elisabeth Lien . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 iii #12;2.3.2 Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Ã?lveczky, Peter Csaba

207

Security Communications Protocol Ad Hoc Working Group | Department...  

Office of Environmental Management (EM)

Protocol Ad Hoc Working Group More Documents & Publications Overview for Newcomers Isotope Program Transportation Shipping Radioactive Waste by Rail from Brookhaven National...

208

Protocol, Appraisal Process Guide - April 2008 | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Independent Oversight Appraisal Process Protocols, which describe the overall philosophy, scope, and general procedures applicable to all Independent Oversight appraisal...

209

DOE Transportation Protocols Topic Group Summary of Second Conference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

210

DOE Transportation Protocols Topic Group Conference Call Summary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TECWG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the...

211

The Greenhouse Gas Protocol Initiative: Measurement and Estimation...  

Open Energy Info (EERE)

Estimation of Uncertainty of GHG Emissions Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Measurement and Estimation of...

212

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary...  

Open Energy Info (EERE)

search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion AgencyCompany Organization: World Resources...

213

The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport...  

Open Energy Info (EERE)

search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources AgencyCompany Organization: World Resources...

214

TEC Working Group Topic Groups Archives Protocols Conference...  

Office of Environmental Management (EM)

Conference Call Summaries TEC Working Group Topic Groups Archives Protocols Conference Call Summaries Conference Call Summaries May 13, 1999 April 8, 1999 March 1, 1999 More...

215

The Greenhouse Gas Protocol Initiative: Allocation of Emissions...  

Open Energy Info (EERE)

Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Allocation of...

216

Chapter 5, Residential Furnaces and Boilers Evaluation Protocol...  

Office of Environmental Management (EM)

primarily in single-family homes and multifamily buildings with individual heating systems for each dwelling unit. This protocol does not cover integrated heating and water...

217

A search for quantum coin-flipping protocols using optimization ...  

E-Print Network (OSTI)

Mar 3, 2014 ... We conduct two kinds of search: one for protocols. ?Department of ..... This operation maps a probability vector to a quantum state, see Sub-.

2014-03-02T23:59:59.000Z

218

NEMVP: North American energy measurement and verification protocol  

SciTech Connect

This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

NONE

1996-03-01T23:59:59.000Z

219

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) March 2007 Fuel cells, especially for...

220

Protocol, Test Inspectors Guide - March 2008 | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Test Inspectors Guide - March 2008 Protocol, Test Inspectors Guide - March 2008 March 2008 Emergency Management Limited Scope Performance Test Inspectors Guide This Emergency...

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May...

222

Office of Environment, Safety and Health Assessments Protocol...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of Environment, Safety and Health Assessments Protocol, Development and Maintenance of Criteria Review and Approach Documents, June 2014 Office of Environment, Safety and...

223

BPA's proposed oversupply management protocol, Attachment P Narrative...  

NLE Websites -- All DOE Office Websites (Extended Search)

O N 1 Oversupply Management Protocol A. Background The Bonneville Power Administration ("BPA") operates the Federal Columbia River Power System ("FCRPS") as an integrated...

224

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased...  

Open Energy Info (EERE)

Purchased Electricity Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity AgencyCompany...

225

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Accelerated Ash-Loading Protocol for Diesel Particulate Filters Bruce G. Bunting and Todd J. Toops Oak Ridge National Laboratory Adam Youngquist and Ke Nguyen University of...

226

U-268: Oracle Database Authentication Protocol Discloses Session...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the authentication protocol at the time of this entry. Please visit the Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin for additional information when it...

227

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol  

Energy.gov (U.S. Department of Energy (DOE))

Webinar slides from the U.S. Department of Energy Fuel Cell Technologies Office webinar, "Hydrogen Refueling Protocols," held February 22, 2013.

228

APS Protocol for Reporting Construction Vibration Issues for...  

NLE Websites -- All DOE Office Websites (Extended Search)

in the online version. Advanced Photon Source APS Protocol for Reporting Construction Vibration Issues for Beamlines Section where used: This procedure describes the process for...

229

AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AVIATION BOARD OF DIRECTORS AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS The Department of Energy strives to manage its Aviation Program toward the highest standards of safety, efficiency, fairness in contracting, preservation of competition in the private sector, open communication, prudent property management, and the best examples of resource management. Toward these ends, the Department has established a management structure led by a Board of Directors comprising active Federal employee aviation managers from the Department. AUTHORITY: The following authorities serve as basis for this structure and system: Office of Management and Budget Circular A-126, FMR 102.33, DEAR 109, DOE Order 440.2B, Aviation Management Review Team Report, March 1999, and Secretary of Energy Appointment and Delegation of Authority, April 15, 1999.

230

High Performance Computing Data Center Metering Protocol  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Performance High Performance Computing Data Center Metering Protocol Prepared for: U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Federal Energy Management Program Prepared by: Thomas Wenning Michael MacDonald Oak Ridge National Laboratory September 2010 ii Introduction Data centers in general are continually using more compact and energy intensive central processing units, but the total number and size of data centers continues to increase to meet progressive computing requirements. In addition, efforts are underway to consolidate smaller data centers across the country. This consolidation is resulting in a growth of high-performance computing facilities (i.e. - supercomputers) which consume large amounts of energy to support the numerically intensive

231

Building America House Simulation Protocols (Revised)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

House House Simulation Protocols Robert Hendron and Cheryn Engebrecht National Renewable Energy Laboratory Revised October 2010 Prepared by the National Renewable Energy Laboratory For the U.S. Department of Energy Building Technologies Program ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process,

232

Adapting a delay-based protocol to heterogeneous environments  

E-Print Network (OSTI)

with different mixes of PERT and SACK protocols. Delay-based protocols, being less aggressive, have problems in fully utilizing a highspeed link while operating alone. We show that a single PERT flow can fully utilize a high-speed, high-delay link. We performed...

Kotla, Kiran

2008-10-10T23:59:59.000Z

233

Design of a PSi header processor for the internet protocol  

E-Print Network (OSTI)

bottleneck is the network transport component, i.e. the network I/O at the end system. To overcome this performance bottleneck, a standard data communication protocol, such as TCP/IP, could be implemented by using hardware to speedup the protocol throughput...

Bai, Jinxia

2012-06-07T23:59:59.000Z

234

Evaluation des performances des protocoles de routage Ad hoc  

E-Print Network (OSTI)

Evaluation des performances des protocoles de routage Ad hoc Abdelali Boushaba1 , Mohammed Oumsis2 quatre protocoles de routage Ad hoc: DSR, AODV, OLSR et DSDV et d'autre part, d'examiner l'impact de la'activité. Mots-clés--Réseaux mobiles Ad hoc; DSR; AODV; DSDV; OLSR; évaluation des performances; simulation, NS-2

Paris-Sud XI, Université de

235

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks  

E-Print Network (OSTI)

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks Yu Chen Google, UK chenyu in ad hoc networks. In our protocol, each node that has been assigned an address manages a disjoint of node's degree, regardless of the network size. I. INTRODUCTION A wireless mobile ad hoc network

Paris-Sud XI, Université de

236

Energy Aware Implementation of an Ad Hoc Routing Protocol  

E-Print Network (OSTI)

estimates of the potential for energy savings. We show potential savings of fifty six percent in energy functions of an energy aware ad hoc routing protocol are · Energy based link cost with transmit powerEnergy Aware Implementation of an Ad Hoc Routing Protocol by Shweta Bhandare Scriptor B

Brown, Timothy X.

237

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network (OSTI)

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

238

MP-DSM: A Distributed Cross Layer Network Control Protocol  

E-Print Network (OSTI)

MP-DSM: A Distributed Cross Layer Network Control Protocol Daniel C. O'Neill, Yan Li, and Stephen, transmitter powers and delay. The Direct Step Method, DSM, which captures this interaction and con- trols system performance under TCP or other protocols has been described in [1]. DSM finds optimal routes

239

Implementing a Low Power TDMA Protocol Over 802.11  

E-Print Network (OSTI)

, or wind energy to power themselves and their wireless network interface. The availability of low- powerImplementing a Low Power TDMA Protocol Over 802.11 Jim Snow, Wu-chi Feng, Wu-chang Feng (jsnow and implementation of our protocol and its performance compared to standard 802.11 in terms of throughput, power

240

Practical quantum oblivious transfer and bit commitment protocols  

E-Print Network (OSTI)

We propose a practical quantum oblivious transfer and a bit commitment protocols which replace the single-photon source with weak coherent pulses and allow error and loss in channel and detectors. These protocols can be realized with available optoelectronic apparatus.

Ya-Qi Song; Li Yang

2015-02-09T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Internet Protocol Adoption: Learning from Bitcoin Position Paper  

E-Print Network (OSTI)

This position paper discusses two related questions: 1. Using the framework of network economics, what are success factors behind the adoption of Bitcoin (a cryptographic curreny), and can we copy them for other protocols? 2. Can we design more successful protocols if we have inband payment mechanisms to internalize the externalities that emerge during adoption and in steady state? 1.

Rainer Böhme; Westfälische Wilhelms-universität Münster

242

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #  

E-Print Network (OSTI)

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

Kulkarni, Sandeep

243

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks  

E-Print Network (OSTI)

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

Kulkarni, Sandeep

244

Uniform Leader Election Protocols for Radio Networks Koji Nakano  

E-Print Network (OSTI)

Uniform Leader Election Protocols for Radio Networks #3; Koji Nakano School of Information Science be distinguished by serial or manufacturing number. The leader election problem asks to designate one of the station as leader. A leader election protocol is said to be uniform if in each time slot every station

Nakano, Koji

245

Hello Again: Stabilization of the Hello Protocol in OSPF  

E-Print Network (OSTI)

Hello Again: Stabilization of the Hello Protocol in OSPF Jorge A. Cobb Mohamed G. Gouda Deepinder Sidhu § Abstract The Hello protocol in OSPF allows each router in a network to check whether it can periodi- cally send hello messages to every neighboring router in the network. Associated with the Hello

Cobb, Jorge Arturo

246

MRML: A Communication Protocol for Content-Based Image Retrieval  

Science Journals Connector (OSTI)

In this paper we introduce and describe the Multimedia Retrieval Markup Language (MRML). This XML-based markup language is the basis for an open communication protocol for content-based image retrieval systems (CBIRSs). MRML was initially designed as ... Keywords: communication protocol, evaluation framework, multimedia retrieval, reusable software components

Wolfgang Müller; Henning Müller; Stéphane Marchand-Maillet; Thierry Pun; David Squire; Zoran Pecenovic; Christoph Giess; Arjen P. de Vries

2000-11-01T23:59:59.000Z

247

Protocol, Site Leads - May 2011 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Site Leads - May 2011 Site Leads - May 2011 Protocol, Site Leads - May 2011 May 2011 Protocol for Site Leads The purpose of this protocol is to establish the requirements and responsibilities for the Office of Safety and Emergency Management Evaluations Site Leads. The Site Lead's primary responsibility is to perform independent safety oversight at their assigned site(s). Site Leads are assigned to Department of Energy (DOE) sites with nuclear facilities to maintain operational awareness, establish and implement a prioritized set of oversight activities focused on high hazard nuclear facilities and tailored to site conditions, activities and issues. Protocol, Site Leads - May 2011 More Documents & Publications Appraisal Process Protocols, Independent Oversight - November 2012

248

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

249

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

250

Protective Force Protocols for ESS Supported Performance Tests and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protective Force Protocols for ESS Supported Performance Tests and Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 This document presents the protocols and ROE to be followed for both limited-scope and large-scale FOF performance tests. It sets forth basic procedures and responsibilities for planning, conducting, and evaluating such tests. The intent is to provide a standard framework to govern the conduct of such tests in connection with Independent Oversight inspections at NNSA and ESE sites and to ensure consistent approaches for all other FOF applications, approaches designed to enable program management to compare results from site to site. Protective Force Protocols for ESS Supported Performance Tests and

251

ANSP Protocols for Analysis of NAWQA Algae Samples Protocol P-13-57 Patrick Center for Environmental Research 117  

E-Print Network (OSTI)

of associated pressure gauges, and monitor the volume of gas left in the tank. Replace cylinders as needed. Any hoods. 3.1.4. Gas suspension tables. 3.1.5. Slide warmers/hot plates. 3.2. Chemistry Laboratory. 3 recommended. Periodically clean oil #12;ANSP Protocols for Analysis of NAWQA Algae Samples Protocol P-13

Charles, Donald

252

EMS-MAC: Energy Efficient Contention-Based Medium Access Control Protocol for Mobile Sensor Networks  

Science Journals Connector (OSTI)

......Towards a classification of energy aware MAC protocols for...Estrin, D. (2002) An Energy- Efficient MAC Protocol...Proc. INFOCOM'02, New York, USA, June 2327, pp...2003) An Adaptive Energy- Efficient MAC Protocol......

Mahdi Zareei; Alireza Taghizadeh; Rahmat Budiarto; Tat-Chee Wan

2011-11-01T23:59:59.000Z

253

The influence of purification protocol and pH on tomato spotted wilt virions  

E-Print Network (OSTI)

Two purification protocols were tested for their influence on yield of tomato spotted wilt virions. Protocol "A" was developed by Black et al (2), modified by Mohammed et al (34), and described by Gonsalves and Trujillo (16). Protocol "B...

Shimek, Christina Marie

1993-01-01T23:59:59.000Z

254

Protocol for maximizing energy savings and indoor environmental quality  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocol for maximizing energy savings and indoor environmental quality Protocol for maximizing energy savings and indoor environmental quality improvements when retrofitting apartments Title Protocol for maximizing energy savings and indoor environmental quality improvements when retrofitting apartments Publication Type Journal Article LBNL Report Number LBNL-6147E Year of Publication 2013 Authors Noris, Federico, William W. Delp, Kimberly Vermeer, Gary Adamkiewicz, Brett C. Singer, and William J. Fisk Journal Energy and Buildings Volume 61 Pagination 378-386 Date Published 06/2013 Keywords apartments, buildings, costs, energy, indoor environmental quality, Protocol, retrofits, Selection Abstract The current focus on building energy retrofit provides an opportunity to simultaneously improve indoor environmental quality (IEQ). Toward this end, we developed a protocol for selecting packages of retrofits that both save energy and improve IEQ in apartments. The protocol specifies the methodology for selecting retrofits from a candidate list while addressing expected energy savings, IEQ impacts, and costs in an integrated manner. Interviews, inspections and measurements are specified to collect the needed input information. The protocol was applied to 17 apartments in three buildings in two different climates within California. Diagnostic measurements and surveys conducted before and after retrofit implementation indicate enhanced apartment performance.

255

How to Implement a Protocol for Babel RMI  

SciTech Connect

RMI support in Babel has two main goals: transparency & flexibility. Transparency meaning that the new RMI features are entirely transparent to existing Babelized code; flexibility meaning the RMI capability should also be flexible enough to support a variety of RMI transport implementations. Babel RMI is a big success in both areas. Babel RMI is completely transparent to already Babelized implementation code, allowing painless upgrade, and only very minor setup changes are required in client code to take advantage of RMI. The Babel RMI transport mechanism is also extremely flexible. Any protocol that implements Babel's minimal, but complete, interface may be used as a Babel RMI protocol. The Babel RMI API allows users to select the best protocol and connection model for their application, whether that means a WebServices-like client-server model for use over a WAP, or a faster binary peer-to-peer protocol for use on different nodes in a leadership-class supercomputer. Users can even change protocols without recompiling their code. The goal of this paper is to give network researchers and protocol implementors the information they need to develop new protocols for Babel RMI. This paper will cover both the high-level interfaces in the Babel RMI API, and the low level details about how Babel RMI handles RMI objects.

Kumfert, G; Leek, J

2006-03-30T23:59:59.000Z

256

Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols  

E-Print Network (OSTI)

In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

Horace P. Yuen

2014-05-07T23:59:59.000Z

257

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Office of Environmental Management (EM)

727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

258

E-Print Network 3.0 - applicable protocol fails Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

identical protocol is used for different purposes ... Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 2 Protocol Interactions and...

259

E-Print Network 3.0 - aided routing protocol Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

for: aided routing protocol Page: << < 1 2 3 4 5 > >> 1 Routing Protocols for Mobile Ad-hoc Networks: Current Development and Evaluation Summary: network. LAR: Location Aided...

260

Nonlinear seismic ground response analysis: code usage protocols and verification against vertical array data  

E-Print Network (OSTI)

Response Analysis: Code Usage Protocols and Verificationparameter selection and code usage protocols as well aslinear modeling. Regarding code usage/parameter selection

Stewart, Jonathan P; Kwok, Annie O.L.

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Protocol, Security Assistance - January 2007 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 January 2007 Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security. The Assistance Program is comprised of technologists and subject matter experts from all the S&S disciplines and technical areas including Program Planning Management and Support, Advanced Security Technologies, Protective Force, Physical Security, Information Protection, Safeguards and Security Construction Projects, Vulnerability Assessments, and Nuclear Materials Control and Accountability. Our commitment is to continue to build an assistance program dedicated to serving the interests of the Department and our customers' S&S programs. Our emphasis remains

262

Open-Protocol Platform for Commercial Building Operations and Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Open-Protocol Platform for Commercial Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm The U.S. Department of Energy (DOE) is currently conducting research into an open-protocol platform for commercial buildings and an algorithm to manage energy use. Project Description This project seeks to develop a situational analysis algorithm that characterizes the classes and capabilities of existing building automation and energy information systems, as well as the types of commercial buildings that typically use each class of equipment. Project Partners Research is being undertaken by DOE and Navigant Consulting. Project Goals The goal is to use the situational analysis algorithm to determine whether

263

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Refrigerant Guide[1] The Greenhouse Gas Protocol tool for refrigeration is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

264

The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Climate Focus Area: - Central Plant, Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: CHP Guidance v1.0[1] The Greenhouse Gas Protocol tool for allocation of GHG emissions from a combined heat and power (CHP) plant is a free Excel spreadsheet calculator

265

Nuclear Energy Protocol for Research Isotopes Owen Lowe  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol for Protocol for Research Isotopes Owen Lowe Office of Isotopes for Medicine and Science Office of Nuclear Energy, Science and Technology April 16, 2002 Isotopes for Life Isotopes for Life Isotopes for Life Office of Nuclear Energy, Science and Technology Lowe/April16_02 NEPRI to NERAC.ppt (2) Nuclear Energy Protocol For Research Isotopes Nuclear Energy Protocol For Research Isotopes Why NEPRI? 6 NEPRI implements DOE funding priorities for fiscal year 2003 6 NEPRI will * Bring order to DOE's responses to requests for research isotopes * Introduce a high-quality peer review to the selection of research isotopes * Enable DOE to concentrate on operating its unique isotope production facilities Isotopes for Life Isotopes for Life Isotopes for Life Office of Nuclear Energy, Science and Technology

266

The Greenhouse Gas Protocol Initiative: Measurement and Estimation of  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: Measurement and Estimation of The Greenhouse Gas Protocol Initiative: Measurement and Estimation of Uncertainty of GHG Emissions Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Measurement and Estimation of Uncertainty of GHG Emissions Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: GHG Uncertainty Guide[1] The Greenhouse Gas Protocol Uncertainty Tool is designed to facilitate a quantitative and qualitative estimation of uncertainty associated with a

267

A design protocol for tailoring ice-templated scaffold structure  

Science Journals Connector (OSTI)

...fact that this relationship is based on fundamental principles of ice templating should...freezing protocol. The robust, and fundamental, link between time at equilibrium and...crystal growth and nucleation. In Handbook of industrial crystallization (ed...

2014-01-01T23:59:59.000Z

268

House Simulation Protocols (Building America Benchmark)- Building America Top Innovation  

Energy.gov (U.S. Department of Energy (DOE))

This Building America Innovations profile describes the DOE-sponsored House Simulation Protocols, which have helped ensure consistent and accurate energy-efficiency assessments for tens of thousands of new and retrofit homes supported by the Building America program.

269

Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol  

SciTech Connect

This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

Osterwald, C. R.

2008-03-01T23:59:59.000Z

270

Minimal computational-space implementation of multiround quantum protocols  

SciTech Connect

A single-party strategy in a multiround quantum protocol can be implemented by sequential networks of quantum operations connected by internal memories. Here, we provide an efficient realization in terms of computational-space resources.

Bisio, Alessandro; D'Ariano, Giacomo Mauro; Perinotti, Paolo; Chiribella, Giulio [QUIT group, Dipartimento di Fisica ''A. Volta'', and INFN Sezione di Pavia, via Bassi 6, IT-27100 Pavia (Italy); Perimeter Institute for Theoretical Physics, 31 Caroline Street North, Waterloo, Ontario N2L 2Y5 (Canada)

2011-02-15T23:59:59.000Z

271

Test Protocol Document, Hydrogen Safety Sensor Testing; Phase...  

NLE Websites -- All DOE Office Websites (Extended Search)

Test Protocol Document, Hydrogen Safety Sensor Testing Phase I: Non-Flammable Mixtures R. Burgess, C. Blake, and C.E. Tracy Technical Report NRELTP-560-42666 September 2008 NREL...

272

Standard Hydrogen Test Protocols for the NREL Sensor Testing...  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Test Protocols for the NREL Sensor Testing Laboratory December 2011 NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency and...

273

Signature schemes and applications to cryptographic protocol design  

E-Print Network (OSTI)

Signature schemes are fundamental cryptographic primitives, useful as a stand-alone application, and as a building block in the design of secure protocols and other cryptographic objects. In this thesis, we study both the ...

Lysyanskaya, Anna

2002-01-01T23:59:59.000Z

274

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard  

E-Print Network (OSTI)

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard Department of Computer Science (AA- MAS 2013), Ito, Jonker, Gini, and Shehory (eds.), May, 6­10, 2013, Saint Paul, Minnesota, USA

275

Comparing wireless flooding protocols using trace-based simulations  

Science Journals Connector (OSTI)

Most wireless multi-hop networks, such as ad hoc...networks and wireless sensor networks, need network-wide broadcasting, which is best done with a flooding protocol. In this article, we use ... test-bed network ...

Martin Jacobsson; Christian Rohner

2013-06-01T23:59:59.000Z

276

User-Friendly Grid Security Architecture and Protocols  

Science Journals Connector (OSTI)

My talk which includes some background information about grid computing, grid security, security infrastructure, and also some of the limitations, our proposal on some security protocols, what are the improvement...

Hoon Wei Lim

2007-01-01T23:59:59.000Z

277

Proposals for Non-PGM Catalyst Target and Test Protocols  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fuel Cell Tech Team Proposals for Non-PGM catalyst target and test protocols FCTT (USCAR) Shinichi Hirano (co-chair), Tarek Abdel-Baset, Balsu Lakshmanan, David Masten, Mark...

278

System-Level Modeling and Evaluation of Network Protocols  

E-Print Network (OSTI)

of computation including CSP, FSM, and DE for specifying protocols as well as to enable mixing them with other) [21], finite state machine (FSM) [40] and communicating sequential processes (CSP) [18]. Ptolemy

279

SystemLevel Modeling and Evaluation of Network Protocols  

E-Print Network (OSTI)

of computation including CSP, FSM, and DE for specifying protocols as well as to enable mixing them with other) [21], finite state machine (FSM) [40] and communicating sequential processes (CSP) [18]. Ptolemy

280

Evaluation of Laboratory Conditioning Protocols for Warm-Mix Asphalt  

E-Print Network (OSTI)

used to select a conditioning protocol to simulate pavement stiffness in its early life. The number of Superpave Gyratory Compactor (SGC) gyrations to get 7±0.5% air voids (AV) was the alternative parameter. Extracted binder stiffness and aggregate...

Yin, Fan 1990-

2012-10-26T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Application-Layer Communication Protocol for Home Automation.  

E-Print Network (OSTI)

??Chipcon, a Norwegian company that designs, produces and markets high performance and cost-effective radio frequency integrated circuits (RF-ICs), wanted to develop a new communication protocol… (more)

Hadzic, Dinko

2004-01-01T23:59:59.000Z

282

Petri Net Based Research of Home Automation Communication Protocol  

Science Journals Connector (OSTI)

The popularity of home automation has been increasing greatly in recent years. ... distributed, uncertain or randomized protocol model) of home automation, many questions concerned. For instance, is ... net to de...

Guangxuan Chen; Yanhui Du; Panke Qin; Jin Du…

2013-01-01T23:59:59.000Z

283

Verifying Team Formation Protocols with Probabilistic Model Checking  

Science Journals Connector (OSTI)

Multi-agent systems are an increasingly important software paradigm and in many of its applications agents cooperate to achieve a particular goal. This requires the design of efficient collaboration protocols,...

Taolue Chen; Marta Kwiatkowska; David Parker…

2011-01-01T23:59:59.000Z

284

Verifying team formation protocols with probabilistic model checking  

Science Journals Connector (OSTI)

Multi-agent systems are an increasingly important software paradigm and in many of its applications agents cooperate to achieve a particular goal. This requires the design of efficient collaboration protocols, a typical example of which is team formation. ...

Taolue Chen; Marta Kwiatkowska; David Parker; Aistis Simaitis

2011-07-01T23:59:59.000Z

285

New cryptographic protocols With side-channel attack security  

E-Print Network (OSTI)

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

286

Dynamic address allocation protocols for Mobile ad hoc networks  

E-Print Network (OSTI)

Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

Patchipulusu, Praveena

2001-01-01T23:59:59.000Z

287

Wind – Solar Hybrid Systems in Tunisia: An Optimization Protocol  

Science Journals Connector (OSTI)

In this work, potentials, state-of-the-art and development of hybrid wind-solar plants in the eastern-North Africa zone ... adopted: the protocol exploits data -such as solar radiation and cumulative mean wind sp...

Karemt Boubaker; Andrea Colantoni…

2013-01-01T23:59:59.000Z

288

Modelling energy efficiency of OR protocols in wireless networks  

Science Journals Connector (OSTI)

Although opportunistic routing (OR) for ad hoc networks have been shown to improve network throughput, energy audit of these protocols have not been done. In this paper, an analytical model to characterise the energy consumption of OR protocols is presented. Total energy consumption is computed taking into account the energy consumed in exchanging control packets, data packet transmission including retransmission and reception. The model considers packet retransmissions that can occur due to network conditions and protocol inaccuracies. The proposed analytical model is used to compute the energy consumption of some well known OR protocols available in literature. The result of the mathematical model is compared with simulation results. The theoretical and experimental results are found to be in conformance.

Arka Prokash Mazumdar; Anandghan Waghmare; Ashok Singh Sairam

2014-01-01T23:59:59.000Z

289

Multicenter Comparison of Two Norovirus ORF2-Based Genotyping Protocols  

Science Journals Connector (OSTI)

...conclusions of this study. Several electronic surveillance systems for NoV outbreaks...genotyping protocols for NoV are fundamental for accurate genotyping as well...outbreak and sequence data through electronic norovirus surveillance networks...

Kirsten Mattison; Elsie Grudeski; Brian Auk; Hugues Charest; Steven J. Drews; Angela Fritzinger; Nicole Gregoricus; Stephen Hayward; Alain Houde; Bonita E. Lee; Xiaoli L. Pang; Julie Wong; Tim F. Booth; Jan Vinjé

2009-10-21T23:59:59.000Z

290

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity Jump to: navigation, search Tool Summary Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Electricity Heat, and Steam Purchase Guidance v1.2[1] The Greenhouse Gas Protocol tool for purchased electricity is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

291

An Implementation of the PCP, SRP, D-PCP, M-PCP, and FMLP Real-Time Synchronization Protocols in LITMUSRT  

E-Print Network (OSTI)

An Implementation of the PCP, SRP, D-PCP, M-PCP, and FMLP Real-Time Synchronization Protocols-case blocking bounds. Further, we present the first implementation of the PCP, SRP, D-PCP, M-PCP, and FMLP to the PCP, Baker proposed the stack resource policy (SRP) [4]. Both the SRP and the PCP have received

Anderson, James

292

New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless  

E-Print Network (OSTI)

New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

Jain, Raj

293

Comparison of two wireless ad hoc routing protocols on a hardware test-bed  

E-Print Network (OSTI)

. These protocols are tested predominately using software simulation. Very few implementations have demonstratedComparison of two wireless ad hoc routing protocols on a hardware test-bed Shweta Bhandare (DSR) protocol and our Energy Aware Dynamic Source Routing protocol (EADSR). The implementation

Brown, Timothy X.

294

An Efficient Query Tree Protocol for RFID Tag Anti-Collision  

E-Print Network (OSTI)

An Efficient Query Tree Protocol for RFID Tag Anti-Collision Ming-Kuei Yeh National Taipei Query Tree (EQT) protocol to improve both the Query Tree (QT) protocol and the Collision Tree (CT and the energy consumption is lessened. In the EQT protocol, the timeslots structure, the query and responses

Jiang, Jehn-Ruey

295

Modelling Ad hoc On-demand Distance Vector (AODV) Protocol with Timed Automata  

E-Print Network (OSTI)

protocols using Ad hoc On-demand Distance Vector AODV [DPR02] as our test protocol. AODV is one of mobile adModelling Ad hoc On-demand Distance Vector (AODV) Protocol with Timed Automata Sibusisiwe Chiyangwa On-demand Distance Vector protocol (AODV). Keywords: automatic veri#12;cation, model checking, real

Oxford, University of

296

Principles of Climate Policy after 2012  

Science Journals Connector (OSTI)

The UN conference on climate change in Montreal ended with an agreement to negotiate the extension of the Kyoto Protocol beyond 2012 and the launch of “open and non-binding” talks with non-Kyoto ...

2006-03-01T23:59:59.000Z

297

A Simplified Hierarchical Dynamic Quantum Secret Sharing Protocol with Added Features  

E-Print Network (OSTI)

Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.

Sandeep Mishra; Chitra Shukla; Anirban Pathak; R. Srikanth; Anu Venugopalan

2014-09-06T23:59:59.000Z

298

A low-latency resilient protocol for e-business transactions  

Science Journals Connector (OSTI)

This paper proposes a novel protocol for e-business transaction management, called the low latency resilient (LLR) protocol. LLR applies new correctness criteria based upon enforcing semantic atomicity with increased resilience to failure, ... Keywords: CCS, SACReD transactions, calculus of communicating systems, e-business, electronic business, evaluation of commit protocols, formal specification, latency of transaction commit protocols, low latency resilient protocol, performance, resiliency, resource blocking, transaction management

Muhammad Younas; Barry Eaglestone; Kuo-Ming Chao

2004-09-01T23:59:59.000Z

299

The quantum bit commitment: a complete classification of protocols  

E-Print Network (OSTI)

This paper addresses the controversy between Mayers, Lo and Chau on one side, and Yuen on the opposite side, on whether there exist or not unconditionally secure protocols. For such purpose, a complete classification of all possible bit commitment protocols is given, including all possible cheating attacks. For the simplest class of protocols (non-aborting and with complete and perfect verification), it is shown how naturally a game-theoretical situation arises. For these protocols, bounds for the cheating probabilities are derived, which turn out to be different from those given in the impossibility proof. The whole classification and analysis has been carried out using a "finite open system" approach. The discrepancy with the impossibility proof is explained on the basis of the implicit adoption of a "closed system approach"--equivalent to modeling the commitment as performed by two fixed machines interacting unitarily in a overall "closed system". However, it is shown that the closed system approach for the classification of commitment protocols unavoidably leads to infinite dimensions, which then invalidate the continuity argument at the basis of the impossibility proof.

Giacomo Mauro D'Ariano

2002-09-26T23:59:59.000Z

300

Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols  

SciTech Connect

Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

2013-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

RadNet: Open network protocol for radiation data  

SciTech Connect

Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet`s flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems.

Rees, B.; Olson, K. [Los Alamos National Lab., NM (United States); Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W. [Aquila Technologies Group, Inc., Albuquerque, NM (United States); Koskelo, M. [Canberra Industries, Meriden, CT (United States)

1998-12-31T23:59:59.000Z

302

Greenhouse Gas Regional Inventory Protocol (GRIP) Website | Open Energy  

Open Energy Info (EERE)

Greenhouse Gas Regional Inventory Protocol (GRIP) Website Greenhouse Gas Regional Inventory Protocol (GRIP) Website Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Greenhouse Gas Regional Inventory Protocol (GRIP) Website Focus Area: Other Crosscutting Topics: Potentials & Scenarios Website: www.getagriponemissions.com/index-cycle.html Equivalent URI: cleanenergysolutions.org/content/greenhouse-gas-regional-inventory-pro Language: English Policies: Deployment Programs DeploymentPrograms: "Lead by Example" is not in the list of possible values (Audit Programs, Demonstration & Implementation, Green Power/Voluntary RE Purchase, High Performance Buildings, Industry Codes & Standards, Project Development, Public Tenders, Procurement, & Lead Examples, Public-Private Partnerships, Retrofits, Ride Share, Bike Share, etc., Technical Assistance, Training & Education, Voluntary Appliance & Equipment Labeling, Voluntary Industry Agreements) for this property.

303

Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Hazard Nuclear Facility Project Oversight - November High Hazard Nuclear Facility Project Oversight - November 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 November 2012 Protocol for High Hazard Nuclear Facility Project Oversight The purpose of this protocol is to establish the requirements and responsibilities for managing and conducting Office of Health, Safety and Security (HSS) independent oversight of high-hazard nuclear facility projects. As part of the Department of Energy's (DOE) self regulatory framework for safety and security, DOE Order 227.1, Independent Oversight Program, assigns HSS the responsibility for implementing an independent oversight program. It also requires the HSS Office of Enforcement and Oversight to conduct independent evaluations of safety and security. This

304

Transportation Protocols Working Group First Conference Call March 1, 1999  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocols Working Group First Conference Call March 1, 1999 Protocols Working Group First Conference Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TEC/WG) DOE Transportation Protocols Working Group was held at 3:00 p.m. Eastern time on Monday March 1, 1999. The session was led by Mona Williams, DOE/NTP-Albuquerque. Other participants included Bill Lemeshewsky, DOE/RW; Ellen Ott, DOE/GC; Elizabeth Helvey, JK Research Associates; Chris Wells, SSEB; Lisa Sattler, CSG-MW, Elissa Turner, DOE/RW; Chris Wentz, New Mexico; Carl Guidice, DOE/EM; Jim Cruickshank, DOE/EM, Elmer Naples, DOE/NR; Fred Butterfield, DOE/EM; and Alex Thrower, UETC. Ms. Williams first indicated that notes from the Jacksonville meeting had been prepared and circulated for comment. She asked if there were

305

Protocol, Required Reading - June 2012 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Required Reading - June 2012 Required Reading - June 2012 Protocol, Required Reading - June 2012 June 2012 Protocol for Required Reading The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing the Office of Safety and Emergency Management Evaluations (HS-45) required reading program. The required reading program provides a methodology to ensure that the HS-45 staff members are informed and up-to-date with Department of Energy (DOE), the Office of Health, Safety and Security (HSS), and office-specific requirements, processes, and guidance as well as to support continuous improvement. The required reading program will also be used to supplement staff training. This required reading program is based on DOE 0 422.1 Conduct of Operations Attachment 2, Appendix A and DOE-STD-1033-92 Guide to

306

Protocol, Development and Maintenance of Criteria and Review Approach  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Development and Maintenance of Criteria and Review Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents The purpose of this protocol is to establish the requirements and responsibilities for the development and maintenance of Criteria and Review Approach Documents (CRADs) used by the Office of Safety and Emergency Management Evaluations (HS-45). The HS-45 CRADS are carefully selected, modified (if required), and referenced in HS-45 appraisal plans. These plans are used to provide an outline of the activities planned to assess the effectiveness of safety and emergency management processes and

307

Routing Protocols for Cognitive Radio Networks: A Survey  

E-Print Network (OSTI)

with the cognitive radio (CR) technology, a wireless system can exploit opportunistically the radio spectrum licensed to other systems. Thus, CR is regarded as a solution to the problems resulting from the limited available spectrum and the inefficiency in the spectrum usage. The multi-hop CR networks need some novel routing algorithms taking the open spectrum phenomenon into account. The main approach in designing the routing algorithm for the CR networks is the joint design of routing and spectrum management. Works on such issues have just started and are still in a rudimentary stage. In this paper, we survey comprehensively the existing research on the routing protocols for CR networks, especially with reference to CR ad hoc networks. We classify the routing protocols, discuss the essential features of the different protocols, and provide the future research directions.

Kamruzzaman, S M

2010-01-01T23:59:59.000Z

308

Protocol, Test Inspectors Guide - March 2008 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Test Inspectors Guide - March 2008 Test Inspectors Guide - March 2008 Protocol, Test Inspectors Guide - March 2008 March 2008 Emergency Management Limited Scope Performance Test Inspectors Guide Emergency Management Limited Scope Performance Tests Inspectors Guide provides detailed information and tools to assist inspectors assigned to evaluate the capabilities and performance of emergency responders in DOE/NNSA. Although this guide is designed specifically for the HS-63 inspector, it is made available to the field and may be useful to field element and facility contractor personnel who conduct surveys or self-assessments of emergency management programs. Protocol, Test Inspectors Guide - March 2008 More Documents & Publications Protocol, Appraisal Process Guide - April 2008 Independent Oversight Review, Los Alamos National Laboratory - April 2012

309

DOE Transportation Protocols Topic Group Jacksonville, Florida January 20,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Jacksonville, Florida January 20, Jacksonville, Florida January 20, 1999 Meeting Notes and Action Items: The first meeting of the Transportation External Coordination Working Group (TEC/WG) Department of Energy (DOE) Transportation Protocols Topic Group was held at the Radisson Riverwalk Hotel in Jacksonville, FL on January 20, 1999. Mona Williams, Director of DOE's National Transportation Program, Albuquerque Office, welcomed the participants and asked them to introduce themselves (a list of participants with affiliations and addresses is attached). Following the roundtable introductions, Ms. Williams briefly stated the meeting's purpose, which was to discuss the process of protocols development and how review and input from TEC/WG participants could enhance

310

The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or  

Open Energy Info (EERE)

Transport or Transport or Mobil Sources Jump to: navigation, search Tool Summary Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Transportation, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free The Greenhouse Gas Protocol tool for mobile combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically from mobile combustion sources, including vehicles under the direct control

311

Protocol, Inspection Criteria - April 23, 2008 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Inspection Criteria - April 23, 2008 Inspection Criteria - April 23, 2008 Protocol, Inspection Criteria - April 23, 2008 April 23, 2008 Inspection Criteria, Activities, and Lines of Inquiry, April 23, 2008 Emergency planning includes the identification of hazards and threats. A hazards survey is the qualitative portion of the hazards identification process. It briefly describes the potential impacts of emergency events or conditions and summarizes the planning and preparedness requirements that apply. If determined to be required, an EPHA includes the identification and characterization of hazardous materials specific to a facility/site, analyses of potential accidents or events, and evaluation of potential consequences. Protocol, Inspection Criteria - April 23, 2008 More Documents & Publications

312

DOE Transportation Protocols Topic Group Conference Call Summary May 13,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Conference Call Summary May 13, Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TEC/WG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the status of U.S. Department of Energy (DOE) transportation protocols currently under development, and related issues. Participants on the call included: Mona Williams, DOE National Transportation Program-Albuquerque; Ken Niles, Oregon representative, Western Interstate Energy Board; Phillip Paull, Council of State Governments-Northeastern Conference; Ron Ross, Western Governors' Association; Lisa Sattler, Council of State Governments-Midwestern Office; Alex Thrower, Urban Energy & Transportation Corporation (UETC); and Elissa Turner, DOE-Office of Civilian Radioactive Waste Management.

313

A Hybrid Long-Distance Entanglement Distribution Protocol  

E-Print Network (OSTI)

We propose a hybrid (continuous-discrete variable) quantum repeater protocol for distribution of entanglement over long distances. Starting from entangled states created by means of single-photon detection, we show how entangled coherent state superpositions, also known as `Schr\\"odinger cat states', can be generated by means of homodyne detection of light. We show that near-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements.

Jonatan B. Brask; Ioannes Rigas; Eugene S. Polzik; Ulrik L. Andersen; Anders S. Sorensen

2010-04-01T23:59:59.000Z

314

A Fast Delivery Protocol for Total Order Broadcasting  

SciTech Connect

The conclusions of this report are: (1) Fast delivery protocol reduces the latency of message ordering for idle systems and keep comparable performances with communication history algorithms for busy systems; (2) The protocol optimizes the total ordering process by waiting for messages only from a subset of the machines in the group; and (3) The fast acknowledgment aggressively acknowledges total order messages to reduce the latency for idle system, and it is smart enough to hold the acknowledgments when the network communication is heavy.

Ou, Li [Tennessee Technological University; He, X. [Tennessee Technological University; Engelmann, Christian [ORNL; Scott, Stephen L [ORNL

2007-01-01T23:59:59.000Z

315

Case Study: Interactive Visualization for Internet Security Soon Tee Teoh  

E-Print Network (OSTI)

] to communicate. A good way to un- derstand the behaviors and performance of the Internet is thus to collectCase Study: Interactive Visualization for Internet Security Soon Tee Teoh Kwan-Liu Ma S. Felix Wu North Carolina State University ABSTRACT Internet connectivity is defined by a set of routing protocols

California at Davis, University of

316

Testing Protocol for Module Encapsulant Creep (Presentation)  

SciTech Connect

Recently there has been an interest in the use of thermoplastic encapsulant materials in photovoltaic modules to replace chemically crosslinked materials, e.g., ethylene-vinyl acetate. The related motivations include the desire to: reduce lamination time or temperature; use less moisture-permeable materials; or use materials with better corrosion characteristics. However, the use of any thermoplastic material in a high-temperature environment raises safety and performance concerns, as the standardized tests currently do not expose the modules to temperatures in excess of 85C, yet modules may experience temperatures above 100C in operation. Here we constructed eight pairs of crystalline-silicon modules and eight pairs of glass/encapsulation/glass mock modules using different encapsulation materials of which only two were designed to chemically crosslink. One module set was exposed outdoors with insulation on the back side in Arizona in the summer, and an identical set was exposed in environmental chambers. High precision creep measurements and performance measurements indicate that despite many of these polymeric materials being in the melt state at some of the highest outdoor temperatures achievable, very little creep was seen because of their high viscosity, temperature heterogeneity across the modules, and in the case of the crystalline-silicon modules, the physical restraint of the backsheet. These findings have very important implications for the development of IEC and UL qualification and safety standards, and in regards to the necessary level of cure during the processing of crosslinking encapsulants.

Kempe, M. D.; Miller, D. C.; Wohlgemuth, J. H.; Kurtz, S. R.; Moseley, J. M.; Shah, Q.; Tamizhmani, G.; Sakurai, K.; Inoue, M.; Doi, T.; Masuda, A.

2012-02-01T23:59:59.000Z

317

Modeling and verifying choreographed multi-agent-based web service compositions regulated by commitment protocols  

Science Journals Connector (OSTI)

Abstract The competency to compose web services from available services is one of the most crucial problems in the paradigm of service-oriented computing. Conventional software engineering approaches and even standard languages compose web services as workflow models that control the business logic required to coordinate data over participating services. Such models would not apply to the design of multi-agent based web services, which offer high-level abstractions that support autonomy, business-level compliance, and flexible dynamic changes. In this article, we model interactions among multi-agent based web services by commitment modalities in the form of contractual obligations and devote multi-agent commitment protocols to regulate such interactions and engineer services composition. We develop and fully implement an automatic verifier by enriching the MCMAS model checker with certain symbolic algorithms to verify the correctness of protocols, given properties expressed in a temporal commitment logic, suitably extended with actions. We analyze the time and space complexity of the verifier. Finally, we present the experimental results of two case studies, adopted to check the verifier’s efficiency and scalability.

Warda El Kholy; Jamal Bentahar; Mohamed El Menshawy; Hongyang Qu; Rachida Dssouli

2014-01-01T23:59:59.000Z

318

Microsoft Word - Protocol for HSS Site Leads.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety and Safety and Emergency Management Evaluations Protocol for Site Leads May 2011 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose .....................................................................................................................1 2.0 Applicability ............................................................................................................1 3.0 Requirements ...........................................................................................................1 4.0 Responsibilities ........................................................................................................2 5.0 References ................................................................................................................4

319

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

320

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

322

The WICKPro protocol with the Packet Delivery Ratio metric  

Science Journals Connector (OSTI)

Wireless mesh networks (WMNs) with chain topologies are very useful in road and railroad transportation or in tunnel and mine applications. The proposed protocols for WMNs usually support best-effort traffic or some kind of Quality of Service (QoS). ... Keywords: 802.11, Cyclic executive, Hard real-time, Token-passing, Wireless mesh networks

Jesús Aísa; José Luis Villarroel

2011-11-01T23:59:59.000Z

323

WSN-inspired Sleep Protocols for Heterogeneous LTE Networks  

E-Print Network (OSTI)

architecture becomes heterogenous, in particular 4G networks where LTE micro eNodeBs are deployed to strengthen algorithm to dynamically switch off and on the micro eNodeBs of an LTE heterogeneous network followingWSN-inspired Sleep Protocols for Heterogeneous LTE Networks Iulia Tunaru CEA CEA-Leti, Minatec

Paris-Sud XI, Université de

324

On Runtime Adaptation of Application-Layer Multicast Protocol  

E-Print Network (OSTI)

¨ubsch, Christoph P. Mayer, and Oliver P. Waldhorst Institute of Telematics, Karlsruhe Institute of Technology (KIT), Germany {huebsch,mayer,waldhorst}@kit.edu Reasonable choice of protocol parameters is crucial., a clean implementation of multicast communication within the Internet architecture has been proposed

Paris-Sud XI, Université de

325

GUV formation protocol: -Ethanol, DI water and Kimwipes for cleaning  

E-Print Network (OSTI)

GUV formation protocol: Materials: - Ethanol, DI water and Kimwipes for cleaning - 5-10 µl glass with ethanol and DI water using Kimwipes alternating the solvents at least twice to make sure any grease-ring using a Kimwipe and ethanol. Use Que-tip or grease slide to apply a thin layer of vacuum grease to one

Movileanu, Liviu

326

Addendum to the Building America House Simulation Protocols  

Energy.gov (U.S. Department of Energy (DOE))

The House Simulation Protocols (HSP) provide guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

327

A Hierarchical Checkpointing Protocol for Parallel Applications in Cluster Federations  

E-Print Network (OSTI)

A Hierarchical Checkpointing Protocol for Parallel Applications in Cluster Federations S federation. As a cluster federation comprises of a large number of nodes, there is a high probability fits to the characteristics of a cluster federation (large number of nodes, high latency and low

Paris-Sud XI, Université de

328

CARD-FISH and Microautoradiography Protocol for Bacteria and Archaea  

E-Print Network (OSTI)

1 CARD-FISH and Microautoradiography Protocol for Bacteria and Archaea by Gerhard Herndl Lab @ www FISH Hybridization www.microbial-oceanography.eu 2007 2 Sample Fixation 1. Fix samples in Ethanol 95% 7. Dry and mount in DAPI mix #12;CARD FISH Buffers and Chemicals www

Herndl, Gerhard

329

Reduction-based Security Analysis of Internet Routing Protocols  

E-Print Network (OSTI)

Reduction-based Security Analysis of Internet Routing Protocols Chen Chen, Limin Jia, Boon Thau Loo. These properties require routes announced by honest nodes in the network not to be tampered with by the adversary proofs with automated analysis. We define several reduction steps to reduce proving route authenticity

Pennsylvania, University of

330

Reliable and Energy-Efficient Routing Protocol in Dense  

E-Print Network (OSTI)

Reliable and Energy-Efficient Routing Protocol in Dense Wireless Sensor Networks Min Chen, Taekyoung Kwon, Shiwen Mao, + Yong Yuan, Victor C.M. Leung* Department of Electrical and Computer@snu.ac.kr Department of Electrical and Computer Engineering Auburn University, 200 Broun Hall, Auburn, AL 36849

Chen, Min

331

Localized radio frequency communication using asynchronous transfer mode protocol  

DOE Patents (OSTI)

A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

Witzke, Edward L. (Edgewood, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM)

2007-08-14T23:59:59.000Z

332

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks  

E-Print Network (OSTI)

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks Yongjun Dai, Changhee Joo prevalent, TCP performance over mobile ad hoc networks attracts more attention. The earlier studies on TCP in wireless networks have shown that it performs poorly in ad hoc networks. They tackled the problem

Bahk, Saewoong

333

Rice University Distributed Protocols for Signal-Scale Cooperation  

E-Print Network (OSTI)

devices to alter their cooperative behavior based on measured changes to their own energy efficiency energy efficiency can be addressed by a self-aware device monitoring its own performance, inter- device Science Houston, Texas May 2012 #12;Abstract Distributed Protocols for Signal-Scale Cooperation

334

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network (OSTI)

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony executed corresponding other actions (e.g., a payment gateway approves a charge to customer C's account

Stoller, Scott

335

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network (OSTI)

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony- ously executed corresponding other actions (e.g., a payment gateway approves a charge to customer C

Stoller, Scott

336

Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas  

E-Print Network (OSTI)

Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas Abdel Ilah Alshbatat and Liang Dong, Senior Member, IEEE Abstract-- Unmanned aerial vehicle (UAV) has been used inspection and range extension. Moreover, UAVs are suited for situations that are too dangerous for direct

Dong, Liang

337

Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol  

SciTech Connect

The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

Romberger, J.

2014-11-01T23:59:59.000Z

338

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network (OSTI)

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

339

Probing and Fault Injection of Dependable Distributed Protocols  

Science Journals Connector (OSTI)

......network proto- cols, or device layer protocols. As shown in...such that each layer, from the device-level to the application-level...inserted on top of link-level device drivers and below the listening applications. Another closely......

Scott Dawson; Farnam Jahanian

1995-01-01T23:59:59.000Z

340

A survey on secure multipath routing protocols in WSNs  

Science Journals Connector (OSTI)

Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN and classifying them based on ... Keywords: Multipath routing, Secure multipath routing, Security, Wireless sensor networks

Eliana Stavrou; Andreas Pitsillides

2010-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

SRP: a Scalable Resource Reservation Protocol for the Internet  

E-Print Network (OSTI)

SRP: a Scalable Resource Reservation Protocol for the Internet Werner Almesberger 1 , Tiziana (SRP) provides a light-weight reser- vation mechanism for adaptive multimedia applications. Our main these applications need in order to operate prop- erly. SRP aims to allow such applications to make a dependable

Almesberger, Werner

342

STOCKER FLY BRAIN IMMUNOFLUORESCENCE PROTOCOL January 8, 2001  

E-Print Network (OSTI)

1 STOCKER FLY BRAIN IMMUNOFLUORESCENCE PROTOCOL January 8, 2001 Vosshall Lab 1. Anesthetize flies the brain, starting with the removal of the proboscis. Gently peel away the cuticle at the back of the fly the esophagus (hole in brain). Once all the cuticle has been removed, gently remove the fat body and trachea

343

ITB: intrusion-tolerant broadcast protocol in wireless sensor networks  

Science Journals Connector (OSTI)

A large-scale wireless sensor network relies on broadcast protocol for data communication. This paper presents an idea for a base station to reliably and securely broadcast announcing messages to the network in an intrusion-tolerant way. Our Intrusion-Tolerant ...

Jin Wook Lee; Yann-Hang Lee

2006-09-01T23:59:59.000Z

344

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network (OSTI)

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

345

How to Use Bitcoin to Design Fair Protocols Iddo Bentov  

E-Print Network (OSTI)

How to Use Bitcoin to Design Fair Protocols Iddo Bentov idddo@cs.technion.ac.il Ranjit Kumaresan then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-or-refund"), that formalizes and abstracts the exact properties we require from the Bitcoin network to achieve our goals

346

A Self-Healing Load Balancing Protocol and Implementation  

E-Print Network (OSTI)

in the opposite direction exhibits a rate of r2 = c2x2. It can be shown that the overall reaction system spanned Comparison In order to illustrate the principle of the two protocols, we carried out OMNeT++ [2] simulations this unbounded growth, we apply a "non-selective dilution flow" to the reactor which randomly destroys a molecule

Vetter, Thomas

347

Superior Energy Performance Measurement and Verification Protocol for Industry  

Energy.gov (U.S. Department of Energy (DOE))

This Measurement and Verification Protocol for Industry defines the procedures that will be used to confirm conformance with the energy performance level requirements of the Superior Energy Performance Program. The Program has two paths. This document is structured to reflect those different paths.

348

A comparison of the Internet multicast routing protocols  

Science Journals Connector (OSTI)

The exploding Internet has brought many novel network applications. These include teleconferencing, interactive games, the voice/video phone, real-time multimedia playing, distributed computing, web casting, and so on. One of the specific characteristics ... Keywords: Datagrams, Delivery tree, Multicasting routing protocols

Jhyda Lin; Ruay-Shiung Chang

1999-01-01T23:59:59.000Z

349

An adaptive protocol for distributed beamforming Stephan Sigg1  

E-Print Network (OSTI)

settings and propose a protocol that utilises organic computing principles to find optimum parameters is the approach to combine transmission signals from distinct transmit antennas simultaneously in order to create transmission [7, 8, 2]. Several open-loop and closed-loop carrier synchronisation approaches have been proposed

Beigl, Michael

350

US - Voice Over Internet Protocol Phone Service Providers Market Analysis  

E-Print Network (OSTI)

This report explains the overview of Voice over internet protocol (VoIP) and the challenges the VoIP Phone Service providers face to become market leaders. The report provides an overview of new services offering, both residential and business...

Srinivasan, Vijaybabu

2006-05-19T23:59:59.000Z

351

Safeguards Agreement and Protocol with the International Atomic Energy Agency  

Directives, Delegations, and Requirements

To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

2004-01-07T23:59:59.000Z

352

Stabilization of Flood Sequencing Protocols in Sensor Networks  

E-Print Network (OSTI)

Stabilization of Flood Sequencing Protocols in Sensor Networks Young-ri Choi, Chin-Tser Huang, Member, IEEE, and Mohamed G. Gouda, Member, IEEE Abstract--Flood is a communication primitive that can. When a sensor receives a flood message, the sensor needs to check whether it has received this message

Gouda, Mohamed G.

353

Stabilization of Flood Sequencing Protocols in Sensor Networks  

E-Print Network (OSTI)

Stabilization of Flood Sequencing Protocols in Sensor Networks Young-ri Choi and Mohamed G. Gouda 78712-0233, U.S.A. {yrchoi, gouda}@cs.utexas.edu Abstract. Flood is a communication primitive that can. When a sensor receives a flood message, the sensor needs to check whether it has received the message

Gouda, Mohamed G.

354

An Energy-Aware Simulation Model and Transaction Protocol  

E-Print Network (OSTI)

1 An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution of Southern California Oct. 15, 2003 Outline ! Introduction ! MANET Simulation Model ! Energy-aware Network of analytical approaches ! We presents a simulation model to evaluating power management policies for a MANET

Pedram, Massoud

355

An efficient protocol for radiochromic film dosimetry combining calibration and measurement in a single scan  

SciTech Connect

Purpose: Radiochromic film provides dose measurement at high spatial resolution, but often is not preferred for routine evaluation of patient-specific intensity modulated radiation therapy (IMRT) plans owing to ease-of-use factors. The authors have established an efficient protocol that combines calibration and measurement in a single scan and enables measurement results to be obtained in less than 30 min. This avoids complications due to postexposure changes in radiochromic film that delay the completion of a measurement, often for up to 24 h, in commonly used methods. In addition, the protocol addresses the accuracy and integrity of the measurement by eliminating environmental and interscan variability issues. Methods: The authors collected dose-response data from six production lots of Gafchromic EBT3 film and three production lots of EBT2 film at doses up to 480 cGy. In this work, the authors used seven different scanners of two different models-Epson 10000XL and V700; postexposure times before scanning from 30 min to 9 days; ambient temperatures for scanning spanning 11 Degree-Sign C; and two film orientations. Scanning was in 48-bit RGB format at 72 dpi resolution. Dose evaluation was conducted using a triple-channel dosimetry method. To evaluate the measurement protocol, patient specific IMRT and volumetric modulated arc therapy (VMAT) plans were exposed onto EBT3 films on a Varian Trilogy Linac. Film scanning was done following the protocol under a number of different conditions and the dose maps were analyzed to demonstrate the equivalence of results. Results: The results indicated that the dose-response data could be fit by a set of related rational functions leading to the description of a generic calibration curve. A simplified dosimetry protocol was established where dose-response data for a specific film lot, scanner, and scanning conditions could be derived from two films exposed to known doses. In most cases only one calibrated exposure was required since the dose for one of the films could be zero. Using the Gamma test criterion of 2%/2 mm to evaluate the measurements, similar passing rates ranging between about 95% and 99% for the fields studied were obtained from application films digitized under a variety of conditions all of them different than the conditions under which the calibration films were scanned. Conclusions: The authors have developed a simplified and efficient protocol to measure doses delivered by an IMRT or VMAT plan using only the patient film, one calibration film, one unexposed film, and applying a single scan to acquire a digital image for calculation and analysis. The simplification and timesaving offer a potential practical solution for using radiochromic film for routine treatment plan quality assurance without sacrificing spatial resolution for convenience.

Lewis, David; Micke, Andre; Yu Xiang; Chan, Maria F. [Advanced Materials Group, Ashland Inc., 1361 Alps Road, Wayne, New Jersey 07470 (United States); Department of Medical Physics, Memorial Sloan-Kettering Cancer Center, 136 Mountain View Boulevard, Basking Ridge, New Jersey 07920 (United States)

2012-10-15T23:59:59.000Z

356

The Dutch Linguistic Intraoperative Protocol: A valid linguistic approach to awake brain surgery  

Science Journals Connector (OSTI)

Abstract Intraoperative direct electrical stimulation (DES) is increasingly used in patients operated on for tumours in eloquent areas. Although a positive impact of DES on postoperative linguistic outcome is generally advocated, information about the neurolinguistic methods applied in awake surgery is scarce. We developed for the first time a standardised Dutch linguistic test battery (measuring phonology, semantics, syntax) to reliably identify the critical language zones in detail. A normative study was carried out in a control group of 250 native Dutch-speaking healthy adults. In addition, the clinical application of the Dutch Linguistic Intraoperative Protocol (DuLIP) was demonstrated by means of anatomo-functional models and five case studies. A set of DuLIP tests was selected for each patient depending on the tumour location and degree of linguistic impairment. DuLIP is a valid test battery for pre-, intraoperative and postoperative language testing and facilitates intraoperative mapping of eloquent language regions that are variably located.

E. De Witte; D. Satoer; E. Robert; H. Colle; S. Verheyen; E. Visch-Brink; P. Mariën

2015-01-01T23:59:59.000Z

357

Hack-proof synchronization protocol for multi-player online games  

Science Journals Connector (OSTI)

Synchronization protocols based on “dead-reckoning” are vulnerable to a popular type of cheat called speed-hack. A speed-hack helps a cheater to gain unfair advantages ... dead-reckoning protocol that is invulner...

Yeung Siu Fung; John C. S. Lui

2009-01-01T23:59:59.000Z

358

An enhanced algorithm for protocol conformance test sequence generation based on the UIO method  

E-Print Network (OSTI)

An Enhanced Algorithm for Protocol Conformance Test Sequence Generation Based on the UIO Method. (December 1993) Ravindra Allada, B.E., Osmania University, Hyderabad, India Chair of Advisory Committee: Dr. Hosame Abu-Amara A computer protocol is a...

Allada, Ravindra

2012-06-07T23:59:59.000Z

359

An object-oriented implementation of a Low Level Reader Protocol (LLRP) library  

E-Print Network (OSTI)

This Master of Engineering Thesis describes the design and implementation of an object-oriented Low Level Reader Protocol (LLRP) library. LLRP is a recently released protocol which standardizes the formats and methods of ...

Constantinou, Fivos

2007-01-01T23:59:59.000Z

360

DSM-PM2: A Portable Implementation Platform for Multithreaded DSM Consistency Protocols  

Science Journals Connector (OSTI)

DSM-PM2 is a platform for designing, implementing and experimenting with multithreaded DSM consistency protocols. It provides a generic toolbox ... alternative protocols for a given consistency model. DSM-PM2 is ...

Gabriel Antoniu; Luc Bougé

2001-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Performance analysis of distributed time division multiple access protocols in mobile ad hoc environments  

E-Print Network (OSTI)

Tactical wireless mobile ad hoc networks rely upon distributed medium access control (MAC) protocols for coordination and assignment of channel resources among dispersed and mobile users. One such protocol is the distributed ...

Dastangoo, Siamak

362

A Resource assessment protocol for GEO-ELEC | Open Energy Information  

Open Energy Info (EERE)

protocol for GEO-ELEC Jump to: navigation, search OpenEI Reference LibraryAdd to library Report: A Resource assessment protocol for GEO-ELEC Authors Jan-Diederik van Wees, Thijs...

363

Multicast Protocols for Scalable On-Demand Download Niklas Carlsson Derek L. Eager  

E-Print Network (OSTI)

not model packet loss recovery, although our analyses and protocols are compatible with erasure coded data bandwidth and maximum client delay for this batching with constant batch delay (bcd) protocol, as follows

Vernon, Mary K.

364

On Predictable Operating System Protocol Processing Clifford W. Mercer, Jim Zelenka, and Ragunathan Rajkumar  

E-Print Network (OSTI)

On Predictable Operating System Protocol Processing Clifford W. Mercer, Jim Zelenka, and Ragunathan, protocol processing, resource reservation, operating systems, predictability, reservation, admission that incorporate digital audio and video require predictable response from the operating system and the network

365

Ad-hoc and Hybrid Networks Performance Comparison of MANET Routing Protocols in Ad-hoc  

E-Print Network (OSTI)

Sequenced Distance Vector Protocol . . . . . . . . . . . . . . . . . . . . 9 2.2.1 Routing Table Management-hoc On Demand Distance Vector Routing Protocol . . . . . . . . . . . . . . . . 10 2.3.1 Route Discovery and Multipoint Relays . . . . . . . . . . . . . . . . . . . 11 2.4.3 Spreading Topology Informations

Braun, Torsten

366

PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS  

SciTech Connect

The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

Mickalonis, J.

2014-09-16T23:59:59.000Z

367

DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells  

Energy.gov (U.S. Department of Energy (DOE))

This document describes test protocols to assess the performance and durability of fuel cell components intended for automotive applications.

368

A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments  

SciTech Connect

A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

Top, P; Kohlhepp, V; Dowla, F

2005-09-30T23:59:59.000Z

369

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2  

E-Print Network (OSTI)

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2 , Panu H¨am¨al¨ainen2 , Ben employed is the Secure Remote Password (SRP) authenti- cation protocol [15]. It makes extensive use of hash that can be called from soft- ware routines in the SRP protocol. This paper is structured as follows

Kuzmanov, Georgi

370

4. The Bounded Re-transmission Protocol Jean-Raymond Abrial  

E-Print Network (OSTI)

1 - The Bounded Re-transmission Protocol is a file transfer protocol - This is a problem dealing to handle that problem: timers. - We would like to see how we can formalize such timers #12;The Bounded. #12;Abortion of Protocol at the Sender Site 6 - The Sender can re-transmit the same data at most M

Southampton, University of

371

6. The Bounded Re-transmission Protocol Jean-Raymond Abrial  

E-Print Network (OSTI)

- The Bounded Re-transmission Protocol is a file transfer protocol - This is a problem dealing with fault that problem: timers. - We would like to see how we can formalize such timers #12;The Bounded Retransmission that the Receiver does not confuse (?) a new data with a retransmitted one. #12;Abortion of Protocol at the Sender

Southampton, University of

372

ProChat: Dynamic Formal Collaboration Protocols in a Chat Tool for Handheld Collaboration  

E-Print Network (OSTI)

ProChat: Dynamic Formal Collaboration Protocols in a Chat Tool for Handheld Collaboration Randal K, or collaboration protocols, can be developed outside the application, analyzed for errors, shared among users protocols are used to modify the user interface to control the collaboration. We conclude with some open

North Carolina at Chapel Hill, University of

373

Ni-NTA Magnetic Agarose Beads Handbook 12/200120 Detailed Protocols  

E-Print Network (OSTI)

Protocol Ni-NTA Magnetic Agarose Beads Handbook 12/200120 Detailed Protocols Protocol 1. Cell lysis appropriately. Adding 10 mM imidazole, inhibits binding of nontagged proteins. If the tagged protein does-NTA Magnetic Agarose Beads Handbook 12/2001 21 4. Sonicate or homogenize on ice to lyse cells (6 times for 10

Lebendiker, Mario

374

IEEE TRANSACTIONS ON RELIABILITY, VOL. 38, NO. 1,1989 APRIL 103 Reliable Protocols for Distributed  

E-Print Network (OSTI)

IEEE TRANSACTIONS ON RELIABILITY, VOL. 38, NO. 1,1989 APRIL 103 Reliable Protocols for Distributed-tolerance, Message complexity, Reliable protocol Reader Aids - Purpose: Design reliable distributed protocols Special Termination Detection S. Venkatesan University of Pittsburgh, Pittsburgh Key Words - Distributed system, Fault

Venkatesan, S.

375

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network (OSTI)

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi of an on-demand minimum energy routing protocol and suggests mechanisms for their imple- mentation. We of an on-demand minimum energy routing protocol in terms of energy savings with an existing on-demand ad

376

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network (OSTI)

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi the necessary features of an on-demand minimum energy routing protocol and suggests mechanisms the performance of an on-demand minimum energy routing protocol in terms of energy savings with an existing on

Brown, Timothy X.

377

Protocol, Qualification Standard for the Site Lead Program - May 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Qualification Standard for the Site Lead Program - May Qualification Standard for the Site Lead Program - May 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011 May 2011 Qualification Standard for the Site Lead Program This Qualification Standard establishes common functional area competency requirements for personnel assigned as Site Leads in the Office of Safety and Emergency Management Evaluations. Satisfactory and documented completion of the competency requirements contained in this Standard ensures that employees possess the minimum requisite competence to fulfill their functional area duties and responsibilities. This Standard is integrated with existing qualification standards developed by DOE in accordance with DOE Order 426.1, Federal Technical Capability. Protocol, Qualification Standard for the Site Lead Program - May 2011

378

A Comparison of US and Chinese EV Battery Testing Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

US and Chinese EV US and Chinese EV Battery Testing Protocols: Results D. Robertson, 1 J. Christophersen, 2 Fang Wang, 3 Fan Bin, 3 I. Bloom 1 US/China Electric Vehicle Initiative Meeting August 23-24, 2012 Boston, MA 1 Argonne National Laboratory 2 Idaho National Laboratory 3 CATARC A Comparison of US and Chinese Battery Testing Protocols  Battery testing is a time-consuming and costly process  There are parallel testing efforts, such as those in the US and China  These efforts may be better leveraged through international collaboration  The collaboration may establish standardized, accelerated testing procedures and will allow battery testing organizations to cooperate in the analysis of the resulting data  In turn, the collaboration may accelerate electric vehicle development and

379

A Sensing Error Aware MAC Protocol for Cognitive Radio Networks  

E-Print Network (OSTI)

Cognitive radios (CR) are intelligent radio devices that can sense the radio environment and adapt to changes in the radio environment. Spectrum sensing and spectrum access are the two key CR functions. In this paper, we present a spectrum sensing error aware MAC protocol for a CR network collocated with multiple primary networks. We explicitly consider both types of sensing errors in the CR MAC design, since such errors are inevitable for practical spectrum sensors and more important, such errors could have significant impact on the performance of the CR MAC protocol. Two spectrum sensing polices are presented, with which secondary users collaboratively sense the licensed channels. The sensing policies are then incorporated into p-Persistent CSMA to coordinate opportunistic spectrum access for CR network users. We present an analysis of the interference and throughput performance of the proposed CR MAC, and find the analysis highly accurate in our simulation studies. The proposed sensing error aware CR MAC p...

Hu, Donglin

2011-01-01T23:59:59.000Z

380

SPTP: A Trust Management Protocol for Online and Ubiquitous Systems  

Science Journals Connector (OSTI)

With the recent proliferation of ubiquitous, mobile and cloud-based systems, security, privacy and trust concerns surrounding the use of emerging technologies in the ensuing wake of the Internet of Things (IoT) continues to mount. In most instances, ... Keywords: Privacy Framework, SPT, Security, Trust Management, Trust and Privacy Protocol, Cloud, Collective Intelligence, mHealth, Ubiquitous Computing, Mobile Computing, Online Advertising Privacy

Ivor D. Addo, Ji-Jiang Yang, Sheikh I. Ahamed

2014-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product  

SciTech Connect

An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

O`Connell, L.J. [ed.

1994-12-01T23:59:59.000Z

382

Protocols of radiocontaminant air monitoring for inhalation exposure estimates  

SciTech Connect

Monitoring the plutonium and americium particle emissions from soils contaminated during atmospheric nuclear testing or due to accidental releases is important for several reasons. First, it is important to quantify the extent of potential human exposure from inhalation of alpha-emitting particles, which is the major exposure pathway from transuranic radionuclides. Second, the information provided by resuspension monitoring is the basis of criteria that determine the target soil concentrations for management and cleanup of contaminated soil sites. There are other radioactive aerosols, such as the fission products (cesium and strontium) and neutron-activation products (europium isotopes), which may be resuspended and therefore necessary to monitor as well. This Standard Protocol (SP) provides the method used for radiocontaminant air monitoring by the Health and Ecological Assessment Division (formerly Environmental Sciences Division), Lawrence Livermore National Laboratory, as developed and tested at Nevada Test Site (NTS) and in the Marshall Islands. The objective of this SP is to document the applications and methods of monitoring of all the relevant variables. This protocol deals only with measuring air concentrations of radionuclides and total suspended particulates (TSP, or {open_quotes}dust{close_quotes}). A separate protocol presents the more difficult measurements required to determine transuranic aerosol emission rates, or {open_quotes}resuspension rate{close_quotes}.

Shinn, J.H.

1995-09-01T23:59:59.000Z

383

A multipath routeless routing protocol with an efficient location update mechanism  

Science Journals Connector (OSTI)

In this paper, we introduce and evaluate an efficient multipath 'routeless' routing (MRR) protocol. MRR is a form of beaconless geographic routing protocol, and uses a simple location update mechanism to achieve high throughput with few retransmissions. Unlike the standard beaconless routing (BLR) protocol, our main point of comparison, our protocol constructs a single forwarding area to identify nodes between the source and destination. This forwarding area is a rectangular area shape with enough width to allow multiple routes. Promising simulation results show that our protocol outperforms the standard BLR approach with respect to energy consumption, packet delivery ratio, and the average number of hops.

Mohammad Al-Otaibi; Hamdy Soliman; Jun Zheng

2011-01-01T23:59:59.000Z

384

Enforcement Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

cases Office of the General Counsel 1000 cases Office of the General Counsel 1000 Independence Ave., SW Washington, DC, 20585 202-586-5281 en AeroSys: Order (2011-SCE-1624) http://energy.gov/gc/downloads/aerosys-order-2011-sce-1624 AeroSys: Order (2011-SCE-1624)

385

Case Study  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Case Study Case Study M2M Smart Grid Investment Grant 1 An irrigation pump connected to a web---to---wireless controller designed by M2M Communications. Agricultural Demand Response Program in California Helps Farmers Reduce Peak Electricity Usage, Operate More Efficiently Year---Round The development of a two---way, web---to---wireless controller for irrigation pumps is the foundation for an agricultural demand response program in California. Designed by M2M Communications of Boise, Idaho, the controller is part of an irrigation load control system that also includes sensors, smart meters, and other monitoring equipment. Partially funded with $2.2 million in Recovery Act stimulus funds awarded by the U.S. Department of

386

Case Number:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Name of Petitioner: Name of Petitioner: Date of Filing: Case Number: Department of Energy Washington, DC 20585 JUL 2 2 2009 DEPARTMENT OF ENERGY OFFICE OF HEARINGS AND APPEALS Appeal Dean P. Dennis March 2, 2009 TBA-0072 Dean D. Dennis filed a complaint of retaliation under the Department of Energy (DOE) Contractor Employee Protection Program, 10 C.F.R. Part 708. Mr. Dennis alleged that he engaged in protected activity and that his employer, National Security Technologies, LLC (NSTec ), subsequently terminated him. An Office of Hearings and Appeals (OHA) Hearing Officer denied relief in Dean P. Dennis, Case No. TBH-0072, 1 and Mr. Dennis filed the instant appeal. As discussed below, the appeal is denied. I. Background The DOE established its Contractor Employee Protection Program to "safeguard public

387

FOIA Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

foia-cases Office of Hearings and Appeals 1000 foia-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en FIA-13-0077 - In the Matter of John F. Garrity http://energy.gov/oha/downloads/fia-13-0077-matter-john-f-garrity FIA-13-0077 - In the Matter of John F. Garrity

388

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security PSH-13-0103 - In the Matter of Personnel Security

389

Whistleblower Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

whistleblower-cases Office of Hearings and Appeals whistleblower-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en WBX-12-0004 - In the Matter of Denise Hunter http://energy.gov/oha/downloads/wbx-12-0004-matter-denise-hunter WBX-12-0004 - In the Matter of Denise Hunter

390

EIA Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

eia-cases Office of Hearings and Appeals 1000 eia-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en TEE-0073 - In the Matter of Cole Distributing, Inc. http://energy.gov/oha/downloads/tee-0073-matter-cole-distributing-inc TEE-0073 - In the Matter of Cole Distributing, Inc.

391

Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems  

SciTech Connect

The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

2014-06-01T23:59:59.000Z

392

"The cream on the pudding..." : An analysis of the Clean Development Mechanism in the Indian wind power sector.  

E-Print Network (OSTI)

??The thesis examines the effects of the Clean Development Mechanism (CDM), a flexible mechanism under the Kyoto Protocol, on the Indian wind power sector. Indian… (more)

Turkanovic, Zlata

2010-01-01T23:59:59.000Z

393

Spatial analysis of fish distribution in relation to offshore wind farm developments.  

E-Print Network (OSTI)

??In an effort to support the Kyoto Protocol, the government of the United Kingdom has targeted a goal of obtaining 15% of its electricity supply… (more)

Gay, Marybeth Eshleman

2012-01-01T23:59:59.000Z

394

Intertemporal Emissions Trading and Market Power: Modeling a Dominant Firm with a Competitive Fringe  

Science Journals Connector (OSTI)

In international emissions trading schemes such as the Kyoto Protocol and the European Union Emissions Trading Scheme, the suboptimal negotiation of the cap...

Julien Chevallier

2011-01-01T23:59:59.000Z

395

Green Enterprises | Open Energy Information  

Open Energy Info (EERE)

SW7 1QJ Sector: Carbon Product: As an active participant in the global carbon market, Green Enterprises incorporates the objective of the Kyoto Protocol through the Clean...

396

Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1  

E-Print Network (OSTI)

Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1 Fish Tank Water Changing Fry and tanks: 1. Remove air stone & lid, then take tank from shelf and place fry to make sure it matches # on tank label. 4. Use small (air stone size) plastic tubing to siphon

Langerhans, Brian

397

A Comparative experimental study of media access protocols for wireless radio networks  

SciTech Connect

We conduct a comparative experimental analysis of three well known media access protocols: 802.11, CSMA, and MACA for wireless radio networks. Both fixed and ad-hoc networks are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of experiments was to study how (i) the size of the network, (ii) number of open connections, (iii) the spatial location of individual connections, (iv) speed with which individual nodes move and (v) protocols higher up in the protocol stack (e,g. routing layer) affect the performance of the media access sublayer protocols. The performance of the protocols was measured w.r.t. three important parameters: (1) number of received packets, (2) average latency of each packet, and (3) throughput. The following general qualitative conclusions were obtained; some of the conclusions reinforce the earlier claims by other researchers. (1) Although 802.11 performs better than the other two protocols with respect to fairness of transmission, packets dropped, and latency, its performance is found to (i) show a lot of variance with changing input parameters and (ii) the overall performance still leaves a lot of room for improvement. (2) CSMA does not perform too well under the fairness criteria, however, was the best in terms of the latency criteria. (3) MACA also shows fairness problems and has poor performance at high packet injection rates. (4) Protocols in the higher level of the protocol stack affect the MAC layer performance. The main general implications of our work is two folds: (1) No single protocol dominated the other protocols across various measures of efficiency. This motivates the design of a new class of parameterized protocols that adapt to changes in the network connectivity and loads. We refer to these class of protocols as parameterized dynamically adaptive efficient protocols and as a first step suggest key design requirements for such a class of protocols. (2) Performance analysis of protocols at a given level in the protocol stack need to be studied not locally in isolation but as a part of the complete protocol stack. The results suggest that in order to improve the performance of a communication network, it will be important to study the entire protocol stuck as a single algorithmic construct; optimizing individual layers in the 7 layer OSI stack will not yield performance improvements beyond a point.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, M. V. (Madhav V.)

2001-05-24T23:59:59.000Z

398

Verifying a Simplified Fuel Oil Flow Field Measurement Protocol  

SciTech Connect

The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

Henderson, H.; Dentz, J.; Doty, C.

2013-07-01T23:59:59.000Z

399

Protocol, Technical Qualification Program - October 22, 2003 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technical Qualification Program - October 22, 2003 Technical Qualification Program - October 22, 2003 Protocol, Technical Qualification Program - October 22, 2003 October 22, 2003 Technical Qualification Program Procedure (OA-50-TQP-1) This procedure implements the Office of ES&H Evaluations Technical Qualification Program (TQP) per the criteria contained in DOE Manual 426.1-1 "Federal Technical Capability Manual". Key elements of the program include: identifying personnel required to participate in the TQP, identifying, developing, approving, revising and updating individual qualification requirements, evaluating staff members against the assigned Technical Qualification Standards and documenting the approval of equivalencies, establishing and updating individual development plans, training

400

Special Features: Kyoto University's International Relations Endeavors  

E-Print Network (OSTI)

researchers, but to actively engage with the international community, concentrating on the strategy's three central pillars of research, education, and international service. This issue of Research Activities University is to sustain and develop its historical commitment to academic freedom and to pursue harmonious

Takada, Shoji

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

26AUTUMN 2014 Kyoto University Newsletter  

E-Print Network (OSTI)

International Offices: The European Center in Heidelberg and the ASEAN Center in Bangkok World-renowned KU

Takada, Shoji

402

Climate policy: The Kyoto approach has failed  

Science Journals Connector (OSTI)

... capital invested in it, numerous subsequent Conference of the Parties (COP) meetings and considerable economic costs, it has had no noticeable impact on global carbon emissions. These remain on ... India will be twice their present size, requiring the addition of 400–600 gigawatts of coal-fired generating capacity to their electricity systems. ...

Dieter Helm

2012-11-28T23:59:59.000Z

403

Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks  

E-Print Network (OSTI)

Many energy-aware routing protocols have been proposed for wireless sensor networks. Most of them are only energy savers and do not take care about energy balancing. The energy saver protocols try to decrease the energy consumption of the network as a whole; however the energy manager protocols balance the energy consumption in the network to avoid network partitioning. This means that energy saver protocols are not necessarily energy balancing and vice versa. However, the lifetime of wireless sensor network is strictly depending on energy consumption; therefore, energy management is an essential task to be considered. This paper proposes an energy aware routing protocol, named FEAR, which considers energy balancing and energy saving. It finds a fair trade-off between energy balancing and energy saving by fuzzy set concept. FEAR routing protocol is simulated and evaluated by Glomosim simulator.

Ahvar, Ehsan; Piran, Mohammad Jalil

2011-01-01T23:59:59.000Z

404

Next-generation communication protocol concepts for future nanosatellite constellations  

Science Journals Connector (OSTI)

Nanosatellite constellations at low Earth orbits represent a cost-efficient way for the accomplishment of Earth and space observation tasks. With the growing complexity of the exploration tasks, the amount of science data is expected to increase. For data download purposes efficient communication strategies must be adopted. The available power of a single nanosatellite spacecraft is limited by the small area of solar arrays. The communications equipment consumes a substantial amount of power. A constellation of nanosatellites allows to share resources efficiently, assigning major tasks to different spacecrafts. Within the constellation, a dedicated spacecraft which acts as data relay, monitoring and controlling inter-satellite communications is advantageous. This allows all other satellites to reuse the energy saved by implementing low-energy consuming communications links between the satellites. With this approach, taking advantage of scheduled communication contacts, the overall system performance can be maximized. For the envisaged data relay scenario, the adoption of advanced communication protocol concepts is required. This paper presents innovative solutions for the fulfilment of the described communications tasks. After an investigation of the system requirements, strategies for the interconnection of the spacecrafts for the creation of a small constellation network are provided. Suitable transport protocol implementations are investigated and efficient store-and-forward concepts are proposed. A communication architecture for the usage of a data relay satellite within the constellation is presented, describing the role of the different nodes in the network.

Patrick Romano; Manuela Unterberger; Otto Koudelka

2010-01-01T23:59:59.000Z

405

Trapped Ion Quantum Error Correcting Protocols Using Only Global Operations  

E-Print Network (OSTI)

Quantum error-correcting codes are many-body entangled states that are prepared and measured using complex sequences of entangling operations. Each element of such an entangling sequence introduces noise to delicate quantum information during the encoding or reading out of the code. It is important therefore to find efficient entangling protocols to avoid the loss of information. Here we propose an experiment that uses only global entangling operations to encode an arbitrary logical qubit to either the five-qubit repetition code or the five-qubit code, with a six-ion Coulomb crystal architecture in a Penning trap. We show that the use of global operations enables us to prepare and read out these codes using only six and ten global entangling pulses, respectively. The proposed experiment also allows the acquisition of syndrome information during readout. We provide a noise analysis for the presented protocols, estimating that we can achieve a six-fold improvement in coherence time with noise as high as $\\sim 1\\%$ on each entangling operation.

Joseph F. Goodwin; Benjamin J. Brown; Graham Stutter; Howard Dale; Richard C. Thompson; Terry Rudolph

2014-07-07T23:59:59.000Z

406

Building America Indoor Temperature and Humidity Measurement Protocol  

SciTech Connect

When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every 4 years the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the 'average occupant' in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

Engebrecht-Metzger, C.; Norton, P.

2014-02-01T23:59:59.000Z

407

International Workshops to Foster Implementation of the IAEA Additional Protocol  

SciTech Connect

A country’s adherence to the International Atomic Energy Agency’s (IAEA) Additional Protocol is an important statement to the world of that country’s commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEA’s regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

2003-07-14T23:59:59.000Z

408

Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair'  

SciTech Connect

Three protocols of quantum cryptography with a nonmaximally entangled qubit pair [Phys. Rev. A 80, 022323 (2009)] were recently proposed by Shimizu, Tamaki, and Fukasaka. The security of these protocols is based on the quantum-mechanical constraint for a state transformation between nonmaximally entangled states. However, we find that the second protocol is vulnerable under the correlation-elicitation attack. An eavesdropper can obtain the encoded bit M although she has no knowledge about the random bit R.

Qin Sujuan; Gao Fei; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); Guo Fenzhuo [School of Science, Beijing University of Posts and Telecommunications, Beijing, 100876 (China)

2010-09-15T23:59:59.000Z

409

Breaking and making quantum money: toward a new quantum cryptographic protocol  

E-Print Network (OSTI)

Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge. There are no secure public-key quantum money schemes in the literature; as we show in this paper, the only previously published scheme [1] is insecure. We introduce a category of quantum money protocols which we call collision-free. For these protocols, even the bank cannot prepare multiple identical-looking pieces of quantum money. We present a blueprint for how such a protocol might work as well as a concrete example which we believe may be insecure.

Andrew Lutomirski; Scott Aaronson; Edward Farhi; David Gosset; Avinatan Hassidim; Jonathan Kelner; Peter Shor

2009-12-21T23:59:59.000Z

410

An improved 45Ca protocol for investigating physiological mechanisms in coral calcification  

Science Journals Connector (OSTI)

A sensitive experimental protocol using cloned corals (hereafter “microcolonies”) of the branching scleractinian coral Stylophora pistillata and 45Ca has been developed to enable reproducible measurements of phys...

E. Tambutté; D. Allemand; I. Bourge; J. -P. Gattuso; J. Jaubert

1995-05-01T23:59:59.000Z

411

A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes  

Energy.gov (U.S. Department of Energy (DOE))

Summary of LANL?s testing protocol work presented to the High Temperature Membrane Working Group Meeting, Orlando FL, October 17, 2003

412

David Niedzwiecki 3/2/2012 2:37:42 PM Protocol for Ultrathin Nitride Membranes  

E-Print Network (OSTI)

necessary to remove the nitride layer. -Use the CHF3/CF4/Ar oxide removal protocol to remove the oxide. Do 8

Movileanu, Liviu

413

E-Print Network 3.0 - aware routing protocol Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

for Mobile Ad Hoc Networks Morteza Maleki, Karthik Dantu... the network lifetime. Simulation results show that the proposed power-aware source routing protocol has... . The...

414

Testing and Evaluation Protocol for Backpack-Based Radiation Detection Systems Used for Homeland  

E-Print Network (OSTI)

Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

415

Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security  

E-Print Network (OSTI)

Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

416

Testing and Evaluation Protocol for Spectroscopy-Based Portal Monitors Used for Homeland Security  

E-Print Network (OSTI)

Testing and Evaluation Protocol for Spectroscopy- Based Portal Monitors Used for Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

417

Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland  

E-Print Network (OSTI)

Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

418

Testing and Evaluation Protocol for Alarming Personal Radiation Detectors for Homeland Security  

E-Print Network (OSTI)

Testing and Evaluation Protocol for Alarming Personal Radiation Detectors for Homeland Security T................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

419

Testing and Evaluation Protocol for Mobile and Transportable Radiation Monitors Used for Homeland  

E-Print Network (OSTI)

Testing and Evaluation Protocol for Mobile and Transportable Radiation Monitors Used for Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

420

Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security  

E-Print Network (OSTI)

Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security  

E-Print Network (OSTI)

Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

422

Eavesdropping on the "ping-pong" type quantum communication protocols with invisible photon  

E-Print Network (OSTI)

The crucial issue of quantum communication protocol is its security. In this paper, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed. PACS:03.67.Hk

Qing-yu Cai

2005-07-30T23:59:59.000Z

423

Development and quantitative analyses of a universal rRNA-subtraction protocol for microbial metatranscriptomics  

E-Print Network (OSTI)

Metatranscriptomes generated by pyrosequencing hold significant potential for describing functional processes in complex microbial communities. Meeting this potential requires protocols that maximize mRNA recovery by ...

Stewart, Frank J.

424

Science DMZ Case Studies  

NLE Websites -- All DOE Office Websites (Extended Search)

Studies Science Engagement Move your data Programs & Workshops Science Requirements Reviews Case Studies OSCARS Case Studies Science DMZ Case Studies Science DMZ @ UF Science DMZ @...

425

Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks  

SciTech Connect

We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

426

Addendum to the Building America House Simulation Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

Addendum to the Building Addendum to the Building America House Simulation Protocols C. Engebrecht Metzger, E. Wilson, and S. Horowitz National Renewable Energy Laboratory December 2012 ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, subcontractors, or affiliated partners makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark,

427

DOE Transportation Protocols Topic Group Summary of Second Conference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary of Second Conference Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TEC/WG) DOE Transportation Protocols Working Group was held at 11:00 a.m. Eastern time on Thursday, April 8, 1999. The session was led by Mona Williams, DOE/National Transportation Program (NTP)-Albuquerque. Other participants included Patricia Armijo, DOE/NTP-Albuquerque; Alex Thrower, Urban Energy & Transportation Corporation; Chris Wells, Southern States Energy Board; Elizabeth Helvey, JK Research Associates; Ken Niles, Oregon Office of Energy; Lisa Sattler, Council of State Governments-Midwestern Office; Laurel Cook, DOE/Naval Reactors (NR); Chris Wentz, New Mexico Department of Energy, Minerals and Natural Resources; Phillip Paull, Council of State Governments-Northeastern Conference; and

428

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells  

NLE Websites -- All DOE Office Websites (Extended Search)

USCAR FUEL CELL TECH TEAM USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May 26, 2010 Fuel cells, especially for automotive propulsion, must operate over a wide range of operating and cyclic conditions. The desired operating range encompasses temperatures from below the freezing point to well above the boiling point of water, humidity from ambient to saturated, and half-cell potentials from 0 to >1.5 volts. Furthermore, the anode side of the cell may be exposed to hydrogen and air during different parts of the driving and startup/shutdown cycles. The severity in operating conditions is greatly exacerbated by the transient and cyclic nature of

429

Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4/12/10 4/12/10 1 EM Protocol for Application of Contingency and Management Reserve for the Acquisition of Capital Asset Projects This document provides guidance for the development and consistent application of government contingency and contractor management reserve (MR) in the planning and execution of DOE capital asset projects in accordance with the requirements of DOE Order 413.3 and the Federal Acquisition Regulations (FARs). This guidance is consistent with Acquisition Letter 2009-01, "Management Reserve and Contingency," October 6, 2008 from the Office of Procurement and Assistance Management. Project contingency and MR are an integral part of the DOE capital asset project risk management process, providing project managers with the tools to respond to project risks and

430

Automated Protocols Used by Labs | Scientific and Technical Information  

Office of Scientific and Technical Information (OSTI)

Notices Notices Automated Protocols Used by Labs Print page Print page Email page Email page DOE laboratories have two additional options for submitting data electronically to OSTI. They are: Batch Upload (Site-to-OSTI), and Harvesting (OSTI-to-Site). The XML DTD supporting Batch Upload specifies the same metadata that is used by the web-based AN 241.1. The main difference between web notice input and Harvesting upload is that the latter allows uploading of multiple records as a batch file. The web 241.1 is for single-record input only. Harvesting consists of three main phases: 1) Metadata mapping and technical development, 2) Testing, and 3) Production. The production phase is ongoing based on monitoring for quality control. Required Metadata Elements Author(s)

431

Microsoft Word - Assessment-C-SiteVisitProtocol  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ATTACHMENT C ATTACHMENT C DEPARTMENTAL EVALUATION AND SITE VISIT PROTOCOL 1. The Departmental Records Officer will provide in writing to the PRO a sixty day notice of intent to evaluate, along with recommended sites to be visited and areas to be examined. 2. The PRO will notify sites to be visited and coordinate mutually agreeable dates with the Departmental Records Officer. 3. The PRO will provide an overview of the organization's Records Management Program and make summaries of assessments available for review prior to the evaluation. 4. The PRO will highlight changes made to the program and future plans for improvement. 5. Field site visits may include the PRO and shall not exceed three days unless specified in writing. 6. Field sites will provide an overview of:

432

A Zero Knowledge Protocol For Nuclear Warhead Verification  

SciTech Connect

The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

Glaser, Alexander [Princeton, Univ., NJ (United States). Program on Science and Global Security] [Princeton, Univ., NJ (United States). Program on Science and Global Security; Goldston, Robert J. [Princeton Plasma Physics Lab., Princeton, NJ (United States)] [Princeton Plasma Physics Lab., Princeton, NJ (United States)

2014-03-14T23:59:59.000Z

433

Addendum to the Building America House Simulation Protocols  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Addendum to the Building Addendum to the Building America House Simulation Protocols C. Engebrecht Metzger, E. Wilson, and S. Horowitz National Renewable Energy Laboratory December 2012 ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, subcontractors, or affiliated partners makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark,

434

Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software  

SciTech Connect

This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

2013-09-06T23:59:59.000Z

435

EIA - Forecasts and Analysis of Energy Data  

Gasoline and Diesel Fuel Update (EIA)

G: Key Assumptions for the IEO2005 Kyoto Protocol Case G: Key Assumptions for the IEO2005 Kyoto Protocol Case Energy-Related Emissions of Greenhouse Gases The System for the Analysis of Global energy Markets (SAGE)—the model used by the Energy Information Administration (EIA) to prepare the International Energy Outlook 2005 (IEO2005) mid-term projections—does not include non-energy-related emissions of greenhouse gases, which are estimated at about 15 to 20 percent of total greenhouse gas emissions, based on inventories submitted to the United Nations Framework Convention on Climate Change (UNFCCC). SAGE models global energy supply and demand and, therefore, does not address agricultural and other non-energy-related emissions. EIA implicitly assumes that percentage reductions of non-energy-related emissions and their associated abatement costs will be similar to those for energy-related emissions. Non-energy-related greenhouse gas emissions are likely to grow faster than energy-related emissions; however, the marginal abatement costs for non-energy-related greenhouse gas emissions are not known and cannot be estimated reliably. In SAGE, each region’s emissions reduction goal under the Kyoto Protocol is based only on the corresponding estimate of that region’s energy-related carbon dioxide emissions, as determined by EIA data. It is assumed that the required reductions will also be proportionately less than if all gases were included.

436

A Formal Approach to Distance-Bounding RFID Protocols  

E-Print Network (OSTI)

Kasper2 Cristina Onete1 1 Darmstadt University of Technology & CASED, Germany www.minicrypt.de 2 Fraunhofer Institute for Secure Information Technology (SIT) and CASED, Germany Abstract. Distance one or two such threats, but no rigorous cryptographic security models --nor clean security proofs

437

The past, present and future of protocol checking with CSP and FDR  

E-Print Network (OSTI)

AVoCS 2006 The past, present and future of protocol checking with CSP and FDR Bill Roscoe1 Oxford of these meetings was the development of the CSP model of cryptographic protocols, following Gavin Lowe's discovery the particular advantages of using a process algebra, and CSP in particular, for modelling cryptoprotocols

Paris-Sud XI, Université de

438

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network (OSTI)

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

439

Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman, William Ivancic  

E-Print Network (OSTI)

Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman, William Ivancic to ensure connectivity of the mobile nodes with the Internet. However, there has been no comprehensive cost analysis of mobility protocol entities that considers all possible costs. In this paper, we have developed

Atiquzzaman, Mohammed

440

Off-line Micro-payment Protocol for Multiple Vendors in Mobile Commerce Xiaoling Dai1  

E-Print Network (OSTI)

to be enhanced for existing micro- payment approaches. Also, with the proliferation of wireless networks, mobile] and the NetPay micro-payment protocol with the client- side e-wallet in the client-server networks. WeOff-line Micro-payment Protocol for Multiple Vendors in Mobile Commerce Xiaoling Dai1 Oluwatomi

Grundy, John

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis  

Science Journals Connector (OSTI)

......Automated Validation of Internet Security Protocols and...formalisms is natural in a young research area as researchers...Automated Validation of Internet Security Protocols and...used by principal A. By abuse of notation, we also...Mn . We will slightly abuse notation and refer to......

Carlos Caleiro; Luca Viganò; David Basin

2005-11-01T23:59:59.000Z

442

Fish Community Assessment Rapid Bioassessment Protocol V --Fish (EPA 1989, 1999).......................................................693  

E-Print Network (OSTI)

APPENDIX C Fish Community Assessment CONTENTS Rapid Bioassessment Protocol V -- Fish (EPA 1989 ......................................................................................................................................707 RAPID BIOASSESSMENT PROTOCOL V -- FISH (EPA 1989, 1999) The following are excerpts from U.S. EPA, but focuses on fish. Electrofishing, the most common technique used by agencies that monitor fish communities

Pitt, Robert E.

443

Optimal Decentralized Protocol for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low  

E-Print Network (OSTI)

Abstract-- Motivated by the power-grid-side challenges in the integration of electric vehicles, we proposeOptimal Decentralized Protocol for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low a decentralized protocol for negotiating day-ahead charging schedules for electric vehicles. The overall goal

Low, Steven H.

444

SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks  

E-Print Network (OSTI)

SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks Venugopalan Ramasubramanian@ece.cornell.edu, egs@cs.cornell.edu} ABSTRACT A central challenge in ad hoc networks is the design of rout- ing--Routing Protocols General Terms Design, Performance Keywords Hybrid, Adaptive, Ad Hoc Networks This work

Keinan, Alon

445

Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks  

E-Print Network (OSTI)

Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks Suyang Ju Submitted to the graduate degree program in Electrical Engineering & Computer Science and the Graduate Faculty of the University of Kansas School...: Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks Dissertation Committee: _____________________________________ Dr. Joseph B. Evans, Advisor Professor, EECS _____________________________________ Dr. Victor Frost...

Ju, Suyang

2011-12-31T23:59:59.000Z

446

Comparison of two Self-Organization and Hierarchical Routing Protocols for Ad Hoc Networks  

E-Print Network (OSTI)

Comparison of two Self-Organization and Hierarchical Routing Protocols for Ad Hoc Networks Bet. In this article, we compare two self-organization and hierarchical rout- ing protocols for ad hoc networks-organization and hierarchical routing in ad hoc networks. keywords: ad hoc networks, hierarchical routing, DHT, comparison

Paris-Sud XI, Université de

447

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols  

E-Print Network (OSTI)

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols Nuno Neves W. Kent that allows the rapid testing of checkpoint protocols with standard benchmarks. To achieve this goal, RENEW evaluated using the RENEW envi- ronment with SPEC and NAS benchmarks on a network of workstations connected

Neves, Nuno

448

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols  

E-Print Network (OSTI)

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols Nuno Neves W. Kent that allows the rapid testing of checkpoint protocols with standard benchmarks. To achieve this goal, RENEW evaluated using the RENEW envi­ ronment with SPEC and NAS benchmarks on a network of workstations connected

Neves, Nuno

449

ILC-TCP: An Interlayer Collaboration Protocol for TCP Performance Improvement in Mobile and Wireless  

E-Print Network (OSTI)

Internet has led to the optimization of network protocols to provide for a better performance. Most of the Internet traffic uses TCP, the de- facto transport layer protocol. Unfortunately, TCP performance degrades in the mobile and wireless environments. A good amount of research has been attempted to improve its performance

Helal, Abdelsalam

450

Internet Time Synchronization: the Network Time Protocol1,2,3 David L. Mills  

E-Print Network (OSTI)

Internet Time Synchronization: the Network Time Protocol1,2,3 David L. Mills Electrical Engineering is designed to distribute time information in a large, diverse internet system operating at speeds from and resulted in the designation of NTP as an Internet Standard protocol. The NTP synchronization system, which

Mills, David L.

451

LOTEC: A Simple DSM Consistency Protocol for Nested Object Transactions Peter Graham and Yahong Sui  

E-Print Network (OSTI)

LOTEC: A Simple DSM Consistency Protocol for Nested Object Transactions Peter Graham and Yahong Sui Memory (DSM) consistency protocol for an unconventional but important application domain - object applications typically targetted by DSM system designers. While, after 10 years of performance enhancement

Graham, Peter

452

DSM-PM2: A portable implementation platform for multithreaded DSM consistency protocols  

E-Print Network (OSTI)

DSM-PM2: A portable implementation platform for multithreaded DSM consistency protocols Gabriel Antoniu and Luc Bougé Abstract DSM-PM2 is a platform for designing, implementing and experimenting multithreaded DSM consistency proto- cols. It provides a generic toolbox which facilitates protocol design

Paris-Sud XI, Université de

453

Hector is an Energy effiCient Tree-based Optimized Routing protocol for wireless networks  

E-Print Network (OSTI)

Hector is an Energy effiCient Tree-based Optimized Routing protocol for wireless networks Nathalie geographic locations. We propose HECTOR, a hybrid energy efficient tree-based optimized routing protocol, based on two sets of virtual coordinates. One set is based on rooted tree coordinates, and the other

Stojmenovic, Ivan

454

Energy-Aware Tag Anti-Collision Protocols for RFID Systems Vinod Namboodiri, Lixin Gao  

E-Print Network (OSTI)

provide significant energy savings when compared to the existing Query Tree protocol while sharingEnergy-Aware Tag Anti-Collision Protocols for RFID Systems Vinod Namboodiri, Lixin Gao Department of Electrical and Computer Engineering University of Massachusetts at Amherst Email: {vnambood, lgao

Namboodiri, Vinod

455

A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks  

E-Print Network (OSTI)

A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks H. Yang, F. Ye and B. Sikdar a "Dynamic Query-tree Energy Balancing" (DQEB) protocol to dynamically adjust the tree structure and minimize networks. In [15] it has been shown that the minimum- energy broadcast tree problem is NP

Sikdar, Biplab

456

Efficient protocols for generating bipartite classical distributions and quantum Zhaohui Wei  

E-Print Network (OSTI)

Efficient protocols for generating bipartite classical distributions and quantum states Rahul Jain in optimization, convex geometry, and information theory. 1. To generate a classical distribution P(x, y), we an approximation of is allowed to generate a distribution (X, Y ) P, we present a classical protocol

Jain, Rahul

457

Utility Accrual Real-Time Resource Access Protocols with Assured Individual Activity Timeliness Behavior  

E-Print Network (OSTI)

Utility Accrual Real-Time Resource Access Protocols with Assured Individual Activity Timeliness Behavior Abstract We present a class of utility accrual resource access protocols for real-time embedded systems. The proto- cols consider application activities that are subject to time/utility function time

Ravindran, Binoy

458

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks  

E-Print Network (OSTI)

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks François Ingelrest.Mitton,David.Simplot}@lifl.fr Abstract--We present a turnover based adaptive HELLO protocol (TAP), which enables nodes in mobile networks to dynamically adjust their HELLO messages frequency depending on the current speed of nodes. To the best of our

Paris-Sud XI, Université de

459

Developing and Evaluating Routing Protocols for Rural Areas That Communicates Via Data Mules  

E-Print Network (OSTI)

Developing and Evaluating Routing Protocols for Rural Areas That Communicates Via Data Mules connectivity to isolated village networks via multiple data mules. These multiple mules communicate in order traces for multiple data mules for rural-like areas the existing protocols ad hoc on-demand distance

Blake, Edwin

460

On RTLOTOS and its application to the formal design of multimedia protocols \\Lambda  

E-Print Network (OSTI)

APPLICATION ` A LA CONCEPTION FORMELLE DE PROTOCOLES MULTIM ' EDIA R'esum'e Cet article pr'esente une nouvelle protocoles multim'edia. Une m'ethode de conception bas'ee sur des modules de sp'ecification r'es : M'ethodes formelles, LOTOS, Synchro­ nisation multim'edia Contents I Introduction 1 II LOTOS 2 III

Courtiat, Jean-Pierre

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Specification and Analysis of the AER/NCA Active Network Protocol Suite in  

E-Print Network (OSTI)

Specification and Analysis of the AER/NCA Active Network Protocol Suite to the specification and analy- sis of the AER/NCA suite of active network multicast protocol compo- nents, AER/NCA poses challenging new problems for its formal specification and analysis. Real-Time Maude

Ã?lveczky, Peter Csaba

462

The Municipal Solid Waste Landfill as a Source of Montreal Protocol-restricted Halocarbons in the  

E-Print Network (OSTI)

The Municipal Solid Waste Landfill as a Source of Montreal Protocol-restricted Halocarbons of Geophysics #12;2 #12;The Municipal Solid Waste Landfill as a Source of Montreal Protocol municipal solid waste (MSW) landfills. With several hundred MSW landfills in both the US and UK, estimating

463

Protocol EM-HQ Review Field Self Assessment Site Specific QAP-QIP February  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EM-HQ Review Field Self Assessment Site Specific QAP-QIP EM-HQ Review Field Self Assessment Site Specific QAP-QIP February 2010 Protocol EM-HQ Review Field Self Assessment Site Specific QAP-QIP February 2010 This memorandum serves to transmit the Protocol for EM Review/Field Self-Assessment of Site-Specific QAP/QIP. The subject document is developed as part of continued efforts to ensure technical consistency, transparency, and clarity of QA requirements and expectations. Protocol EM-HQ Review Field Self Assessment Site Specific QAP-QIP February 2010 More Documents & Publications Protocol for EM Review/Field Self-Assessment of Site-Specific QAPs/QIPs Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans SOPP-43, EM-23 Quality Assurance Oversight

464

Event:GHG Protocol Latin America and Caribbean Regional Training: How to  

Open Energy Info (EERE)

Protocol Latin America and Caribbean Regional Training: How to Protocol Latin America and Caribbean Regional Training: How to Establish a National Corporate Emissions Reporting Program Jump to: navigation, search Calendar.png GHG Protocol Latin America and Caribbean Regional Training: How to Establish a National Corporate Emissions Reporting Program: all day on 2011/08/29 Aug 29 - Sept 2: Bogota, Colombia This regional workshop will provide training for government agencies, business/industry associations and key NGOs on how to establish and implement national- or regional-level corporate greenhouse gas (GHG) emissions reporting programs and trainings. The workshop will include two parts: a training of trainers of corporate GHG accounting and reporting, and a corporate GHG program design course. Members of the Brazil GHG Protocol Program, the Mexico GHG Protocol

465

Subfreezing Start/Stop Protocol for an Advanced Metallic Open-Flowfield Fuel Cell Stack  

NLE Websites -- All DOE Office Websites (Extended Search)

Subfreezing Start/Stop Protocol for an Advanced Subfreezing Start/Stop Protocol for an Advanced Subfreezing Start/Stop Protocol for an Advanced Subfreezing Start/Stop Protocol for an Advanced Subfreezing Start/Stop Protocol for an Advanced Metallic Open Metallic Open Metallic Open Metallic Open- - - -Flowfield Flowfield Flowfield Flowfield Fuel Cell Stack Fuel Cell Stack Fuel Cell Stack Fuel Cell Stack Presented at: US DOE New Projects Kickoff Meeting Washington, DC 13-14 February 2007 Alternative Energy Efficient Simple Clean Today Alternative Energy Efficient Simple Clean Today Objective Objective Objective Objective This project will demonstrate a PEM fuel cell stack that is able to perform and start up in subfreezing conditions, respecting allowed energy budget, and showing limited impact at extreme temperatures over multiple

466

Running key mapping in a quantum stream cipher by the Yuen 2000 protocol  

Science Journals Connector (OSTI)

A quantum stream cipher by Yuen 2000 protocol (so-called Y00 protocol or ?? scheme) consisting of linear feedback shift register of short key is very attractive in implementing secure 40 Gbits/s optical data transmission, which is expected as a next-generation network. However, a basic model of the Y00 protocol with a very short key needs a careful design against fast correlation attacks as pointed out by Donnet et al. This Brief Report clarifies an effectiveness of irregular mapping between running key and physical signals in the driver for selection of M-ary basis in the transmitter, and gives a design method. Consequently, quantum stream cipher by the Y00 protocol with our mapping has immunity against the proposed fast correlation attacks on a basic model of the Y00 protocol even if the key is very short.

Tetsuya Shimizu, Osamu Hirota, and Yuki Nagasako

2008-03-27T23:59:59.000Z

467

Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol  

SciTech Connect

The participant attack is the most serious threat for quantum secret-sharing protocols. We present a method to analyze the security of quantum secret-sharing protocols against this kind of attack taking the scheme of Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59, 1829 (1999)] as an example. By distinguishing between two mixed states, we derive the necessary and sufficient conditions under which a dishonest participant can attain all the information without introducing any error, which shows that the HBB protocol is insecure against dishonest participants. It is easy to verify that the attack scheme of Karlsson, Koashi, and Imoto [Phys. Rev. A 59, 162 (1999)] is a special example of our results. To demonstrate our results further, we construct an explicit attack scheme according to the necessary and sufficient conditions. Our work completes the security analysis of the HBB protocol, and the method presented may be useful for the analysis of other similar protocols.

Qin Sujuan [State Key Laboratory of Network Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); School of Science, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); Gao Fei; Wen Qiaoyan [State Key Laboratory of Network Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, P. O. Box 810, Chengdu, 610041 (China)

2007-12-15T23:59:59.000Z

468

MIT Joint Program on the Science and Policy of Global Change  

E-Print Network (OSTI)

The Kyoto Protocol and Developing Countries Mustafa Babiker, John M. Reilly and Henry D. Jacoby Report No-profit organizations. To inform processes of policy development and implementation, climate change research needs://web.mit.edu/globalchange/www/ Printed on recycled paper #12;The Kyoto Protocol and Developing Countries Mustafa Babiker, John M. Reilly

469

Entrepreneurship and the carbon market: opportunities and challenges for South African entrepreneurs  

Science Journals Connector (OSTI)

The Kyoto Protocol and its implementation brought forward issues of climate change and its mitigation strategy by national measures through the creation of market mechanisms in carbon trading. The trading of emission certificates has become an important ... Keywords: Carbon market, Carbon trading, Clean Development Mechanism, Entrepreneurship, Kyoto Protocol, South Africa

Inga Jessica Nkusi; Semhar Habtezghi; Harald Dolles

2014-08-01T23:59:59.000Z

470

Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01  

Energy.gov (U.S. Department of Energy (DOE))

Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01

471

Energy Market Projections and Differentiated Carbon Abatement in the European Union  

Science Journals Connector (OSTI)

The Kyoto Protocol documents what many believed to be impossible: negotiators for many of the world’s countries agreed on emissions targets for the early part of the 21st century. The protocol commits the Anne...

Christoph Böhringer; Jesper Jensen…

2000-01-01T23:59:59.000Z

472

Teapot: Language Support for Writing Memory Coherence Protocols Satish Chandra, Brad Richards, and James R.Lams  

E-Print Network (OSTI)

Teapot: Language Support for Writing Memory Coherence Protocols Satish Chandra, Brad Richards to write, debug, understand, or modlfi. This paper describes Teapot, a small, domain-specij$c language for writing coherence protocols. Teapot uses continuations to help reduce the complexity of writing protocols

Richards, Brad

473

Energy-Efficient Reliable Paths for On-Demand Routing Protocols Tamer Nadeem, Suman Banerjee, Archan Misra, Ashok Agrawala  

E-Print Network (OSTI)

1 Energy-Efficient Reliable Paths for On-Demand Routing Protocols Tamer Nadeem, Suman Banerjee within the framework of on-demand routing protocols. Computation of minimum energy reli- able paths does not work for on-demand protocols and some additional mechanisms are needed to compute energy

Banerjee, Suman

474

Impact of an Abbreviated Cardiac Enzyme Protocol to Aid Rapid Discharge of Patients with Cocaine-associated Chest Pain in the Clinical Decision Unit  

E-Print Network (OSTI)

of an Abbreviated Cardiac Enzyme Protocol to Aid Rapidof an abbreviated cardiac enzyme protocol resulted in thefurther workup. If cardiac enzymes remained negative, there

2014-01-01T23:59:59.000Z

475

Z-States Algebra for a Tunable Multi-Party Entanglement-Distillation Protocol  

E-Print Network (OSTI)

W-States have achieved the status of the standard fully symmetric entangled states, for many entanglement application purposes. Z-States are a generalization of W-States that display an elegant algebra, enabling short paths to desired results. This paper describes Z-States algebra starting from neat definitions and laying down explicitly some fundamental theorems on composition and distillation, needed for applications. These theorems are synthesized into a generic tunable Entanglement-Distillation Protocol. Applications are readily developed based upon the tunable protocol. A few examples are provided to illustrate the approach generality. A concomitant graphical representation allows fast comprehension of the protocol inputs, operations and outcomes.

Exman, Iaakov

2011-01-01T23:59:59.000Z

476

Takashi Negishi,"Kyoto School of Modern Economic Theory", Kyoto Economic Review, 73-1, 2004  

E-Print Network (OSTI)

in Asia ASEAN Economy and Sustainable Development Comparative Development Studies Environmental Economic

Takada, Shoji

477

Developments in Assisting Countries in Implementing the IAEA Additional Protocol  

SciTech Connect

In 2008, the U.S. Department of Energy (DOE) began assisting selected non-nuclear weapon states in planning and preparing for implementation of the International Atomic Energy Agency’s Additional Protocol (AP). Since then, the AP international implementation program has contributed to the substantial progress made by Vietnam, Thailand, Iraq, and Malaysia in preparing for entry-into-force of the AP. An overall engagement plan has been developed with components designed to train government AP implementing agencies, inform policy makers, conduct outreach to industry and universities, make AP reporting software available and useful, and plan a detailed approach for implementing the declaration and complementary access provisions of the AP. DOE recently began collaborating with Indonesia, which has already entered the AP into force, requiring a second method of engagement somewhat different from that taken with countries that have not entered the AP into force. The AP international implementation program, administered by the International Nuclear Safeguards and Engagement Program, is working more closely with DOE’s International Nonproliferation Export Control Program to ensure countries are aware of and prepared to implement the export/import provisions of the AP. As the AP implementation program matures and helps move countries closer to entry-into-force or improved AP implementation, it is identifying characteristics of a country’s “end-state” that indicate that DOE assistance is no longer required. The U.S. AP Implementation Act and Senate Resolution of Ratification require the Administration to report annually to Congress on measures taken to achieve the adoption of the AP in non-nuclear weapon states. DOE’s AP international implementation program is a significant part of these measures. This paper describes recent developments to increase the scope and effectiveness of the program.

Killinger, Mark H.; Hansen, Linda H.; Cain, Ronald A.; Kovacic, Don N.; Apt, Kenneth E.; VanSickle, Matthew

2010-08-11T23:59:59.000Z

478

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol 2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability December 15, 2011 - 8:00am Addthis PROBLEM: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability. PLATFORM: Versions Prior to Pidgin 2.10.1 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux Optional Productivity Application 5 server RedHat Enterprise Linux ES 4 RedHat Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop version 4 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux AS 4 ABSTRACT: An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected

479

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

480

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

482

A three-pass establishment protocol for real-time multiparty communication  

E-Print Network (OSTI)

in the literature. They are severely limited when it comes to reserve resource for multiparty communication environments, in particular for multicast connections. We propose a new protocol for connection establishment in a real-time one-to-many communication...

Yoon, Jaehee

2012-06-07T23:59:59.000Z

483

Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)  

E-Print Network (OSTI)

://medsec.medien.uni-weimar.de/ 2 Technical University of Denmark http://www.erikzenner.name/ 3 escrypt Inc., USA http a formal proof of its concrete security. The protocol neither em- ploys asymmetric cryptography, nor

484

The ICoN integrated communication and navigation protocol for underwater acoustic networks  

E-Print Network (OSTI)

The deployment of autonomous underwater devices has increased dramatically in the last several years, presenting a strong and growing need for a network protocol to mediate acoustic communications between devices. This ...

Kanthan, Rupesh R

2005-01-01T23:59:59.000Z

485

A syndication-based messaging protocol for the global RFID network  

E-Print Network (OSTI)

This Master of Engineering thesis describes the design and implementation of a syndication based messaging protocol for the global RFID network. The motivation behind the design is to develop a scalable model that can be ...

Sun, Miao, M. Eng. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

486

Traffic-Aware Multi-Channel Multi-Stage Spectrum Sensing Protocols for Dynamic Spectrum Access  

E-Print Network (OSTI)

radios search for licensed spectral vacancies by performing spectrumspectrum sensing protocol, a DSA radio has to period- ically scan the licensedspectrum scarcity. All usable radio frequencies are already licensed

Gabran, Wesam Ramy I. F.

2012-01-01T23:59:59.000Z

487

E-Print Network 3.0 - ad-hoc network protocols Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Search Powered by Explorit Topic List Advanced Search Sample search results for: ad-hoc network protocols Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel models for...

488

CogPiT ---Configuration of Protocols in TIP Burkhard Stiller \\Lambda  

E-Print Network (OSTI)

CogPiT --- Configuration of Protocols in TIP Burkhard Stiller \\Lambda University of Cambridge 334476, FAX: +44 +1223 334678 E­Mail: Burkhard.Stiller@cl.cam.ac.uk Abstract The variety of upcoming

Haddadi, Hamed

489

HEART: heart exercise and remote technologies: A randomized controlled trial study protocol  

Science Journals Connector (OSTI)

This manuscript presents the protocol for a randomized controlled trial of a mHealth exercise-based CR program. Results of this trial will provide much needed information about physical and psychological well-bei...

Ralph Maddison; Robyn Whittaker; Ralph Stewart; Andrew Kerr…

2011-05-01T23:59:59.000Z

490

Protocol for EM Review/Field Self-Assessment of Site-Specific QAPs/QIPs  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of this document is to present the review protocol and lines of inquiry (LOIs) that are used as basis for EM-HQ technical review and approval of site-specific QAP/QIPs.

491

EVALUATION TECHNIQUE IN THE SPI-CALCULUS FOR CRYPTOGRAPHIC PROTOCOLS Hasan M. Al-Refai  

E-Print Network (OSTI)

EVALUATION TECHNIQUE IN THE SPI-CALCULUS FOR CRYPTOGRAPHIC PROTOCOLS Hasan M. Al-Refai halrefai@philadelphia.edu.jo Hasan_alrefai@yahoo.com Mobile Phone #: 00962-777357755 Abstract Bisimulation as a technique could

492

A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment  

E-Print Network (OSTI)

In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

Ruckmani, V

2010-01-01T23:59:59.000Z

493

The role of social factors in a dyadic training protocol: implications for computer-based instruction  

E-Print Network (OSTI)

This study investigated the influence of social factors in a dyadic training protocol. Specifically, the relationships between individual difference variables (extraversion and interaction anxiety), verbal communication, and the efficacy...

Tubre, Travis Charles

2012-06-07T23:59:59.000Z

494

VoIP: VoIP and multimedia protocols in wireless and firewalled environments  

Science Journals Connector (OSTI)

Large numbers of IT departments are currently grappling with security issues around the deployment of VoIP and multimedia protocols in wireless and firewalled environments. What should they be considering?

Matt Gordon-Smith; Stephen Wing

2006-07-01T23:59:59.000Z

495

Ontario’s Protocols for Evaluating the Energy and Bill Savings from Industrial Energy Efficiency Programs  

E-Print Network (OSTI)

. This paper focuses on how the protocols will help provide more transparent information to building owners about the net savings achieved by a particular energy efficiency investment and reviews the best methods available to estimate both gross and net energy...

Messenger, M.

2007-01-01T23:59:59.000Z

496

Validation of the new mixture design and testing protocol for lime stabilization  

E-Print Network (OSTI)

and testing protocol is presented for lime stabilized subgrades. Comparison of field test data and laboratory test data shows that laboratory design test properties were achieved in the field. These properties are used in a mechanistic analysis to assess...

Yusuf, Fateh Ul Anam Muhammad Shafee

2001-01-01T23:59:59.000Z

497

Protocols for multi-antenna ad-hoc wireless networking in interference environments  

E-Print Network (OSTI)

A fundamental question for the design of future wireless networks concerns the nature of spectrum management and the protocols that govern use of the spectrum. In the oligopoly model, spectrum is owned and centrally managed, ...

Hinton, Danielle A. (Danielle Ayodele), 1978-

2010-01-01T23:59:59.000Z

498

A dyadic protocol for training complex skills: a replication using female participants  

E-Print Network (OSTI)

A DYADIC PROTOCOL FOR TRAINING COMPLEX SKILLS: A REPLICA11ON USING FEMALE PARTICIPANTS A Thesis by MARIA LUISA SANCHEZ-KU Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... ABSTRACT A Dyadic Protocol For Training Complex Skills: A Replication Using Female Participants. (August I 999) Maria Luisa Sanchez-Ku, B. A. , Ohio Wesleyan University Chair of Advisory Committee: Dr. Winfred Arthur, Jr. The effectiveness...

Sanchez-Ku, Maria Luisa

1999-01-01T23:59:59.000Z

499

Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol  

Science Journals Connector (OSTI)

There exists a great gap between one-time pad with perfect secrecy and conventional mathematical encryption. The Yuen 2000 (Y00) protocol or ?? scheme may provide a protocol which covers from the conventional security to the ultimate one, depending on implementations. This paper presents the complexity-theoretic security analysis on some models of the Y00 protocol with nonlinear pseudo-random-number-generator and quantum noise diffusion mapping (QDM). Algebraic attacks and fast correlation attacks are applied with a model of the Y00 protocol with nonlinear filtering like the Toyocrypt stream cipher as the running key generator, and it is shown that these attacks in principle do not work on such models even when the mapping between running key and quantum state signal is fixed. In addition, a security property of the Y00 protocol with QDM is clarified. Consequently, we show that the Y00 protocol has a potential which cannot be realized by conventional cryptography and that it goes beyond mathematical encryption with physical encryption.

Osamu Hirota

2007-09-07T23:59:59.000Z

500

The quantum bit commitment: a finite open system approach for a complete classification of protocols  

E-Print Network (OSTI)

Mayers, Lo and Chau argued that all quantum bit commitment protocols are insecure, because there is no way to prevent an Einstein-Podolsky-Rosen (EPR) cheating attack. However, Yuen presented some protocols which challenged the previous impossibility argument. Up to now, it is still debated whether there exist or not unconditionally secure protocols. In this paper the above controversy is addressed. For such purpose, a complete classification of all possible bit commitment protocols is given, including all possible cheating attacks. Focusing on the simplest class of protocols (non-aborting and with complete and perfect verification), it is shown how naturally a game-theoretical situation arises. For these protocols, bounds for the cheating probabilities are derived, involving the two quantum operations encoding the bit values and their respective alternate Kraus decompositions. Such bounds are different from those given in the impossibility proof. The whole classification and analysis has been carried out using a "finite open system" approach. The discrepancy with the impossibility proof is explained on the basis of the implicit adoption of a "closed system approach"--equivalent to modeling the commitment as performed by two fixed machines interacting unitarily in a overall "closed system"--according to which it is possible to assume as "openly known" both the initial state and the probability distributions for all secret parameters, which can be then "purified". This approach is also motivated by existence of unitary extensions for any open system. However, it is shown that the closed system approach for the classification of commitment protocols unavoidably leads to infinite dimensions, which then invalidate the continuity argument at the basis of the impossibility proof.

Giacomo Mauro D'Ariano

2002-09-26T23:59:59.000Z