Powered by Deep Web Technologies
Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

The Cost of Kyoto Protocol Targets: The Case of Japan  

E-Print Network [OSTI]

This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

Paltsev, Sergey.

2

The Kyoto Protocol and developing countries  

E-Print Network [OSTI]

Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

3

Russia's role in the Kyoto Protocol  

E-Print Network [OSTI]

As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

Bernard, Alain.

4

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network [OSTI]

renewable energy. Instead, the Kyoto Protocol CDM process encourages carbon reduction in developing countries,

Ferrey, Steven

2010-01-01T23:59:59.000Z

5

Multi-Gas Assessment of the Kyoto Protocol John Reilly,*  

E-Print Network [OSTI]

Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

6

UNFINISHED BUSINESS: The Economics of The Kyoto Protocol  

SciTech Connect (OSTI)

The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of carbon if a global system of emissions mitigation could be quickly and effectively implemented. But it could also exceed $250 per tonne of carbon if the US must meet its emissions limitations entirely through domestic actions, and if mitigation obligations are not adequately anticipated by decision-makers.

JA Edmonds; CN MacCracken; RD Sands; SH Kim

2000-07-06T23:59:59.000Z

7

Impacts of the Kyoto Protocol on Energy Markets and Economic Activity  

Reports and Publications (EIA)

Analyzes the impacts on the Kyoto Protocol on U.S. energy markets and the economy in the 2008-2012 time frame.

1998-01-01T23:59:59.000Z

8

The effects on developing countries of the Kyoto Protocol and CO? emissions trading  

E-Print Network [OSTI]

This paper examines the effect of the Kyoto Protocol on developing economies using marginal abatement curves generated by MIT's Emissions Prediction and Policy Assessment model (EPPA). In particular, the paper addresses ...

Ellerman, A. Denny.; Jacoby, Henry D.; Decaux, Annelčne.

9

A game of climate chicken : can EPA regulate greenhouse gases before the U.S. Senate ratifies the Kyoto Protocol?  

E-Print Network [OSTI]

EPA's legal authority to regulate greenhouse gas emissions under the Clean Air Act is reviewed. While EPA clearly does not have the authority to implement the precise terms of the Kyoto Protocol, arguments could be put ...

Bugnion, Véronique.; Reiner, David M.

10

Impacts of the Kyoto protocol on U.S. energy markets and economic activity  

SciTech Connect (OSTI)

The Intergovernmental Panel on Climate Change (IPCC) was established by the World Meteorological Organization and the United Nations Environment Program in 1988 to assess the available scientific, technical, and socioeconomic information in the field of climate change. The most recent report of the IPCC concluded that ``Our ability to quantify the human influence on global climate is currently limited because the expected signal is still emerging from the noise of natural variability, and because there are uncertainties in key factors. These include the magnitudes and patterns of long-term variability and the time-evolving pattern of forcing by, and response to, changes in concentrations of greenhouse gases and aerosols, and land surface changes. Nevertheless the balance of evidence suggests that there is a discernible human influence on global climate. The first and second Conference of the Parties in 1995 and 1996 agreed to address the issue of greenhouse gas emissions for the period beyond 2000, and to negotiate quantified emission limitations and reductions for the third Conference of the Parties. On December 1 through 11, 1997, representatives from more than 160 countries met in Kyoto, Japan, to negotiate binding limits on greenhouse gas emissions for developed nations. The resulting Kyoto Protocol established emissions targets for each of the participating developed countries--the Annex 1 countries--relative to their 1990 emissions levels. 114 refs., 138 figs., 33 tabs.

NONE

1998-10-01T23:59:59.000Z

11

The Effects on Developing Countries of the Kyoto Protocol and CO2 Emissions Trading A. Denny Ellerman, Henry D. Jacoby and Annelne Decaux*  

E-Print Network [OSTI]

The Effects on Developing Countries of the Kyoto Protocol and CO2 Emissions Trading A. Denny by the scope of CO2 emissions trading, by various limitations that Annex I countries might place on emissions.1 Trade in Goods with No Emissions Trading

12

Japanese nuclear power and the Kyoto agreement  

E-Print Network [OSTI]

We find that, on an economic basis, nuclear power could make a substantial contribution for meeting the emissions target Japan agreed to in the Kyoto Protocol. It is unlikely however that the contribution would be as large ...

Babiker, Mustafa H.M.; Reilly, John M.; Ellerman, A. Denny.

13

Kyoto Protocol | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 ThrottledInformation Kumasi Institute of Technology andKurtKyosemi

14

The evolution of a climate regime: Kyoto to Marrakech  

E-Print Network [OSTI]

At meetings in Bonn and Marrakech in 2001, the Conference of the Parties to the Framework Convention on Climate Change broke through an impasse on the detailed provisions needed to allow the Kyoto Protocol to enter into ...

Babiker, Mustafa H.M.; Jacoby, Henry D.; Reilly, John M.; Reiner, David M.

15

A Strategic Assessment of the Kyoto-Marrakech System  

E-Print Network [OSTI]

. Source: 2000 emission data: US Energy Information Administration (EIA). Climate change emerged during of the Kyoto Protocol by the new US administration in 2001, certainly the most controversial. To the surprise

16

Southeast Asia and Kyoto University  

E-Print Network [OSTI]

, Kyoto University opened its ASEAN Center in Bangkok, Thailand (p.11), the latest development in over

Takada, Shoji

17

REMARKS BY PRESIDENTIAL ECONOMIC ADVISER ANDREI ILLARIONOV AT A PRESS CONFERENCE ON RESULTS OF THE CLIMATE CHANGE AND KYOTO  

E-Print Network [OSTI]

OF THE CLIMATE CHANGE AND KYOTO PROTOCOL SEMINAR IN MOSCOW The Federal News Service - Official Kremlin Int'l News, and if there is a rise, it has nothing to do with climate change. If there is an insignificant increase have repeatedly asked our foreign partners who advocate the Kyoto Protocol and who insist that Russia

Fischlin, Andreas

18

Carbon emissions and the Kyoto commitment in the European Union  

E-Print Network [OSTI]

We estimate reference CO? emission projections in the European Union, and quantify the economic impacts of the Kyoto commitment on Member States. We consider the case where each EU member individually meets a CO? emissions ...

Viguier, Laurent L.; Babiker, Mustafa H.M.; Reilly, John M.

19

Kyoto Protocol Act of 1998 (Illinois)  

Broader source: Energy.gov [DOE]

Effective immediately, the Illinois Environmental Protection Agency and the Pollution Control Board shall not propose or adopt any new rule for the intended purpose of addressing the adverse...

20

Kyoto Protocol: Enforcement Prohibitions (West Virginia)  

Broader source: Energy.gov [DOE]

The West Virginia division of environmental protection shall refrain from proposing or promulgating any new rule intended, in whole or in part, to reduce emissions of greenhouse gases from the...

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Environmental Science & Policy 5 (2002) 195206 The evolution of a climate regime: Kyoto to  

E-Print Network [OSTI]

emissions trading. We analyze the costs of implementation and the environmental effectiveness of the Bonn; Kyoto Protocol; Marrakech accords; Emissions trading; Non-CO2 gases 1. Introduction In November 2000

22

Analysis of Post-Kyoto CO2 Emissions Trading Using Marginal Abatement Curves A. Denny Ellerman and Annelne Decaux  

E-Print Network [OSTI]

Analysis of Post-Kyoto CO2 Emissions Trading Using Marginal Abatement Curves A. Denny Ellerman the advantages of emissions trading. In this paper, the authors derive MACs from EPPA, the MIT Joint Program the benefits of emissions trading in achieving the emission reduction targets implied by the Kyoto Protocol

23

Automatic Test Case Generation Using Multi-protocol Test Method Soo-in Lee, Yongbum Park, and Myungchul Kim  

E-Print Network [OSTI]

Automatic Test Case Generation Using Multi-protocol Test Method Soo-in Lee, Yongbum Park, mckim}@icu.ac.kr Abstract - A method for testing multi-protocol implementation under test (IUT) with a single test suite has been proposed in the literature. It tests a multi-protocol IUT in an integrated way

Lee, Ben

24

A Case Study on Reactive Protocols for Aircraft Electric Power Distribution  

E-Print Network [OSTI]

A Case Study on Reactive Protocols for Aircraft Electric Power Distribution Huan Xu1, Ufuk Topcu2 electric power system that meets system requirements and reacts dynamically to changes in internal system to more-electric aircraft architectures possible. Conventional architectures utilize a combination

Xu, Huan

25

KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS  

E-Print Network [OSTI]

Energy Science Asian and African Area Studies Informatics Biostudies Global Environmental Studies. The main campus is located in the historic city of Kyoto, a center of traditional Japanese culture. Since

Takada, Shoji

26

KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS  

E-Print Network [OSTI]

Energy Science - - 137 103 - - 19 27 Asian and African Area Studies - - - 55 - - 29 20 Informatics a long history and enduring traditions. The main campus is located in the historic city of Kyoto

Takada, Shoji

27

KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS  

E-Print Network [OSTI]

Energy Science - - 117 98 - - 16 22 Asian and African Area Studies - - - 21 - - 36 13 Informatics - - 182 city of Kyoto, a center of traditional Japanese culture. Since its founding, the University has been

Takada, Shoji

28

Copyright 2009 IEICE EMC'09/Kyoto  

E-Print Network [OSTI]

809 Copyright © 2009 IEICE EMC'09/Kyoto Modelling of Absorbing Material Containing Magnetic Platelets Marina Y. Koledintseva#1 , James L. Drewniak#2 , Yongxue He*3 , and Bill Matlin*4 # EMC Laboratory

Koledintseva, Marina Y.

29

he Kyoto Protocol is a symbolically important expression of governments'  

E-Print Network [OSTI]

with stratospheric ozone depletion, acid rain from sulphur emissions and nuclear weapons. Drawing on these plausible but mis- guided. Ozone depletion, acid rain and nuclear arms control are difficult problems, but compared suite of artificial gases, for which technical substitutes could be found. Acid rain was mainly caused

Colorado at Boulder, University of

30

Who benefits from the US withdrawal of the Kyoto protocol?  

E-Print Network [OSTI]

gases. This convention, called the United Nations Framework Convention on Climate Change (UNFCCC and that Japan and Russia benefited from the United States withdrawal (in term of a priori decisional power). Key-made) interference with the climate system". The UNFCCC is the governing body for international negotiations

Paris-Sud XI, Université de

31

Special Features: Kyoto University with ASEAN and Beyond  

E-Print Network [OSTI]

Special Features: Kyoto University with ASEAN and Beyond Kyoto University Vol.4 No.2 September 2014 #12;Contents 1 Message from the President Kyoto University with ASEAN and Beyond 2 History Southeast in ASEAN Region 22 Fostering the Next Generation -- The Hakubi Project A Unique Opportunity

Takada, Shoji

32

Simulation of the RPL Routing Protocol for IPv6 Sensor Networks: two cases studies Leila Ben Saad  

E-Print Network [OSTI]

by our own RPL module. We then focus on the performance comparison of simulated sensor networks and real global lifetime. Keywords-Network Simulation, RPL, PLC, IPv6, Mobile Sinks, Energy Optimization, WSN, 802Simulation of the RPL Routing Protocol for IPv6 Sensor Networks: two cases studies Leila Ben Saad

Boyer, Edmond

33

KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers  

E-Print Network [OSTI]

............................................. 16 Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market .................................... 20 Transportation in Kyoto City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University Kyoto International Community House

Takada, Shoji

34

KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers  

E-Print Network [OSTI]

Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market Interpretation .................................... 20 Transportation in Kyoto City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University "kokoka" Kyoto International

Takada, Shoji

35

News Letter Institute of Advanced Energy, Kyoto University  

E-Print Network [OSTI]

. Abstract definition of energy consists of two parts: Energy = Exergy +Anergy Exergy is a part of energyNews Letter Institute of Advanced Energy, Kyoto University ISSN 1342-3193 IAE-NL-2014 No.54 http -- 2,709 2013 2013 Institute of Advanced Energy, Kyoto University #12; 25 25 11 20

Takada, Shoji

36

Greetings from Kyoto-U SPRING 2010 C O N T E N T S  

E-Print Network [OSTI]

signed with the ASEAN University Network (AUN) Foreign language Publication of "MANGA Kyoto University" 8

Takada, Shoji

37

KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers  

E-Print Network [OSTI]

............................................. 16 Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market Other City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University Kyoto International Community House

Takada, Shoji

38

(mercury.yukawa.kyoto-u.ac.jp)ssh Permission denied (publickey).  

E-Print Network [OSTI]

SSH Q&A (mercury.yukawa.kyoto-u.ac.jp)ssh Permission denied (publickey). (1) ID ID ID (2) ssh -i () ssh -i $HOME/.ssh/id_yitp_rsa (UID)@mercury.yukawa.kyoto-u.ac.jp (3) (1)(2) Permission denied support@yukawa.kyoto-u.ac.jp (mercury

Shimizu, Akira

39

News Letter Institute of Advanced Energy, Kyoto University  

E-Print Network [OSTI]

Materials Science Workshop" Institute of Advanced Energy, Kyoto University #12; 25 1 22 ASEAN 5 ASEANNational University of SingaporeChulalongkorn UniversityASEAN University Network AUN Nantana Gajaseni Institut Teknologi Bandung Akhmaloka Gajaseni "Student Mobility and ASEAN Credit Transfer System" Agreement

Takada, Shoji

40

Kyoto University has launched a Japan-Thailand collaborative research  

E-Print Network [OSTI]

Kyoto University has launched a Japan-Thailand collaborative research project titled "Development of clean and efficient utilization of low rank coals and biomass by solvent treatment," supported biomass waste as well as low-rank coals into valuable products such as carbon fiber, biofuel, and high

Takada, Shoji

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Non-Kyoto Radiative Forcing in Long-Run Greenhouse Gas Emissions and Climate Change Scenarios  

SciTech Connect (OSTI)

Climate policies designed to achieve climate change objectives must consider radiative forcing from the Kyoto greenhouse gas, as well as other forcing constituents, such as aerosols and tropospheric ozone. Net positive forcing leads to global average temperature increases. Modeling of non-Kyoto forcing is a relatively new component of climate management scenarios. Five of the nineteen models in the EMF-27 Study model both Kyoto and non-Kyoto forcing. This paper describes and assesses current non-Kyoto radiative forcing modeling within these integrated assessment models. The study finds negative forcing from aerosols masking significant positive forcing in reference non-climate policy projections. There are however large differences across models in projected non-Kyoto emissions and forcing, with differences stemming from differences in relationships between Kyoto and non-Kyoto emissions and fundamental differences in modeling structure and assumptions. Air pollution and non-Kyoto forcing decline in the climate policy scenarios. However, non-Kyoto forcing appears to be influencing mitigation results, including allowable carbon dioxide emissions, and further evaluation is merited. Overall, there is substantial uncertainty related to non-Kyoto forcing that must be considered.

Rose, Steven K.; Richels, Richard G.; Smith, Steven J.; Riahi, Keywan; Stefler, Jessica; Van Vuuren, Detlef

2014-04-27T23:59:59.000Z

42

Toward a Post-Kyoto Climate Change Architecture: A Political Analysis  

E-Print Network [OSTI]

FOR INTERNATIONAL GHG EMISSIONS TRADING (2000), http://al. , International Emissions Trading Rules as a Compliancethe Economic Benefits of Emissions Trading Under the Kyoto

Raustiala, Kal; Keohane, Robert O.

2009-01-01T23:59:59.000Z

43

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network [OSTI]

Progress on Post-2012 Emissions Trading Scheme, 39 ENV'T R!European Union's emissions trading scheme, which providesTHE EUROPEAN UNION'S EMISSIONS TRADING SCHEME AND TilE KYoT-

Ferrey, Steven

2010-01-01T23:59:59.000Z

44

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network [OSTI]

installing 1,000 MW of coal power generation each week andof electricity generation is fueled by coal. Id. 121. Id.with coal-fired electric power generation 8 accounting for

Ferrey, Steven

2010-01-01T23:59:59.000Z

45

Energy Policy 31 (2003) 459481 The costs of the Kyoto Protocol in the European Union  

E-Print Network [OSTI]

``flexible mechanisms'' (emission trading, clean development mechanism, and Joint Implementation) in order emissions trading within the European Union'' that proposes to introduce in 2005 an EU trading system be implemented at national level: e.g., emissions trading systems are in the process of being established

46

A Proposal for the Design of the Successor to the Kyoto Protocol  

E-Print Network [OSTI]

in managing climate change does require developing countryclimate change agreement, and that developing countries willby developing countries (through CDM). Third, climate change

Karp, Larry; Zhao, Jinhua

2008-01-01T23:59:59.000Z

47

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network [OSTI]

1, 34. 214. Three of the 10 RGGI states, regulating carbonof dollars each from the RGGI revenue raised from auc-allowances. See States Raid RGGI Funds to Fill Budget Gap,

Ferrey, Steven

2010-01-01T23:59:59.000Z

48

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network [OSTI]

Global Boom in Coal Power-and Emissions, CHISm- "IAN ScI.those emissions-particularly with coal-fired electric power

Ferrey, Steven

2010-01-01T23:59:59.000Z

49

Defeating Kyoto: the conservative movement’s impact on U.S. climate change policy  

E-Print Network [OSTI]

In this article, we argue that a major reason the United States failed to ratify the Kyoto Protocol to ameliorate global warming is the opposition of the American conservative movement, a key segment of the antienvironmental countermovement. We examine how the conservative movement mobilized between 1990 and 1997 to construct the “non-problematicity ” of global warming. After we describe how conservative think tanks mobilized to challenge the global warming claims of mainstream climate science, we examine how these countermovement organizations aligned themselves with prominent American climate change skeptics known for their staunch criticism of mainstream climate research and their af?liations with the fossil fuels industry. We then examine how the efforts of these conservative think tanks were enhanced by the shift in the political opportunity structure created by the 1994 Republican takeover of Congress. This study demonstrates how a powerful countermovement effectively challenged the environmental community’s de?nition of global warming as a social problem and blocked the passage of any signi?cant climate change policy. Since the early 1980s a robust international consensus about the reality and seriousness of climate change has emerged, as evidenced by several comprehensive reports from the

Aaron M. Mccright

2003-01-01T23:59:59.000Z

50

Mensuration protocol National Forest Inventory  

E-Print Network [OSTI]

NFI: Mensuration protocol for the National Forest Inventory June 2010 E. D. Mackie, R. W. Matthews and A. Brewer1 FR Biometrics Division 1 IFOS, Forestry Commission #12;National Forest Inventory (NFI or square boundary. In the case of a section 2 #12;National Forest Inventory (NFI): Mensuration Protocol

51

Greetings from Kyoto-U SPRING 2009 C O N T E N T S  

E-Print Network [OSTI]

high energy physics paper of all time as of 2006. The university's GCOE program (see Special Feature of administration: while it belongs to Kyoto University, its administration policies are decided by a steering

Takada, Shoji

52

Extremal quantum protocols  

E-Print Network [OSTI]

Generalized quantum instruments correspond to measurements where the input and output are either states or more generally quantum circuits. These measurements describe any quantum protocol including games, communications, and algorithms. The set of generalized quantum instruments with a given input and output structure is a convex set. Here we investigate the extremal points of this set for the case of finite dimensional quantum systems and generalized instruments with finitely many outcomes. We derive algebraic necessary and sufficient conditions for extremality.

Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

2011-01-25T23:59:59.000Z

53

Analysis of the Impact of Hello Protocol Parameters over a Wireless Network Self-Organization  

E-Print Network [OSTI]

Analysis of the Impact of Hello Protocol Parameters over a Wireless Network Self of the HELLO protocol. This makes this HELLO protocol very important for wireless networks especially for self- organizing the network. Most of layer-3 protocols assume an ideal MAC layer. In such a case, HELLO protocol

Paris-Sud XI, Université de

54

It's too late to seal a global climate deal. But we need action, not Kyoto II  

E-Print Network [OSTI]

to economic development, with development based on cleaner, sustainable technologies for power, transport, buildings and industry. The rich world will benefit as the poor world goes green, and will have to pay much wait It's too late to seal a global climate deal. But we need action, not Kyoto II |... http://www.guardian.co.uk/commentisfree/cif-green

55

On June 21, 2013, Kyoto University and Daikin Industries, Ltd. concluded a collaboration agreement  

E-Print Network [OSTI]

, and the pursuit of innovation. Under the agreement, the Daikin-Kyoto University Innovation Program (DK Program the following goals in three years. 1. Create new themes focusing on social values (drawing on the knowledge's partner universities) 3. Develop technology management methods (to continuously foster innovation

Takada, Shoji

56

Global Network Kyoto University has opened a new center in Bangkok, Thailand, dedicated to supporting research,  

E-Print Network [OSTI]

to supporting research, education, and international collaborations across the ASEAN region. To mark the launch of these activities, an official opening ceremony and a symposium titled "Kyoto University in ASEAN -- Past, Present, government, and industry from ASEAN member states and Japan convened at the opening ceremony

Takada, Shoji

57

China's waste could be treasure for Kyoto scheme 01 Mar 2006 12:36:11 GMT  

E-Print Network [OSTI]

China's waste could be treasure for Kyoto scheme 01 Mar 2006 12:36:11 GMT Source: Reuters By Stuart Penson COPENHAGEN, March 1 (Reuters) - Hundreds of rubbish landfill sites across China have vast, said Lu Guoqiang, an official at China's state Environmental Protection Administration. "China has 700

Columbia University

58

University Research Administrator (URA) position availability Yoshida-South campus, Kyoto University  

E-Print Network [OSTI]

1 / 3 University Research Administrator (URA) position availability Yoshida-South campus, Kyoto University 24 10 1 1 October 2012 Job title University Research Administrator (URA) Number 1 One network. Please note that the candidate is expected to mainly use English in the workplace, carrying out

Takada, Shoji

59

Kyoto University Library Reference Guide What is an E-Journal?  

E-Print Network [OSTI]

read the newest article as soon as it is made available. You can read them at a laboratory or a Media Center PC even without going to the library. There are many links to related articles, cited articles, especially international academic journals held at Kyoto University. We hold with a lot of e-journals about

Takada, Shoji

60

Protocol for House Parties  

Broader source: Energy.gov [DOE]

Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

L'INITIATIVE EUROPEENNE "SUIVI GLOBAL POUR L'ENVIRONNEMENT ET LA SECURITE" (GMES) ET LE PROTOCOLE DE KYOTO1  

E-Print Network [OSTI]

, Belgique H. LE TREUT, UPMC, France A. MOREL, LPCM, France E. RASCHKE, GKSS Forschungszentrum Geesthacht

62

Role of Bioenergy in the Kyoto Protocol, in the EU-ETS and in future Climate Agreements  

E-Print Network [OSTI]

in existing plants (co-firing) is already competitive with other fuels at a CO2 price of about 20 Euros Union implemented the European Emission Trading Scheme (EU-ETS) Some 12,000 large industrial plants, such as switching to a low emission fuel mix and investments in new climate friendly technologies are encouraged

63

THE RIMINI PROTOCOL Oil Depletion Protocol  

E-Print Network [OSTI]

Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict During the Second Half of the Age of Oil As proposed at the 2003 Pio Manzu Conference

Keeling, Stephen L.

64

Webinar: Hydrogen Refueling Protocols  

Broader source: Energy.gov [DOE]

Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

65

Application Protocol Reference Architecture Application Protocol Reference Architecture  

E-Print Network [OSTI]

Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

van Sinderen, Marten

66

Kyoto & Kyoto University Kyoto: A Heartland  

E-Print Network [OSTI]

. It was also where the first hydroelectric power plant and tram system were developed, and the location

Takada, Shoji

67

APS Protocol for  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material...

68

Kyoto Workshop  

Broader source: Energy.gov (indexed) [DOE]

of Arkansas 15 15 UA Proposed Solution Multiport converter topology uses common transformer, reducing part count for total system. High frequency transformer link results...

69

Protocol design contests  

E-Print Network [OSTI]

In fields like data mining and natural language processing, design contests have been successfully used to advance the state of the art. Such contests offer an opportunity to bring the excitement and challenges of protocol ...

Winstein, Keith

70

The Kyoto University Research Administration office (KURA) was established to perform a function that is still not widely known  

E-Print Network [OSTI]

-Program for World-Leading Innovative R&D on Science and Technology" called "FIRST Program" is one of them. The total that is still not widely known in Japan. After the establishment of KURA, Kyoto University has been engaged and Technology (MEXT) to further reinforce such initiatives. To achieve top-level research activities and high

Takada, Shoji

71

Proceedings of the 15th International Heat Transfer Conference, IHTC-15 August 10-15, 2014, Kyoto, Japan  

E-Print Network [OSTI]

pressure drop and reduced heat transfer to the reaction zone. KEY WORDS: Solar energy, Carbon emission combustion as the process heat for calcination. Shimizu et al. performed a thermodynamic analysis on a pairProceedings of the 15th International Heat Transfer Conference, IHTC-15 August 10-15, 2014, Kyoto

72

POST-KYOTO POLICY IMPLICATIONS ON THE ENERGY SYSTEM: A TIAM-FR LONG-TERM PLANNING EXERCISE  

E-Print Network [OSTI]

marginal costs, the primary energy consumption and the energy mix. This paper compares global efforts of CO. Keywords CO2 mitigation targets, global energy system, long-term modelling Acknowledgement This researchPOST-KYOTO POLICY IMPLICATIONS ON THE ENERGY SYSTEM: A TIAM-FR LONG-TERM PLANNING EXERCISE Sandrine

Paris-Sud XI, Université de

73

International Energy Conference, 19 -21 May 2003 Energy Technologies for post-Kyoto targets in the medium term  

E-Print Network [OSTI]

Aquifers and Hydrocarbon Structures Power & Heat Air Air O2 N2 & O2 CO2 CO2 CO2 Compression & DehydrationInternational Energy Conference, 19 - 21 May 2003 Energy Technologies for post-Kyoto targets in the medium term CO2 Capture & Geological Storage Niels Peter Christensen International Ventures Director

74

White Paper: A Survey of 3D Sync IR Protocols  

E-Print Network [OSTI]

)..............................................................................................12 Sony Protocol (Standalone emitter

75

MAPS MANUAL 2010 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2010 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

76

MAPS MANUAL 2014 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2014 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

77

MAPS MANUAL 2008 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2008 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Jim Saracco

DeSante, David F.

78

MAPS MANUAL 2013 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2013 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

79

MAPS MANUAL 2011 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2011 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

80

MAPS MANUAL 2012 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2012 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Communication complexity protocols for qutrits  

SciTech Connect (OSTI)

Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

Tamir, Boaz [Department of History and Philosophy of Science, Bar-Ilan University, Ramat-Gan (Israel)

2007-03-15T23:59:59.000Z

82

Estimating the greenhouse gas benefits of forestry projects: A Costa Rican Case Study  

SciTech Connect (OSTI)

If the Clean Development Mechanism proposed under the Kyoto Protocol is to serve as an effective means for combating global climate change, it will depend upon reliable estimates of greenhouse gas benefits. This paper sketches the theoretical basis for estimating the greenhouse gas benefits of forestry projects and suggests lessons learned based on a case study of Costa Rica's Protected Areas Project, which is a 500,000 hectare effort to reduce deforestation and enhance reforestation. The Protected Areas Project in many senses advances the state of the art for Clean Development Mechanism-type forestry projects, as does the third-party verification work of SGS International Certification Services on the project. Nonetheless, sensitivity analysis shows that carbon benefit estimates for the project vary widely based on the imputed deforestation rate in the baseline scenario, e.g. the deforestation rate expected if the project were not implemented. This, along with a newly available national dataset that confirms other research showing a slower rate of deforestation in Costa Rica, suggests that the use of the 1979--1992 forest cover data originally as the basis for estimating carbon savings should be reconsidered. When the newly available data is substituted, carbon savings amount to 8.9 Mt (million tones) of carbon, down from the original estimate of 15.7 Mt. The primary general conclusion is that project developers should give more attention to the forecasting land use and land cover change scenarios underlying estimates of greenhouse gas benefits.

Busch, Christopher; Sathaye, Jayant; Sanchez Azofeifa, G. Arturo

2000-09-01T23:59:59.000Z

83

Enhancing the expressivity and automation of an interactive theorem prover in order to verify multicast protocols   

E-Print Network [OSTI]

This thesis was motivated by a case study involving the formalisation of arguments that simplify the verification of tree-oriented multicast protocols. As well as covering the case study itself, it discusses our solution ...

Ridge, Thomas

84

E-Print Network 3.0 - additional protocol ratification Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Stuttgart Poul Erik Morthorst, Ris National Laboratory Summary: .1.2 Scenario: Russia ratifies the Protocol While the case of ratification only by the EU shows result in a...

85

Office Protocols | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in3.pdfEnergyDepartment of Energy(National1 -OSSGasofOffice Protocols Office Protocols

86

Shear Transformation Zones: State Determined or Protocol Dependent?  

E-Print Network [OSTI]

The concept of a Shear Transformation Zone (STZ) refers to a region in an amorphous solid that undergoes a plastic event when the material is put under an external mechanical load. An important question that had accompanied the development of the theory of plasticity in amorphous solids for many years now is whether an STZ is a {\\em region} existing in the material (which can be predicted by analyzing the unloaded material), or is it an {\\em event} that depends on the loading protocol (i.e., the event cannot be predicted without following the protocol itself). In this Letter we present strong evidence that the latter is the case. Infinitesimal changes of protocol result in macroscopically big jumps in the positions of plastic events, meaning that these can never be predicted from considering the unloaded material.

Oleg Gendelman; Prabhat K. Jaiswal; Itamar Procaccia; Bhaskar Sen Gupta; Jacques Zylberg

2014-08-18T23:59:59.000Z

87

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

88

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Broader source: Energy.gov (indexed) [DOE]

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells This document describes test protocols...

89

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Broader source: Energy.gov (indexed) [DOE]

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Accelerated Stress Test Protocols for PEM...

90

Computer Networking : Principles, Protocols and Practice  

E-Print Network [OSTI]

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure December 24 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 3.8 The Transmission Control Protocol

Bonaventure, Olivier

91

Computer Networking : Principles, Protocols and Practice  

E-Print Network [OSTI]

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure September 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 3.8 The Transmission Control Protocol

Bonaventure, Olivier

92

Experimental study on the thorium-loaded accelerator-driven system at the Kyoto Univ. critical assembly  

SciTech Connect (OSTI)

The experimental study on the thorium-loaded accelerator-driven system (ADS) is conducted in the Kyoto Univ. Critical Assembly (KUCA). The experiments are carried out in both the critical and subcritical states for attaining the reaction rates of the thorium capture and fission reactions. In the critical system, the thorium plate irradiation experiment is carried out for the thorium capture and fission reactions. From the results of the measurements, the thorium fission reactions are obtained apparently in the critical system, and the C/E values of reaction rates show the accuracy of relative difference of about 30%. In the ADS experiments with 14 MeV neutrons and 100 MeV protons, the subcritical experiments are carried out in the thorium-loaded cores to obtain the capture reaction rates through the measurements of {sup 115}In(n, {gamma}){sup 116m}In reactions. The results of the experiments reveal the difference between the reaction rate distributions for the change in not only the neutron spectrum but also the external neutron source. The comparison between the measured and calculated reaction rate distributions demonstrates a discrepancy of the accuracy of reaction rate analyses of thorium capture reactions through the thorium-loaded ADS experiments with 14 MeV neutrons. Hereafter, kinetic experiments are planned to be carried out to deduce the delayed neutron decay constants and subcriticality using the pulsed neutron method. (authors)

Pyeon, C. H.; Yagi, T.; Lim, J. Y.; Misawa, T. [Nuclear Science Engineering Div., Research Reactor Inst., Kyoto Univ., Asashiro-nishi, Kumatori-cho, Sennan-gun, Osaka 590-0494 (Japan)

2012-07-01T23:59:59.000Z

93

Automated Eye-Movement Protocol Analysis  

E-Print Network [OSTI]

Automated Eye-Movement Protocol Analysis Dario D. Salvucci and John R. Anderson Carnegie Mellon analysis of eye-movement protocols. Although eye movements have be- come increasingly popular as a tool an ap- proach to automating eye-movement protocol analysis by means of tracing--re- lating observed eye

Salvucci, Dario D.

94

TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM  

E-Print Network [OSTI]

RFC: 793 TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 Admiralty Way Marina del Rey, California 90291 #12;#12;September 1981 Transmission Control Protocol TABLE ........................................... 12 2.9 Precedence and Security ...................................... 13 2.10 Robustness Principle

McBrien, Peter

95

Chapter 14: Chiller Evaluation Protocol  

SciTech Connect (OSTI)

This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

Tiessen, A.

2014-09-01T23:59:59.000Z

96

Multiple protocol fluorometer and method  

DOE Patents [OSTI]

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

97

Effective Protocols for Mobile Communications and Networking  

SciTech Connect (OSTI)

This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

Espinoza, J.; Sholander, P.; Van Leeuwen, B,

1998-12-01T23:59:59.000Z

98

INEEL AIR MODELING PROTOCOL ext  

SciTech Connect (OSTI)

Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

C. S. Staley; M. L. Abbott; P. D. Ritter

2004-12-01T23:59:59.000Z

99

Transportation Protocols Working Group First Conference Call...  

Broader source: Energy.gov (indexed) [DOE]

Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

100

SSF Experimental Protocols -- Lignocellulosic Biomass Hydrolysis...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SSF Experimental Protocols - Lignocellulosic Biomass Hydrolysis and Fermentation Laboratory Analytical Procedure (LAP) Issue Date: 10302001 N. Dowe and J. McMillan Technical...

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Superior Energy Performance Measurement and Verification Protocol...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

and Verification Protocol for Industry (November 2012) More Documents & Publications Energy Intensity Baselining and Tracking Guidance EnPI V4.0 Tool Algorithm Superior Energy...

102

Estimating Pedestrian Accident Exposure: Protocol Report  

E-Print Network [OSTI]

A Method of Measuring Exposure to Pedestrian Accident Risk.Accident Analysis and Prevention, Vol. 14, 1982, pp 397-405.Estimating Pedestrian Accident Exposure: Protocol Report,

Greene-Roesel, Ryan; Diogenes, Mara Chagas; Ragland, David R

2007-01-01T23:59:59.000Z

103

RPL Routing Protocol a Case Study: Precision Agriculture  

E-Print Network [OSTI]

.g., industrial, urban, home and buildings automation or smart grid [3]. ROLL's charter ensures that the designed. In the IETF draft [4], the performance of RPL is evaluated through several consideration of routing metrics

Paris-Sud XI, Université de

104

Kyoto University International Center  

E-Print Network [OSTI]

and Astronautics, Nuclear Engineering, (6-year program) Faculty of Engineering Bachelor of Engineering Global Engineering, Architecture, Engineering Science, Electrical and Electronic Engineering, Informatics and Mathematical Science, Industrial

Takada, Shoji

105

Protocol Number: (IBC office use only)  

E-Print Network [OSTI]

Protocol Number: (IBC office use only) 1 UNF Registration of Biosafety Level 2 (BSL-2) A-2 Form", describe the methods of inactivation. #12;Protocol Number: (IBC office use only) 2 10. Describe the mechanism for decontaminating lab waste prior to disposal. Yes No If "Yes", describe the methods

Asaithambi, Asai

106

Safe Operating Procedure SAFETY PROTOCOL: Rb-86  

E-Print Network [OSTI]

of hazardous and/or radioactive wastes are to be followed. Rb- 86 waste should be segregated from all otherSafe Operating Procedure (2/10) SAFETY PROTOCOL: Rb-86 this safety protocol or submit an alternative and equivalent procedure that you develop to meet your unique

Farritor, Shane

107

Advantages of a Leveled Commitment Contracting Protocol  

E-Print Network [OSTI]

Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R. Lesser 7, 1995 #12; Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R, contracts have traditionally been binding. Such contracts do not al­ low agents to efficiently accommodate

Massachusetts at Amherst, University of

108

The Bitcoin Backbone Protocol: Analysis and Applications  

E-Print Network [OSTI]

The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay.leonardos@gmail.com November 16, 2014 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone

109

Adaptive best effort protocols for video delivery  

E-Print Network [OSTI]

This thesis describes the design and implementation of ics. transport level protocols running on top of the IP layer to transmit video data over packet switched networks. These protocols address the issues of meeting real-time deadlines of the video...

Madhwaraj, Ashwin Raj

1998-01-01T23:59:59.000Z

110

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

111

Cryptanalysis of the arbitrated quantum signature protocols  

SciTech Connect (OSTI)

As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

2011-08-15T23:59:59.000Z

112

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...  

Broader source: Energy.gov (indexed) [DOE]

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Webinar slides from the U.S. Department of Energy...

113

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...  

Open Energy Info (EERE)

Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol...

114

Protective Force Protocols for ESS Supported Performance Tests...  

Broader source: Energy.gov (indexed) [DOE]

Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12,...

115

access control protocols: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

116

access control protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

117

Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Poster...

118

Protocol for Addressing Induced Seismicity Associated with Enhanced...  

Office of Environmental Management (EM)

Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

119

NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys  

E-Print Network [OSTI]

NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys: Surf Clams and Ocean Quahogs December 19..................................................................................................................................... 1 NOAA Fisheries Hydro-dynamic Clam Dredge Survey Protocols

120

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007...

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

On the Security of Public Key Protocols  

E-Print Network [OSTI]

Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

Danny Dolev; et al.

1983-01-01T23:59:59.000Z

122

A Metaobject Protocol for C++ Shigeru Chiba  

E-Print Network [OSTI]

A Metaobject Protocol for C++ Shigeru Chiba Xerox PARC & University of Tokyo chiba@parc of the paper, we rst discuss what we want our 1 We use the term library to mean a collection of reusable code

Chiba, Shigeru

123

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

124

NREL Test-to-Failure Protocol (Presentation)  

SciTech Connect (OSTI)

The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

Hacke, P.

2012-03-01T23:59:59.000Z

125

PEP Classroom Observation Protocol Project # _______ District __________________________ School ________________________________________  

E-Print Network [OSTI]

PEP Classroom Observation Protocol Project # _______ District __________________________ School (mark all that apply) Demonstrate or confirm known concepts/procedures Demonstrate or confirm known concepts/procedures Explore ideas, test conjectures, look for patterns Explore ideas, test conjectures

Lee, Carl

126

IT Licentiate theses Ad Hoc Routing Protocol  

E-Print Network [OSTI]

IT Licentiate theses 2005-004 Ad Hoc Routing Protocol Validation OSKAR WIBLING UPPSALA UNIVERSITY SWEDEN Dissertation for the degree of Licentiate of Technology in Computer Science at Uppsala University

Flener, Pierre

127

Internet Security Protocols Prof. Ravi Sandhu  

E-Print Network [OSTI]

INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2001 SECURE SOCKETS LAYER (SSL) v layered on top of TCP v SSL versions 1.0, 2.0, 3.0, 3.1 v Netscape protocol v later refitted as IETF standard TLS (Transport Layer Security) v TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

Sandhu, Ravi

128

Internet Security Protocols Prof. Ravi Sandhu  

E-Print Network [OSTI]

INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 3© Ravi Sandhu 2000

Sandhu, Ravi

129

Internet Security Protocols Prof. Ravi Sandhu  

E-Print Network [OSTI]

INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

Sandhu, Ravi

130

Field Monitoring Protocol: Heat Pump Water Heaters  

SciTech Connect (OSTI)

This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

2013-02-01T23:59:59.000Z

131

A Case Study of a Commissioning Process for Demand Side Energy Conservation of the Large Heat Source Plant in Kyoto Station Building-APCBC  

E-Print Network [OSTI]

5 Heat source plant ?Total capacity?26.3MW? Substation ? ? ? Total : 6 Substations Bleed-in Control Substation ? ? ? The chilled water delivery system Large heat source plant similar to a DHC plant ? Total refrigerator capacity 26.3 MW ? Chilled... water is supplied 6 substations - Department store - Hotel - Theater - Train station etc. ? Bleed-in Control ? Commonly equipped in the substations of DHC plants. ? This control maintains the return water temperature to the plant by controlling...

Matsushita, N.; Yoshida,H.

2014-01-01T23:59:59.000Z

132

An Energy-Efficient Broadcasting Scheme for Unsynchronized Wireless Sensor MAC Protocols  

E-Print Network [OSTI]

An Energy-Efficient Broadcasting Scheme for Unsynchronized Wireless Sensor MAC Protocols Philipp, Switzerland Abstract--In the past couple of years, many Energy-Efficient Medium Access Control (E2 -MAC of energy-efficiency in case of unicast point-to-point transmissions, they yet lack an efficient solution

Braun, Torsten

133

EnergyEfficient Initialization Protocols for Adhoc Radio Networks ?  

E-Print Network [OSTI]

Energy­Efficient Initialization Protocols for Ad­hoc Radio Networks ? J. L. Bordim 1 , J. Cui 1 , T contribution of this work is to propose energy­ efficient randomized initialization protocols for ad­hoc radio this protocol to de­ sign an energy­efficient initialization protocol that terminates, with high probability

Nakano, Koji

134

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan Vaidyanathan-point of proposing a new transport protocol called ATP #12;Outline Problems with TCP ATP design elements ATP Protocol to the characteristics of the reverse path in wireline networks #12;ATP: Ad-hoc Transport Protocol TCP's components

Sivakumar, Raghupathy

135

Orthogonal-state-based protocols of quantum key agreement  

E-Print Network [OSTI]

Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

Chitra Shukla; Nasir Alam; Anirban Pathak

2013-10-05T23:59:59.000Z

136

Hybrid protocol of remote implementations of quantum operations  

E-Print Network [OSTI]

We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum state teleportation's (BQST) and Wang's one. The protocol is available for remote implemetations of quantum operations in the restricted sets specified in Sec. III. We also give the proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to BQST and Wang protocols.

Ning Bo Zhao; An Min Wang

2007-08-04T23:59:59.000Z

137

A calculus for cryptographic protocols: The spi calculus  

E-Print Network [OSTI]

We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as processes in the spi calculus and state their security properties in terms of coarsegrained notions of protocol equivalence.

Martin Abadi; Andrew D. Gordon

1999-01-01T23:59:59.000Z

138

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS  

E-Print Network [OSTI]

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS #12 ASSESSMENT IN THE NETHERLANDS Published VSNU, KNAW and NWO 2009 This document is available through internet: Royal Netherlands Academy of Arts and Sciences (KNAW) The Academy's mission: As the forum, conscience

Franssen, Michael

140

Chapter 22: Compressed Air Evaluation Protocol  

SciTech Connect (OSTI)

Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

Benton, N.

2014-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Chapter 15: Commercial New Construction Protocol  

SciTech Connect (OSTI)

This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

Keates, S.

2014-09-01T23:59:59.000Z

142

Optimal measurement-based feedback control for a single qubit: a candidate protocol  

E-Print Network [OSTI]

Feedback control of quantum systems via continuous measurement involves complex nonlinear dynamics. Except in very special cases, even for a single qubit optimal feedback protocols are unknown. Not even do intuitive candidates exist for choosing the measurement basis, which is the primary non-trivial ingredient in the feedback control of a qubit. Here we present a series of arguments that suggest a particular form for the optimal protocol for a broad class of noise sources in the regime of good control. This regime is defined as that in which the control is strong enough to keep the system close to the desired state. With the assumption of this form the remaining parameters can be determined via a numerical search. The result is a non-trivial feedback protocol valid for all feedback strengths in the regime of good control. We conjecture that this protocol is optimal to leading order in the small parameters that define this regime. The protocol can be described relatively simply, and as a notable feature contains a discontinuity as a function of the feedback strength.

Ashkan Balouchi; Kurt Jacobs

2014-07-30T23:59:59.000Z

143

Measuring Transport Protocol Potential for Energy Efficiency  

E-Print Network [OSTI]

Measuring Transport Protocol Potential for Energy Efficiency S. Kontogiannis, L. Mamatas, I. Psaras, Greece {skontog, emamatas, ipsaras, vtsaousi}@ee.duth.gr Abstract. We investigate the energy-saving potential of transport pro- tocols. We focus on the system-related aspect of energy. Do we have to damage

Tsaoussidis, Vassilis

144

Optimal Decentralized Protocols for Electric Vehicle Charging  

E-Print Network [OSTI]

1 Optimal Decentralized Protocols for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low Abstract--We propose decentralized algorithms for optimally scheduling electric vehicle (EV) charging. The algorithms exploit the elasticity and controllability of electric vehicle loads in order to fill the valleys

Low, Steven H.

145

Utility, informativity and protocols Robert van Rooy  

E-Print Network [OSTI]

Utility, informativity and protocols Robert van Rooy ILLC/University of Amsterdam R particular natural assumptions the utility of questions and answers reduces to their informativity, and that the ordering relation induced by utility sometimes even reduces to the logical relation of entailment

van Rooij, Robert

146

Transport Control Protocol (TCP) In Heterogeneous Networks  

E-Print Network [OSTI]

Sprint Transport Control Protocol (TCP) In Heterogeneous Networks Objectives · Principles of TCP functional modules: slow start, congestion avoidance, fast transmission and fast recovery. ­ Maintain · Packet dropping is the only indication signal for network congestion (Maybe?) · Different transmission

Shihada, Basem

147

Web Applications and Security Web protocol overview  

E-Print Network [OSTI]

Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

Massachusetts at Amherst, University of

148

Northern Kentucky University Communicable Disease Protocol  

E-Print Network [OSTI]

Northern Kentucky University Communicable Disease Protocol Approved 12/6/2011 1.0 Scope To develop procedures and policies for Northern Kentucky University students who reside on or off- campus who have been those required as outlined in 902 KAR 2:020 to be reported to the Northern Kentucky Health Department

Boyce, Richard L.

149

Security proofs of cryptographic protocols Eva Jencusova  

E-Print Network [OSTI]

with FinePrint pdfFactory trial version http://www.fineprint.com #12;2 2 Database and logic abduction method is independent on used crypto-system in analyzing protocol. Our model DLA (=database and logic abduction that there exists knowledge to lead to an attack we use the logic abduction (top-down reasoning) to describe

150

Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols  

E-Print Network [OSTI]

In quantum cryptosystems, variations in detector efficiency can be exploited to stage a successful attack. This happens when the efficiencies of Bob's two detectors are different functions of a control parameter accessible to Eve (e.g., timing of the incoming pulses). It has previously been shown that the Bennett-Brassard 1984 (BB84) protocol is vulnerable to this attack. In this paper, we show that several other protocols and encodings may also be vulnerable. We consider a faked states attack in the case of a partial efficiency mismatch on the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol, and derive the quantum bit error rate as a function of detector efficiencies. Additionally, it is shown how faked states can in principle be constructed for quantum cryptosystems that use a phase-time encoding, the differential phase shift keying (DPSK) and the Ekert protocols.

Vadim Makarov; Johannes Skaar

2007-11-23T23:59:59.000Z

151

A New Protocol for Evaluating Concrete Curing Effectiveness  

E-Print Network [OSTI]

and qualify the curing compound, a new evaluation protocol is introduced in this study. The new protocol consists of using measured relative humidity and temperature to calculate an effectiveness index (EI) which serves as an indicator of the effectiveness...

Sun, Peizhi

2013-07-22T23:59:59.000Z

152

Coherent feedback that beats all measurement-based feedback protocols  

E-Print Network [OSTI]

We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, ...

Jacobs, Kurt

153

Protocols for the Equitable Assessment of Marine Energy Converters   

E-Print Network [OSTI]

This book contains the suite of protocols for the equitable evaluation of marine energy converters (based on either tidal or wave energy) produced by the EquiMar consortium led by the University of Edinburgh. These protocols ...

Ingram, David; Smith, George; Bittencourt-Ferreira, Claudio; Smith, Helen

154

Coherent feedback that beats all measurement-based feedback protocols  

E-Print Network [OSTI]

We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, where the latter are defined in a strict sense. The superiority of the coherent protocol is due to the fact that it can exploit a geodesic path in Hilbert space, a path that measurement-based protocols cannot follow.

Kurt Jacobs; Xiaoting Wang; Howard M. Wiseman

2014-07-21T23:59:59.000Z

155

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan, Vaidyanathan protocol for ad-hoc net- works called ATP (ad-hoc transport protocol). We show through ns2 based simulations that ATP outperforms both default TCP and TCP-ELFN. Categories and Subject Descriptors C.2

Sivakumar, Raghupathy

156

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

157

Utilisation des Protocoles HARQ pour la Radio Cognitive  

E-Print Network [OSTI]

Utilisation des Protocoles HARQ pour la Radio Cognitive Romain Tajan encadré/01/2012 #12;Plan 1 Introduction 2 La Radio Cognitive Techniques de la Radio Cognitive Méthodes d'accès 3 performances du protocole IR-HARQ 4 Utilisation des protocoles HARQ pour la Radio Cognitive Utilisation de l

Dobigeon, Nicolas

158

Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens,  

E-Print Network [OSTI]

to infinity. We call such protocols asymp- totic and the fraction of distilled Bell states per initial copy#12;#12;Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens, Jeroen: July 13, 2006) We present a new asymptotic bipartite entanglement distillation protocol

159

A Multi-Sender Asynchronous Extension to the AER Protocol  

E-Print Network [OSTI]

A Multi-Sender Asynchronous Extension to the AER Protocol John Lazzaro and John Wawrzynek Computer-event representation (AER) is an asynchronous point-to-point communi- cations protocol for silicon neural systems. This paper describes an extension of the AER protocol that allows multiple AER senders to share a common bus

Lazzaro, John

160

Using CSP for protocol analysis: the Needham-Schroeder  

E-Print Network [OSTI]

Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

Doran, Simon J.

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Building America House Simulation Protocols (Revised)  

SciTech Connect (OSTI)

The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

Hendron, R.; Engebrecht, C.

2010-10-01T23:59:59.000Z

162

Lab protocols A. Preparation of competent Cells  

E-Print Network [OSTI]

for 30- 60 min. #12;Lab protocols C. Solutions RF1 Compound RbCl MnCl2 4H2O Potassium acetate CaCl2.2H2O-rinsed 0.22 u membrane. RF2 Compound MOPS RbCl CaCl2.2H2O Glycerol Amount/liter 20 ml of 0.5 M (pH6.8) 1

Oliver, Douglas L.

163

CREATION OF THE MODEL ADDITIONAL PROTOCOL  

SciTech Connect (OSTI)

In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

Houck, F.; Rosenthal, M.; Wulf, N.

2010-05-25T23:59:59.000Z

164

08/05/2011. Current Standard Operating Protocols (SOP), NCBS MS-Facility Proteomics Tryptic Digest Protocols  

E-Print Network [OSTI]

Digest Protocols Protocol: 1 Ingel Digestion Protocol with Incubation Overnight Reference: In-gel digestion for mass spectrometric characterization of proteins and proteomes. Shevchenko et al. Nature in vacuum centrifuge. 8. Samples are now ready for digestion. Alternatively, they can be stored at -20o C

Udgaonkar, Jayant B.

165

Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols  

E-Print Network [OSTI]

................... 17 3 The flowchart of the proposed PSI protocol ........................................................... 30 4 The flowchart of the proposed SH protocol ............................................................ 50 5 A secret handshake protocol...-preserving element matching protocols ................................ 13 5 Comparison between PSI protocols ........................................................................ 33 6 Comparison between SH protocols...

Duan, Pu

2012-07-16T23:59:59.000Z

166

Soft-Decision-and-Forward Protocol for Cooperative Communication Networks Based on Alamouti Code  

E-Print Network [OSTI]

protocol called soft-decision-and- forward (SDF) is introduced. SDF protocol exploits the soft decision with low decoding complexity are proposed. From simulations, it can be seen that SDF protocol outperforms protocol called soft-decision- and-forward (SDF) is introduced. Unlike AF and DF protocols, SDF protocol

No, Jong-Seon

167

Privacy of encrypted Voice Over Internet Protocol  

E-Print Network [OSTI]

of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the gen- eration of tra c whenever the sender detects a voice inactivity period. We use the simple Bayesian classi er and the complex HMM... (Hidden Markov Models) classi er to evaluate the performance of our attack. Then we describe the usage of acoustic features in our attack to improve the performance. We conclude by presenting a number of problems that need in-depth study in order to be e...

Lella, Tuneesh Kumar

2008-10-10T23:59:59.000Z

168

2014 Building America House Simulation Protocols  

SciTech Connect (OSTI)

As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

2014-03-01T23:59:59.000Z

169

Security Proof of a Semi-Quantum Key Distribution Protocol  

E-Print Network [OSTI]

Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their security analysis is difficult and little is known concerning how secure they are compared to their fully quantum counterparts. In this paper we prove the unconditional security of a particular semi-quantum protocol. We derive an expression for the key rate of this protocol, in the asymptotic scenario, as a function of the quantum channel's noise. Finally, we will show that this semi-quantum protocol can tolerate a maximal noise level comparable to certain fully quantum protocols.

Walter O. Krawec

2014-11-30T23:59:59.000Z

170

Fibred Coalgebraic Logic and Quantum Protocols  

E-Print Network [OSTI]

Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

Daniel Marsden

2014-12-30T23:59:59.000Z

171

Chapter 18: Variable Frequency Drive Evaluation Protocol  

SciTech Connect (OSTI)

An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

Romberger, J.

2014-11-01T23:59:59.000Z

172

Separable states improve protocols with restricted randomness  

E-Print Network [OSTI]

It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterise the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models and separable, i.e. disentangled, states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that in particular, separable states may improve the so-called random access codes, which is a class of communication problems where one party tries to read a portion of the data held by another distant party in presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord.

T. K. Chuan; T. Paterek

2014-10-07T23:59:59.000Z

173

KYOTO UNIVERSITYKYOTO UNIVERSITY Kyoto University Financial Report 2013 09  

E-Print Network [OSTI]

Report 201312 #12; 30 11 13AUN 2ASEAN+3 Educational Forum and Young Speakers Contest3 AUNASEAN University Network21 ASEAN+3 4 ASEAN+3 24 ...... 3,027 ...... 3,447 2451 ......13,403 ...... 9 Century Collections Online 1 KULINE 13AUN2 ASEAN+3 Educational Forum and Young Speakers Contest 6

Takada, Shoji

174

Device-independent entanglement-based Bennett 1992 protocol  

E-Print Network [OSTI]

In this paper we set forth a novel connection between the Bennett 1992 protocol and a Bell inequality. This allows us to extend the usual prepare-and-measure protocol to its entanglement-based formulation. We exploit a recent result in the frame of device-independent quantum key distribution to provide a simple, model-independent, security proof for the new protocol. The minimum efficiency required for a practical implementation of the scheme is the lowest reported to date.

Marco Lucamarini; Giuseppe Vallone; Ilaria Gianani; Giovanni Di Giuseppe; Paolo Mataloni

2012-10-05T23:59:59.000Z

175

ASHRAE's New Performance Measurement Protocols for Commercial Buildings  

E-Print Network [OSTI]

Services Administration. 10 IEA is the International Energy Agency. ESL-IC-08-10-11 Proceedings of the Eighth International Conference for Enhanced Building Operations, Berlin, Germany, October 20-22, 2008 2 The resultant protocols are intended to provide... Building Operations, Berlin, Germany, October 20-22, 2008 3 Chapter 1: Energy (Authors: MacDonald, Haberl). In Chapter 1 the protocols for measuring the building?s energy useare presented. These protocols begin with acollection of facility information...

Haberl, J.; Davies, H.; Owens, B.; Hunn, B.

176

DOE Transportation Protocols Topic Group Summary of Second Conference  

Broader source: Energy.gov (indexed) [DOE]

Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

177

DOE Transportation Protocols Topic Group Conference Call Summary...  

Broader source: Energy.gov (indexed) [DOE]

Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TECWG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the...

178

Decentralized Decision-making and Protocol Design for Recycled ...  

E-Print Network [OSTI]

Decentralized Decision-making and Protocol. Design for Recycled Material Flows. Reverse logistics networks often consist of several tiers with independent

ihong

2006-07-24T23:59:59.000Z

179

The Greenhouse Gas Protocol Initiative: Allocation of Emissions...  

Open Energy Info (EERE)

Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Allocation of...

180

A search for quantum coin-flipping protocols using optimization ...  

E-Print Network [OSTI]

Mar 3, 2014 ... We conduct two kinds of search: one for protocols. ?Department of ..... This operation maps a probability vector to a quantum state, see Sub-.

2014-03-02T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Formal Modelling and Analysis of the NORM Multicast Protocol  

E-Print Network [OSTI]

Formal Modelling and Analysis of the NORM Multicast Protocol Using Real-Time Maude Elisabeth Lien . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 iii #12;2.3.2 Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Ă?lveczky, Peter Csaba

182

aureus decolonisation protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

183

addfam study protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

184

antineoplastic combined chemotherapy protocols: Topics by E-print...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

185

afinos study protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

186

agrobacterium-mediated transformation protocol: Topics by E-print...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

187

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Broader source: Energy.gov (indexed) [DOE]

CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) March 2007 Fuel cells, especially for...

188

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Broader source: Energy.gov (indexed) [DOE]

USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May...

189

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased...  

Open Energy Info (EERE)

Purchased Electricity Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity AgencyCompany...

190

BPA Response to Comments on Oversupply Management Protocol  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Wind energy producers, regional utilities, interest groups and others submitted approximately 90 comments on Bonneville Power Administration's Feb. 7 proposed protocol for...

191

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Broader source: Energy.gov (indexed) [DOE]

Accelerated Ash-Loading Protocol for Diesel Particulate Filters Bruce G. Bunting and Todd J. Toops Oak Ridge National Laboratory Adam Youngquist and Ke Nguyen University of...

192

NEMVP: North American energy measurement and verification protocol  

SciTech Connect (OSTI)

This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

NONE

1996-03-01T23:59:59.000Z

193

An immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol  

E-Print Network [OSTI]

This paper presents the security analysis on the quantum stream cipher so called Yuen-2000 protocol (or $\\alpha\\eta$ scheme) against the fast correlation attack, the typical attack on stream ciphers. Although a very simple experimental model of the quantum stream cipher without a random mapper may be decrypted in the information theoretic sense by the fast correlation algorithm, it is not a basic feature of Yuen 2000 protocol. In fact, we clarify that there exists a randomization scheme which attains the perfect correlation immunity against such attacks under an approximation. And in this scheme, the running key correlation from the second randomization that determines the mapping patterns is dismissed also by quantum noise. In such a case, any fast correlation attack does not work on the quantum stream cipher.

Osamu Hirota; Kaoru Kurosawa

2006-04-06T23:59:59.000Z

194

KYOTO UNIVERSITYKYOTO UNIVERSITY Financial Report  

E-Print Network [OSTI]

Report 201312 #12; 30 11 13AUN 2ASEAN+3 Educational Forum and Young Speakers Contest3 AUNASEAN University Network21 ASEAN+3 4 ASEAN+3 24 ...... 3,027 ...... 3,447 2451 ......13,403 ...... 9 Century Collections Online 1 KULINE 13AUN2 ASEAN+3 Educational Forum and Young Speakers Contest 6

Takada, Shoji

195

GGREENHOUSE JJUSTICE MOVING BEYOND KYOTO  

E-Print Network [OSTI]

for UNFCC COP-8 New Delhi, India 23 October - 01 November 2002 Center for Energy & Environmental Policy, YU-MI MUN, NOAH TOLY & YOUNG-DOO WANG Position Paper prepared for UNFCC COP-8 New Delhi, India 23 October - 01 November 2002 Center for Energy & Environmental Policy tel: 302.831.8405 · web: www

Delaware, University of

196

Kyoto University 1 Year Contents  

E-Print Network [OSTI]

and Plasma Physics Laboratory merged into the Institute of Advance Energy. Student Counseling Center in Humanities established. 1941 Chest Disease Research Institute and Institute of Atomic Energy established Laboratory established. 1996 Graduate School of Energy Science established. Institute of Atomic Energy

Takada, Shoji

197

Kyoto University 1 Year Contents  

E-Print Network [OSTI]

and Plasma Physics Laboratory merged into the Institute of Advance Energy. Student Counseling Center Chest Disease Research Institute and Institute of Atomic Energy established. 1944 Wood Research Laboratory established. 1996 Graduate School of Energy Science established. Institute of Atomic Energy

Takada, Shoji

198

Energy Aware Implementation of an Ad Hoc Routing Protocol  

E-Print Network [OSTI]

estimates of the potential for energy savings. We show potential savings of fifty six percent in energy functions of an energy aware ad hoc routing protocol are · Energy based link cost with transmit powerEnergy Aware Implementation of an Ad Hoc Routing Protocol by Shweta Bhandare Scriptor B

Brown, Timothy X.

199

Field and Lab Methods & Protocols University of Michigan  

E-Print Network [OSTI]

SAFETY AND ORDERING PROCEDURES 309 (VIII-4) HAZARDOUS MATERIALS AND WASTE 313 (VIII-5) PRINTERS 315 (VIIIField and Lab Methods & Protocols Kling Lab University of Michigan Updated: December 2012 In use from: May 2012 Protocol version: v2.9 Last update: 8 November 2013 1 #12;LAST UPDATE: 29 MAY 2013 1

Kling, George W.

200

Adaptive Data Collection Protocol using Reinforcement Learning for VANETs  

E-Print Network [OSTI]

Adaptive Data Collection Protocol using Reinforcement Learning for VANETs Ahmed Soua, and Hossam. Here, an Adap- tive Data cOllection Protocol using rEinforcement Learning (ADOPEL) is proposed that drivers can be alerted in advance. Since each vehicle in a vehicular environment can detect a hazardous

Boyer, Edmond

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

202

Practical quantum oblivious transfer and bit commitment protocols  

E-Print Network [OSTI]

We propose a practical quantum oblivious transfer and a bit commitment protocols which replace the single-photon source with weak coherent pulses and allow error and loss in channel and detectors. These protocols can be realized with available optoelectronic apparatus.

Ya-Qi Song; Li Yang

2015-02-09T23:59:59.000Z

203

Evaluation des performances des protocoles de routage Ad hoc  

E-Print Network [OSTI]

Evaluation des performances des protocoles de routage Ad hoc Abdelali Boushaba1 , Mohammed Oumsis2 quatre protocoles de routage Ad hoc: DSR, AODV, OLSR et DSDV et d'autre part, d'examiner l'impact de la'activité. Mots-clés--Réseaux mobiles Ad hoc; DSR; AODV; DSDV; OLSR; évaluation des performances; simulation, NS-2

Paris-Sud XI, Université de

204

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks Yu Chen Google, UK chenyu in ad hoc networks. In our protocol, each node that has been assigned an address manages a disjoint of node's degree, regardless of the network size. I. INTRODUCTION A wireless mobile ad hoc network

Paris-Sud XI, Université de

205

Internet Protocol Adoption: Learning from Bitcoin Position Paper  

E-Print Network [OSTI]

This position paper discusses two related questions: 1. Using the framework of network economics, what are success factors behind the adoption of Bitcoin (a cryptographic curreny), and can we copy them for other protocols? 2. Can we design more successful protocols if we have inband payment mechanisms to internalize the externalities that emerge during adoption and in steady state? 1.

Rainer Böhme; Westfälische Wilhelms-universität Münster

206

A Locationaided Poweraware Routing Protocol in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

­hop wireless ad­hoc networks, designing energy­efficient rout­ ing protocols is critical since nodes are power be mobile, demanding the energy­efficient routing protocol to be fully distributed and adaptive­ spect to end­to­end energy­efficient routes. Finally, preliminary simulation results are presented

Nahrstedt, Klara

207

Uniform Leader Election Protocols for Radio Networks Koji Nakano  

E-Print Network [OSTI]

Uniform Leader Election Protocols for Radio Networks #3; Koji Nakano School of Information Science be distinguished by serial or manufacturing number. The leader election problem asks to designate one of the station as leader. A leader election protocol is said to be uniform if in each time slot every station

Nakano, Koji

208

Hello Again: Stabilization of the Hello Protocol in OSPF  

E-Print Network [OSTI]

Hello Again: Stabilization of the Hello Protocol in OSPF Jorge A. Cobb Mohamed G. Gouda Deepinder Sidhu § Abstract The Hello protocol in OSPF allows each router in a network to check whether it can periodi- cally send hello messages to every neighboring router in the network. Associated with the Hello

Cobb, Jorge Arturo

209

Modelling unbounded parallel sessions of security protocols in CSP  

E-Print Network [OSTI]

Modelling unbounded parallel sessions of security protocols in CSP E. Kleiner and A.W. Roscoe that a simplification to earlier CSP models designed to prove protocols correct on the FDR model checker is valid of injective authentication. Essentially for historical reasons, that paper created a model with both

Roscoe, Bill

210

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #  

E-Print Network [OSTI]

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

Kulkarni, Sandeep

211

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks  

E-Print Network [OSTI]

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

Kulkarni, Sandeep

212

Improved protocols of secure quantum communication using W states  

E-Print Network [OSTI]

Recently, Hwang et al. [Eur. Phys. J. D. 61, 785 (2011)] and Yuan et al. [Int. J. Theo. Phys. 50, 2403 (2011)] have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.

Chitra Shukla; Anindita Banerjee; Anirban Pathak

2012-04-20T23:59:59.000Z

213

Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)  

E-Print Network [OSTI]

the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

Thomas, Andrew

214

ANSP Protocols for Analysis of NAWQA Algae Samples Protocol P-13-57 Patrick Center for Environmental Research 117  

E-Print Network [OSTI]

of associated pressure gauges, and monitor the volume of gas left in the tank. Replace cylinders as needed. Any hoods. 3.1.4. Gas suspension tables. 3.1.5. Slide warmers/hot plates. 3.2. Chemistry Laboratory. 3 recommended. Periodically clean oil #12;ANSP Protocols for Analysis of NAWQA Algae Samples Protocol P-13

Charles, Donald

215

Shortcomings of the Cartagena Protocol: Resolving the Liability Loophole at an International Level  

E-Print Network [OSTI]

Protocol both focus on the effects of transboundary shipping, hazardous wasteProtocol on Liability and Compensation for Damage Resulting from Transboundary Movements of Hazardous Wasteshazardous wastes and other wastes subject to the Convention. The Cartagena Protocol

Kohm, Katherine E.

2009-01-01T23:59:59.000Z

216

Multiple-Photon Absorption Attack on Entanglement-Based Quantum Key Distribution Protocols  

E-Print Network [OSTI]

In elaborating on the multiple-photon absorption attack on Ekert protocol proposed in arXiv:1011.4740, we show that it can be used in other entanglement-based protocols, in particular the BBM92 protocol. In this attack, the eavesdropper (Eve) is assumed to be in control of the source, and she sends pulses correlated in polarization (but not entangled) containing several photons at frequencies for which only multiple-photon absorptions are possible in Alice's and Bob's detectors. Whenever the photons stemming from one pulse are dispatched in such a way that the number of photons is insufficient to trigger a multiple-photon absorption in either channel, the pulse remains undetected. We show that this simple feature is enough to reproduce the type of statistics on the detected pulses that are considered as indicating a secure quantum key distribution, even though the source is actually a mixture of separable states. The violation of Bell inequalities measured by Alice and Bob increases with the order of the multiple-photon absorption that Eve can drive into their detectors, while the measured quantum bit error rate decreases as a function of the same variable. We show that the attack can be successful even in the simplest case of a two-photon absorption or three-photon absorption attack, and we discuss possible countermeasures, in particular the use of a fair sampling test.

Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

2011-02-16T23:59:59.000Z

217

Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols  

E-Print Network [OSTI]

In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

Horace P. Yuen

2014-05-07T23:59:59.000Z

218

RADCAL Operations Manual Radiation Calibration Laboratory Protocol  

SciTech Connect (OSTI)

The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

Bogard, J.S.

1998-12-01T23:59:59.000Z

219

E-Print Network 3.0 - aided routing protocol Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for: aided routing protocol Page: << < 1 2 3 4 5 > >> 1 Routing Protocols for Mobile Ad-hoc Networks: Current Development and Evaluation Summary: network. LAR: Location Aided...

220

E-Print Network 3.0 - applicable protocol fails Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

identical protocol is used for different purposes ... Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 2 Protocol Interactions and...

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Tomography increases key rates of quantum-key-distribution protocols  

E-Print Network [OSTI]

We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

2008-07-22T23:59:59.000Z

222

Parallel decomposition of the logical link control protocol  

E-Print Network [OSTI]

INTRODUCTION II PROTOCOLS AND FINITE STATE MACHINES A. PROTOCOLS B. FINITE STATE MACHINES III LOGICAL LINK CONTROL PROTOCOL 1V LLC STATE TABLE DESCRIPTION A. LLC STATES V THE PS I ARCHITECTURE VI RESULTS A. LINK INITIALIZATION SUBMACHINES . . B... expressions that govern the transition are given below Bin I (A) SET ABME+ SET ABME (Ts=Vc=O, Vi=0) + SET ABME (Ts=Vc&, Vi =RIp). (B) DEACTIVATE LS. (G) ENTER LCL Busy + EXIT LCL Busy + LPDU Invalid + SEND XID + SET ADM+ Ti Expired+ Tl Expired+ TEST LINK...

Bajpai, Dhruv Haribanshnath

1991-01-01T23:59:59.000Z

223

Protocol for secure quantum machine learning at a distant place  

E-Print Network [OSTI]

The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A tradeoff between the inaccuracy and the learning time is also analyzed.

Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

2015-04-20T23:59:59.000Z

224

Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol  

SciTech Connect (OSTI)

This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

Osterwald, C. R.

2008-03-01T23:59:59.000Z

225

Proposals for Non-PGM Catalyst Target and Test Protocols  

Broader source: Energy.gov (indexed) [DOE]

Fuel Cell Tech Team Proposals for Non-PGM catalyst target and test protocols FCTT (USCAR) Shinichi Hirano (co-chair), Tarek Abdel-Baset, Balsu Lakshmanan, David Masten, Mark...

226

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard  

E-Print Network [OSTI]

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard Department of Computer Science (AA- MAS 2013), Ito, Jonker, Gini, and Shehory (eds.), May, 6­10, 2013, Saint Paul, Minnesota, USA

227

A scalable protocol for the synthesis and use of neomenthyldiphenylphosphine.  

E-Print Network [OSTI]

A scalable and reproducible protocol has been developed for the preparation of (-)- neomenthyldiphenylphosphine ((-)-1) from inexpensive starting materials. This ligand was then utilized in the nickel-catalyzed reductive ...

Van Dyke, Aaron R. (Aaron Robert)

2009-01-01T23:59:59.000Z

228

Dynamic address allocation protocols for Mobile ad hoc networks  

E-Print Network [OSTI]

Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

Patchipulusu, Praveena

2001-01-01T23:59:59.000Z

229

Design and simulation of Header Processor for Xpress Transfer Protocol  

E-Print Network [OSTI]

cannot meet the demands of future applications. Contemporary protocols provide traditional error-control and flow- control functions but do not provide fast and implicit connection setup, rapid re- quest/response and reliable multicast operations... OF SCIENCE August 1993 Major Subject: Electrical Engineering DESIGN AND SIMULATION OF HEADER PROCESSOR FOR XPRESS TRANSFER PROTOCOL A Thesis by GIRISH R. CHANDANGOUDAR Approved ss to style and content by: Hosame Abu-Amara (Chair of Committee) Bar G...

Chandangoudar, Girish R.

1993-01-01T23:59:59.000Z

230

Comparison of two wireless ad hoc routing protocols on a hardware test-bed  

E-Print Network [OSTI]

. These protocols are tested predominately using software simulation. Very few implementations have demonstratedComparison of two wireless ad hoc routing protocols on a hardware test-bed Shweta Bhandare (DSR) protocol and our Energy Aware Dynamic Source Routing protocol (EADSR). The implementation

Brown, Timothy X.

231

An Efficient Query Tree Protocol for RFID Tag Anti-Collision  

E-Print Network [OSTI]

An Efficient Query Tree Protocol for RFID Tag Anti-Collision Ming-Kuei Yeh National Taipei Query Tree (EQT) protocol to improve both the Query Tree (QT) protocol and the Collision Tree (CT and the energy consumption is lessened. In the EQT protocol, the timeslots structure, the query and responses

Jiang, Jehn-Ruey

232

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol and several new active

Schneier, Bruce

233

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol and several new active

Schneier, Bruce

234

Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches  

E-Print Network [OSTI]

Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient. Here, we have shown that the efficiency of Hassanpour Houshmand (HH) protocol is not high, and there exist several approaches through which more efficient protocols for the same task can be designed. To establish this point, we have proposed an efficient protocol of controlled deterministic secure quantum communication which is based on permutation of particles (PoP) technique and is considerably efficient compared to HH protocol. We have also generalized this protocol into its bidirectional counterpart. Interestingly, bipartite entanglement (Bell state) is sufficient for the realization of the proposed protocols, but HH protocol and other existing protocols require at least tripartite entanglement. Further, we have shown that it is possible to construct a large number of efficient protocols of unidirectional and bidirectional controlled deterministic secure quantum communication by using various alternative approaches and different quantum states. These alternative protocols can be realized by modifying the existing protocols of quantum secure direct communication and deterministic secure quantum communication. We have also shown that it is possible to design completely orthogonal-state-based protocols for unidirectional and bidirectional controlled deterministic secure quantum communication.

Anirban Pathak

2014-11-24T23:59:59.000Z

235

New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless  

E-Print Network [OSTI]

New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

Jain, Raj

236

A Simplified Hierarchical Dynamic Quantum Secret Sharing Protocol with Added Features  

E-Print Network [OSTI]

Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.

Sandeep Mishra; Chitra Shukla; Anirban Pathak; R. Srikanth; Anu Venugopalan

2014-09-06T23:59:59.000Z

237

Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols  

SciTech Connect (OSTI)

Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

2013-05-01T23:59:59.000Z

238

Protocol development for evaluation of commercial catalytic cracking catalysts  

SciTech Connect (OSTI)

A complete, new set of testing protocols has been developed for qualification of catalysts for Ashland's commercial catalytic cracking units. The objective of this test development is to identify new generations of improved cracking catalysts. Prior test protocols have classically utilized microactivity (MAT) testing of steamed virgin catalysts, while more advanced methods have utilized fixed fluid bed and/or circulating pilot units. Each of these techniques, however, have been limited by their correlation to commercial operations, weaknesses in metallation and preparation of pseudo-equilibrium catalysts, and mechanical constraints on the use of heavy, vacuum bottoms-containing feedstocks. These new protocols have been baselined, compared to commercial Ashland results on known catalytic cracking catalysts, and utilized to evaluate a range of potentially new catalyst samples.

Mitchell, M.M. Jr.; Moore, H.F. (Ashland Petroleum Co., KY (USA))

1988-09-01T23:59:59.000Z

239

A practical approach to the interGroup protocols  

SciTech Connect (OSTI)

Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

Berket, Karlo; Agarwal, Deborah A.; Chevassut, Olivier

2001-11-12T23:59:59.000Z

240

Routing Protocols for Cognitive Radio Networks: A Survey  

E-Print Network [OSTI]

with the cognitive radio (CR) technology, a wireless system can exploit opportunistically the radio spectrum licensed to other systems. Thus, CR is regarded as a solution to the problems resulting from the limited available spectrum and the inefficiency in the spectrum usage. The multi-hop CR networks need some novel routing algorithms taking the open spectrum phenomenon into account. The main approach in designing the routing algorithm for the CR networks is the joint design of routing and spectrum management. Works on such issues have just started and are still in a rudimentary stage. In this paper, we survey comprehensively the existing research on the routing protocols for CR networks, especially with reference to CR ad hoc networks. We classify the routing protocols, discuss the essential features of the different protocols, and provide the future research directions.

Kamruzzaman, S M

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

A Fast Delivery Protocol for Total Order Broadcasting  

SciTech Connect (OSTI)

The conclusions of this report are: (1) Fast delivery protocol reduces the latency of message ordering for idle systems and keep comparable performances with communication history algorithms for busy systems; (2) The protocol optimizes the total ordering process by waiting for messages only from a subset of the machines in the group; and (3) The fast acknowledgment aggressively acknowledges total order messages to reduce the latency for idle system, and it is smart enough to hold the acknowledgments when the network communication is heavy.

Ou, Li [Tennessee Technological University; He, X. [Tennessee Technological University; Engelmann, Christian [ORNL; Scott, Stephen L [ORNL

2007-01-01T23:59:59.000Z

242

A Hybrid Long-Distance Entanglement Distribution Protocol  

E-Print Network [OSTI]

We propose a hybrid (continuous-discrete variable) quantum repeater protocol for distribution of entanglement over long distances. Starting from entangled states created by means of single-photon detection, we show how entangled coherent state superpositions, also known as `Schr\\"odinger cat states', can be generated by means of homodyne detection of light. We show that near-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements.

Jonatan B. Brask; Ioannes Rigas; Eugene S. Polzik; Ulrik L. Andersen; Anders S. Sorensen

2010-04-01T23:59:59.000Z

243

Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique  

E-Print Network [OSTI]

The Goldenberg-Vaidman (GV) protocol for quantum key distribution (QKD) uses orthogonal encoding states of a particle. Its security arises because operations accessible to Eve are insufficient to distinguish the two states encoding the secret bit. We propose a two-particle cryptographic protocol for quantum secure direct communication, wherein orthogonal states encode the secret, and security arises from restricting Eve from accessing any two-particle operations. However, there is a non-trivial difference between the two cases. While the encoding states are perfectly indistinguishable in GV, they are partially distinguishable in the bi-partite case, leading to a qualitatively different kind of information-vs-disturbance trade-off and also options for Eve in the two cases.

Preeti Yadav; R. Srikanth; Anirban Pathak

2014-09-09T23:59:59.000Z

244

Testing Protocol for Module Encapsulant Creep (Presentation)  

SciTech Connect (OSTI)

Recently there has been an interest in the use of thermoplastic encapsulant materials in photovoltaic modules to replace chemically crosslinked materials, e.g., ethylene-vinyl acetate. The related motivations include the desire to: reduce lamination time or temperature; use less moisture-permeable materials; or use materials with better corrosion characteristics. However, the use of any thermoplastic material in a high-temperature environment raises safety and performance concerns, as the standardized tests currently do not expose the modules to temperatures in excess of 85C, yet modules may experience temperatures above 100C in operation. Here we constructed eight pairs of crystalline-silicon modules and eight pairs of glass/encapsulation/glass mock modules using different encapsulation materials of which only two were designed to chemically crosslink. One module set was exposed outdoors with insulation on the back side in Arizona in the summer, and an identical set was exposed in environmental chambers. High precision creep measurements and performance measurements indicate that despite many of these polymeric materials being in the melt state at some of the highest outdoor temperatures achievable, very little creep was seen because of their high viscosity, temperature heterogeneity across the modules, and in the case of the crystalline-silicon modules, the physical restraint of the backsheet. These findings have very important implications for the development of IEC and UL qualification and safety standards, and in regards to the necessary level of cure during the processing of crosslinking encapsulants.

Kempe, M. D.; Miller, D. C.; Wohlgemuth, J. H.; Kurtz, S. R.; Moseley, J. M.; Shah, Q.; Tamizhmani, G.; Sakurai, K.; Inoue, M.; Doi, T.; Masuda, A.

2012-02-01T23:59:59.000Z

245

Shor-Preskill Type Security-Proofs for Concatenated Bennett-Brassard 1984 Quantum Key Distribution Protocol  

E-Print Network [OSTI]

We discuss long code problems in the Bennett-Brassard 1984 (BB84) quantum key distribution protocol and describe how they can be overcome by concatenation of the protocol. Observing that concatenated modified Lo-Chau protocol finally reduces to the concatenated BB84 protocol, we give the unconditional security of the concatenated BB84 protocol.

W. -Y. Hwang; K. Matsumoto; H. Imai; J. Kim; H. -W. Lee

2002-10-31T23:59:59.000Z

246

Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas  

E-Print Network [OSTI]

Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas Abdel Ilah Alshbatat and Liang Dong, Senior Member, IEEE Abstract-- Unmanned aerial vehicle (UAV) has been used inspection and range extension. Moreover, UAVs are suited for situations that are too dangerous for direct

Dong, Liang

247

Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol  

SciTech Connect (OSTI)

The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

Romberger, J.

2014-11-01T23:59:59.000Z

248

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

249

A Review of Embedded Automotive Protocols Nicolas Navet  

E-Print Network [OSTI]

A Review of Embedded Automotive Protocols Nicolas Navet 1 , Françoise Simonot-Lion 2 April 14, 2008 of a large number of automotive networks such as LIN, J1850, CAN, FlexRay, MOST, etc.. This pa- per rst is given. Next, the current eorts of the automotive industry on middleware technologies which may

Navet, Nicolas

250

Air to Air Communication Protocol Arjan Durresi1  

E-Print Network [OSTI]

1 Air to Air Communication Protocol Arjan Durresi1 , Vamsi Paruchuri1 , Leonard Barolli2 and Raj. Louis, MO 63130, USA 314-935-4963, jain@cse.wustl.edu Abstract--We present Air to Air Communication (AAC........................................................2 3. AIR TO AIR COMMUNICATION..............................3 4. SIMULATIONS

Jain, Raj

251

Reply to "Comment on Protocol for Direct Counterfactual Quantum Communication"  

E-Print Network [OSTI]

In reply to Vaidman's Comment [arXiv:1304.6689], we show that his claim that our Protocol for Direct Counterfactual Quantum Communication [PRL 110, 170502 (2013), arXiv:1206.2042] is counterfactual only for one type of information bit is wrong.

Hatim Salih; Zheng-Hong Li; M. Al-Amri; M. Suhail Zubairy

2014-04-28T23:59:59.000Z

252

Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''  

E-Print Network [OSTI]

Biomolecular free energy profiles by a shootingĂ?umbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

Schlick, Tamar

253

Survivability validation protocol issues for a system-of-systems  

SciTech Connect (OSTI)

This paper illuminates the various issues confronting a protocol developer as he attempts to construct a system-of-systems (SOS) survivability validation protocol. These issues are considered in the context of a Battle Management Command, Control, and Communications (BMC{sup 3}) network in the form of a Hypothetical System Architecture consisting of air, sea, ground, and space platforms. The purpose of the protocol of concem is to validate the nuclear survivability of the BMC{sup 3} SOS. To achieve this validation, the combined susceptibilities of the SOS platforms and communications links must be considered. A basic SOS simulation concept is described, which assumes individual platform survivability. The nuclear environments to be considered in the simulation are outlined with a discussion of the relationship to basic system susceptibility. Various validation concepts for the SOS protocol are summarized in relation to the life cycle phase during which they would be utilized. Computer simulation issues are discussed, including the environments to be modeled, validation of the codes, documentation, and configuration control. Concluding remarks center on the most likely way of simulating nuclear effects and on treating simulation tools like mission critical items.

Brock, G.; Ianacone, K.J.; Stringer, T.A. [Kaman Sciences Corp., Colorado Springs, CO (United States)

1993-08-01T23:59:59.000Z

254

WLDF 311 Treefrog Study; Fall 2007 PVC Pipe Deployment Protocol  

E-Print Network [OSTI]

WLDF 311 Treefrog Study; Fall 2007 PVC Pipe Deployment Protocol: 1. Arrange time to meet should include: a. 12 pipes with caps (there should be ~3 pipes on "your" transects out in the field & place trap on the stake (using hole near top of pipe for screw head). e. Record UTM positions (easting

Johnson, Matthew

255

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks Yongjun Dai, Changhee Joo prevalent, TCP performance over mobile ad hoc networks attracts more attention. The earlier studies on TCP in wireless networks have shown that it performs poorly in ad hoc networks. They tackled the problem

Bahk, Saewoong

256

STOCKER FLY BRAIN IMMUNOFLUORESCENCE PROTOCOL January 8, 2001  

E-Print Network [OSTI]

1 STOCKER FLY BRAIN IMMUNOFLUORESCENCE PROTOCOL January 8, 2001 Vosshall Lab 1. Anesthetize flies the brain, starting with the removal of the proboscis. Gently peel away the cuticle at the back of the fly the esophagus (hole in brain). Once all the cuticle has been removed, gently remove the fat body and trachea

257

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony executed corresponding other actions (e.g., a payment gateway approves a charge to customer C's account

Stoller, Scott

258

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony- ously executed corresponding other actions (e.g., a payment gateway approves a charge to customer C

Stoller, Scott

259

WHOP: Wormhole Attack Detection Protocol using Hound Packet  

E-Print Network [OSTI]

WHOP: Wormhole Attack Detection Protocol using Hound Packet Saurabh Gupta Indian Institute infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack

Dharmaraja, S.

260

BAAP: Blackhole Attack Avoidance Protocol for Wireless Network  

E-Print Network [OSTI]

BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute infrastructure in adhoc net- work makes it vulnerable to various attacks. MANET routing disrupts attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh

Dharmaraja, S.

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

A Hierarchical Checkpointing Protocol for Parallel Applications in Cluster Federations  

E-Print Network [OSTI]

A Hierarchical Checkpointing Protocol for Parallel Applications in Cluster Federations S federation. As a cluster federation comprises of a large number of nodes, there is a high probability fits to the characteristics of a cluster federation (large number of nodes, high latency and low

Paris-Sud XI, Université de

262

CARD-FISH and Microautoradiography Protocol for Bacteria and Archaea  

E-Print Network [OSTI]

1 CARD-FISH and Microautoradiography Protocol for Bacteria and Archaea by Gerhard Herndl Lab @ www FISH Hybridization www.microbial-oceanography.eu 2007 2 Sample Fixation 1. Fix samples in Ethanol 95% 7. Dry and mount in DAPI mix #12;CARD FISH Buffers and Chemicals www

Herndl, Gerhard

263

Reliable and Energy-Efficient Routing Protocol in Dense  

E-Print Network [OSTI]

Reliable and Energy-Efficient Routing Protocol in Dense Wireless Sensor Networks Min Chen, Taekyoung Kwon, Shiwen Mao, + Yong Yuan, Victor C.M. Leung* Department of Electrical and Computer@snu.ac.kr Department of Electrical and Computer Engineering Auburn University, 200 Broun Hall, Auburn, AL 36849

Chen, Min

264

LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note  

E-Print Network [OSTI]

LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note: The Luciferase enzyme is unstable-ground samples. 2. Collect liquid nitrogen from downstairs and place 24 frozen tissue samples inside. 3. Place the power. 14.The luminometer cuvettes can be reused, BUT ONLY if they have been thoroughly soaked

Raizada, Manish N.

265

A Self-Healing Load Balancing Protocol and Implementation  

E-Print Network [OSTI]

in the opposite direction exhibits a rate of r2 = c2x2. It can be shown that the overall reaction system spanned Comparison In order to illustrate the principle of the two protocols, we carried out OMNeT++ [2] simulations this unbounded growth, we apply a "non-selective dilution flow" to the reactor which randomly destroys a molecule

Vetter, Thomas

266

GUV formation protocol: -Ethanol, DI water and Kimwipes for cleaning  

E-Print Network [OSTI]

GUV formation protocol: Materials: - Ethanol, DI water and Kimwipes for cleaning - 5-10 µl glass with ethanol and DI water using Kimwipes alternating the solvents at least twice to make sure any grease-ring using a Kimwipe and ethanol. Use Que-tip or grease slide to apply a thin layer of vacuum grease to one

Movileanu, Liviu

267

An adaptive protocol for distributed beamforming Stephan Sigg1  

E-Print Network [OSTI]

settings and propose a protocol that utilises organic computing principles to find optimum parameters is the approach to combine transmission signals from distinct transmit antennas simultaneously in order to create transmission [7, 8, 2]. Several open-loop and closed-loop carrier synchronisation approaches have been proposed

Beigl, Michael

268

How to Use Bitcoin to Design Fair Protocols Iddo Bentov  

E-Print Network [OSTI]

How to Use Bitcoin to Design Fair Protocols Iddo Bentov idddo@cs.technion.ac.il Ranjit Kumaresan then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-or-refund"), that formalizes and abstracts the exact properties we require from the Bitcoin network to achieve our goals

269

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

270

US - Voice Over Internet Protocol Phone Service Providers Market Analysis  

E-Print Network [OSTI]

This report explains the overview of Voice over internet protocol (VoIP) and the challenges the VoIP Phone Service providers face to become market leaders. The report provides an overview of new services offering, both residential and business...

Srinivasan, Vijaybabu

2006-05-19T23:59:59.000Z

271

Safeguards Agreement and Protocol with the International Atomic Energy Agency  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

2004-01-07T23:59:59.000Z

272

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

273

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

274

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

275

WSN-inspired Sleep Protocols for Heterogeneous LTE Networks  

E-Print Network [OSTI]

architecture becomes heterogenous, in particular 4G networks where LTE micro eNodeBs are deployed to strengthen algorithm to dynamically switch off and on the micro eNodeBs of an LTE heterogeneous network followingWSN-inspired Sleep Protocols for Heterogeneous LTE Networks Iulia Tunaru CEA CEA-Leti, Minatec

Paris-Sud XI, Université de

276

On the construction of digest functions for manual authentication protocols  

E-Print Network [OSTI]

On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16­32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

Jeavons, Peter

277

Localized radio frequency communication using asynchronous transfer mode protocol  

DOE Patents [OSTI]

A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

Witzke, Edward L. (Edgewood, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM)

2007-08-14T23:59:59.000Z

278

On Runtime Adaptation of Application-Layer Multicast Protocol  

E-Print Network [OSTI]

¨ubsch, Christoph P. Mayer, and Oliver P. Waldhorst Institute of Telematics, Karlsruhe Institute of Technology (KIT), Germany {huebsch,mayer,waldhorst}@kit.edu Reasonable choice of protocol parameters is crucial., a clean implementation of multicast communication within the Internet architecture has been proposed

Paris-Sud XI, Université de

279

An Energy-Aware Simulation Model and Transaction Protocol  

E-Print Network [OSTI]

1 An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution of Southern California Oct. 15, 2003 Outline ! Introduction ! MANET Simulation Model ! Energy-aware Network of analytical approaches ! We presents a simulation model to evaluating power management policies for a MANET

Pedram, Massoud

280

An efficient protocol for radiochromic film dosimetry combining calibration and measurement in a single scan  

SciTech Connect (OSTI)

Purpose: Radiochromic film provides dose measurement at high spatial resolution, but often is not preferred for routine evaluation of patient-specific intensity modulated radiation therapy (IMRT) plans owing to ease-of-use factors. The authors have established an efficient protocol that combines calibration and measurement in a single scan and enables measurement results to be obtained in less than 30 min. This avoids complications due to postexposure changes in radiochromic film that delay the completion of a measurement, often for up to 24 h, in commonly used methods. In addition, the protocol addresses the accuracy and integrity of the measurement by eliminating environmental and interscan variability issues. Methods: The authors collected dose-response data from six production lots of Gafchromic EBT3 film and three production lots of EBT2 film at doses up to 480 cGy. In this work, the authors used seven different scanners of two different models-Epson 10000XL and V700; postexposure times before scanning from 30 min to 9 days; ambient temperatures for scanning spanning 11 Degree-Sign C; and two film orientations. Scanning was in 48-bit RGB format at 72 dpi resolution. Dose evaluation was conducted using a triple-channel dosimetry method. To evaluate the measurement protocol, patient specific IMRT and volumetric modulated arc therapy (VMAT) plans were exposed onto EBT3 films on a Varian Trilogy Linac. Film scanning was done following the protocol under a number of different conditions and the dose maps were analyzed to demonstrate the equivalence of results. Results: The results indicated that the dose-response data could be fit by a set of related rational functions leading to the description of a generic calibration curve. A simplified dosimetry protocol was established where dose-response data for a specific film lot, scanner, and scanning conditions could be derived from two films exposed to known doses. In most cases only one calibrated exposure was required since the dose for one of the films could be zero. Using the Gamma test criterion of 2%/2 mm to evaluate the measurements, similar passing rates ranging between about 95% and 99% for the fields studied were obtained from application films digitized under a variety of conditions all of them different than the conditions under which the calibration films were scanned. Conclusions: The authors have developed a simplified and efficient protocol to measure doses delivered by an IMRT or VMAT plan using only the patient film, one calibration film, one unexposed film, and applying a single scan to acquire a digital image for calculation and analysis. The simplification and timesaving offer a potential practical solution for using radiochromic film for routine treatment plan quality assurance without sacrificing spatial resolution for convenience.

Lewis, David; Micke, Andre; Yu Xiang; Chan, Maria F. [Advanced Materials Group, Ashland Inc., 1361 Alps Road, Wayne, New Jersey 07470 (United States); Department of Medical Physics, Memorial Sloan-Kettering Cancer Center, 136 Mountain View Boulevard, Basking Ridge, New Jersey 07920 (United States)

2012-10-15T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

An object-oriented implementation of a Low Level Reader Protocol (LLRP) library  

E-Print Network [OSTI]

This Master of Engineering Thesis describes the design and implementation of an object-oriented Low Level Reader Protocol (LLRP) library. LLRP is a recently released protocol which standardizes the formats and methods of ...

Constantinou, Fivos

2007-01-01T23:59:59.000Z

282

Performance analysis of distributed time division multiple access protocols in mobile ad hoc environments  

E-Print Network [OSTI]

Tactical wireless mobile ad hoc networks rely upon distributed medium access control (MAC) protocols for coordination and assignment of channel resources among dispersed and mobile users. One such protocol is the distributed ...

Dastangoo, Siamak

283

Multicast Protocols for Scalable On-Demand Download Niklas Carlsson Derek L. Eager  

E-Print Network [OSTI]

not model packet loss recovery, although our analyses and protocols are compatible with erasure coded data bandwidth and maximum client delay for this batching with constant batch delay (bcd) protocol, as follows

Vernon, Mary K.

284

The role of social factors in a dyadic training protocol: implications for computer-based instruction  

E-Print Network [OSTI]

of the active interlocked modeling (AIM) protocol were examined using a complex perceptual-motor task. A total of 105 male participants were randomly assigned to either the AIM protocol or an individual-based control condition. Verbal communication...

Tubre, Travis Charles

1997-01-01T23:59:59.000Z

285

Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on Diesel Aftertreatment (Agreement 13415) Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on...

286

A test case generation approach for conformance testing of SDL systems1  

E-Print Network [OSTI]

1 A test case generation approach for conformance testing of SDL systems1 C. Bourhfir2 , E This paper presents an approach for automatic executable test case and test sequence generation for a protocol modeled by an SDL system. Our methodology uses a uni- fied method which tests an Extended Finite

Aboulhamid, El Mostapha

287

PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS  

SciTech Connect (OSTI)

The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

Mickalonis, J.

2014-09-16T23:59:59.000Z

288

Performance Test Protocol for Evaluating Inverters Used in Grid-Connected  

E-Print Network [OSTI]

Performance Test Protocol for Evaluating Inverters Used in Grid-Connected Photovoltaic Systems....................................................................................... 6 4.1 Inverter Size

289

Methodology for Rating a Building's Overall Performance based on the ASHRAE/CIBSE/USGBC Performance Measurement Protocols for Commercial Buildings  

E-Print Network [OSTI]

METHODOLOGY FOR RATING A BUILDING?S OVERALL PERFORMANCE BASED ON THE ASHRAE/CIBSE/USGBC PERFORMANCE MEASUREMENT PROTOCOLS FOR COMMERCIAL BUILDINGS A Dissertation by HYOJIN KIM Submitted to the Office of Graduate Studies of Texas A&M... Bruner of the Texas A&M University Utilities and Energy Management Energy Office for his essential support that allowed me to launch my study at the case-study site; and to Mr. Tony Tasillo of the Texas Engineering Extension Service for his invaluable...

Kim, Hyojin 1981-

2012-11-14T23:59:59.000Z

290

A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks Murat Abstract RTS-CTS handshake based protocols achieve "reliable unicast" by eliminating the hidden node. Here we present a simple, light-weight, and self- stabilizing MAC protocol, namely Busy Elimination

Demirbas, Murat

291

A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments  

SciTech Connect (OSTI)

A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

Top, P; Kohlhepp, V; Dowla, F

2005-09-30T23:59:59.000Z

292

Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky  

E-Print Network [OSTI]

Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing pro- tocols and workload balancing techniques for improving MANET routing protocols and energy efficiency. We give new routing protocol

Zelikovsky, Alexander

293

QoS-aware Optimization Strategy for Security Ranking in SSL Protocol , Zhe Tang 1  

E-Print Network [OSTI]

QoS-aware Optimization Strategy for Security Ranking in SSL Protocol Fang Qi 1 , Zhe Tang 1 socket layer protocol (SSL) is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the SSL handshake protocol is the server's RSA

Wu, Jie

294

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised November 19, 1996 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol

Wagner, David

295

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised April 15, 1997 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol

Boult, Terrance E.

296

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised April 15, 1997 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol

Schneier, Bruce

297

PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks Lei Tang-MAC (Predictive-Wakeup MAC), a new energy-efficient MAC protocol based on asyn- chronous duty cycling. In PW it to X-MAC, WiseMAC, and RI-MAC, three previous energy-efficient MAC protocols, under multiple concurrent

Shihada, Basem

298

THE PERFORMANCE AND SCALABILITY OF DISTRIBUTED SHARED MEMORY CACHE COHERENCE PROTOCOLS  

E-Print Network [OSTI]

coherence protocol is often made based on implementation ease rather than performance. Most DSM machines run a fixed protocol, encoded in hardware finite state machines, so trying to compare the performance of differ- ent protocols involves comparing performance across different machines. Unfortunately

Heinrich, Mark

299

Internalising agents in CSP protocol models P.J. Broadfoot and A.W. Roscoe  

E-Print Network [OSTI]

. . An essential part of our CSP models is knowing what a given agent believes about the progress of its protocolInternalising agents in CSP protocol models P.J. Broadfoot and A.W. Roscoe Oxford University of cryptographic protocols using CSP [11] and FDR [5], often via extensions to Casper [6]. Since FDR can only check

Roscoe, Bill

300

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi the necessary features of an on-demand minimum energy routing protocol and suggests mechanisms the performance of an on-demand minimum energy routing protocol in terms of energy savings with an existing on

Brown, Timothy X.

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi of an on-demand minimum energy routing protocol and suggests mechanisms for their imple- mentation. We of an on-demand minimum energy routing protocol in terms of energy savings with an existing on-demand ad

302

4. The Bounded Re-transmission Protocol Jean-Raymond Abrial  

E-Print Network [OSTI]

1 - The Bounded Re-transmission Protocol is a file transfer protocol - This is a problem dealing to handle that problem: timers. - We would like to see how we can formalize such timers #12;The Bounded. #12;Abortion of Protocol at the Sender Site 6 - The Sender can re-transmit the same data at most M

Southampton, University of

303

6. The Bounded Re-transmission Protocol Jean-Raymond Abrial  

E-Print Network [OSTI]

- The Bounded Re-transmission Protocol is a file transfer protocol - This is a problem dealing with fault that problem: timers. - We would like to see how we can formalize such timers #12;The Bounded Retransmission that the Receiver does not confuse (?) a new data with a retransmitted one. #12;Abortion of Protocol at the Sender

Southampton, University of

304

A Sensing Error Aware MAC Protocol for Cognitive Radio Networks  

E-Print Network [OSTI]

Cognitive radios (CR) are intelligent radio devices that can sense the radio environment and adapt to changes in the radio environment. Spectrum sensing and spectrum access are the two key CR functions. In this paper, we present a spectrum sensing error aware MAC protocol for a CR network collocated with multiple primary networks. We explicitly consider both types of sensing errors in the CR MAC design, since such errors are inevitable for practical spectrum sensors and more important, such errors could have significant impact on the performance of the CR MAC protocol. Two spectrum sensing polices are presented, with which secondary users collaboratively sense the licensed channels. The sensing policies are then incorporated into p-Persistent CSMA to coordinate opportunistic spectrum access for CR network users. We present an analysis of the interference and throughput performance of the proposed CR MAC, and find the analysis highly accurate in our simulation studies. The proposed sensing error aware CR MAC p...

Hu, Donglin

2011-01-01T23:59:59.000Z

305

Single-step distillation protocol with generalized beam splitters  

SciTech Connect (OSTI)

We develop a distillation protocol for multilevel qubits (qudits) using generalized beam splitters like in the proposal of Pan et al. for ordinary qubits. We find an acceleration with respect to the scheme of Bennet et al. when extended to qudits. It is also possible to distill entangled pairs of photons carrying orbital angular momenta states that conserve the total angular momenta as those produced in recent experiments.

Martin-Delgado, M. A.; Navascues, M. [Departamento de Fisica Teorica I, Universidad Complutense, 28040 Madrid, (Spain)

2003-07-01T23:59:59.000Z

306

WLDF 311 Treefrog Study; Fall 2007 Pipe Checking Protocol  

E-Print Network [OSTI]

WLDF 311 Treefrog Study; Fall 2007 Pipe Checking Protocol: 1. Arrange time to meet/travel to study that each pipe is checked. If there is a frog(s), then: a. Take the trap off the stake without letting frogs). If the frogs don't come out, put some more water in the pipe, swirl and "swoosh" them out. b. Pick up each frog

Johnson, Matthew

307

Building America 2014 House Simulation Protocols | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in Review: Top Five EEREDepartmentFebruary 4,Brent Nelson About2014 House Simulation Protocols

308

Superior Energy Performance Certification Protocol | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: AlternativeEnvironment,Institutes and1 Special Report:StepRenewable EnergyofCertification Protocol

309

Protocols of radiocontaminant air monitoring for inhalation exposure estimates  

SciTech Connect (OSTI)

Monitoring the plutonium and americium particle emissions from soils contaminated during atmospheric nuclear testing or due to accidental releases is important for several reasons. First, it is important to quantify the extent of potential human exposure from inhalation of alpha-emitting particles, which is the major exposure pathway from transuranic radionuclides. Second, the information provided by resuspension monitoring is the basis of criteria that determine the target soil concentrations for management and cleanup of contaminated soil sites. There are other radioactive aerosols, such as the fission products (cesium and strontium) and neutron-activation products (europium isotopes), which may be resuspended and therefore necessary to monitor as well. This Standard Protocol (SP) provides the method used for radiocontaminant air monitoring by the Health and Ecological Assessment Division (formerly Environmental Sciences Division), Lawrence Livermore National Laboratory, as developed and tested at Nevada Test Site (NTS) and in the Marshall Islands. The objective of this SP is to document the applications and methods of monitoring of all the relevant variables. This protocol deals only with measuring air concentrations of radionuclides and total suspended particulates (TSP, or {open_quotes}dust{close_quotes}). A separate protocol presents the more difficult measurements required to determine transuranic aerosol emission rates, or {open_quotes}resuspension rate{close_quotes}.

Shinn, J.H.

1995-09-01T23:59:59.000Z

310

Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems  

SciTech Connect (OSTI)

The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

2014-06-01T23:59:59.000Z

311

Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1  

E-Print Network [OSTI]

Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1 Fish Tank Water Changing Fry and tanks: 1. Remove air stone & lid, then take tank from shelf and place fry to make sure it matches # on tank label. 4. Use small (air stone size) plastic tubing to siphon

Langerhans, Brian

312

Case Studies  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone6Energy,MUSEUM DISPLAYCareers TheEmail AnnouncementsCase Studies

313

FOIA Cases  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomentheATLANTA, GA5 &of Energy memoCityThe attachedDOE O 413.3Bfoia-cases

314

Case Study  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' ResearchTheMarketing,Energy-ChevronSeveral salesCarolyn L. Huntoon -Case Study M2M

315

Efficient protocols for deterministic secure quantum communication using GHZ-like states  

E-Print Network [OSTI]

Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols can be modified to an equivalent but more efficient protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed in detail and are critically compared with the existing protocols. It is shown that the proposed protocols are highly efficient. It is also shown that all the physical systems where dense coding is possible can be used to design maximally efficient protocol of DSQC and QSDC. Further, it is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols of the present kind. We have shown that there exist a large class of quantum state which can be used to design maximally efficient DSQC and QSDC protocols of the present kind. It is further, observed that maximally efficient QSDC protocols are more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate.

Anindita Banerjee; Anirban Pathak

2012-01-18T23:59:59.000Z

316

Addendum to the Building America House Simulation Protocols  

SciTech Connect (OSTI)

As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

2012-12-01T23:59:59.000Z

317

Generic protocol for environmental audits at federal facilities  

SciTech Connect (OSTI)

The Generic Protocol is a supplement to earlier efforts by EPA to provide technical assistance to Federal agencies on environmental auditing. EPA`s Office of Federal Activities (OFA) issued the Federal Facility Compliance Strategy (referred to as the `Yellow Book`), prepared in 1984 and revised in 1988, as a framework for EPA`s media programs to follow to ensure that Federal facilities are fully integrated into Federal and State compliance monitoring and enforcement activities. The policy encourages Federal agencies to voluntarily develop comprehensive auditing programs to ensure environmental compliance.

NONE

1989-08-01T23:59:59.000Z

318

The two phase commit protocol simulation and analysis  

E-Print Network [OSTI]

IDENTIFICATION II. A Failures in a. Distributed DBMS 10 HI ATOIYIIC COMMITMENT HI. A Uncertainty Period . HI. B Blocking HI C Independent Recovery 17 17 IU THE TWO PHASE COMMIT PROTOCOL V111 CHAPTER Pa, ge IV. A Timeout Actions 21 IV. B Recovery..., 55 LIST OF TABLES TABLE Page Comparison of three versions of the two phase comniit CHAPTER I INTRODUCTION A database management system(DBMS) consists of a collection of interrelated, persis- tent data. and a set of programs to access this data...

Bokil, Anupam

1993-01-01T23:59:59.000Z

319

Algorithms, Protocols & Systems for Remote Observation Using Networked Robotic Cameras  

E-Print Network [OSTI]

assist in waste cleanup using Point- and-Direct (PAD) commands. Users point to cleanup locations in a shared image and a robot excavates each location in turn. Recent developments in MOSR systems can be found in [26,27]. In [27] Goldberg et al. propose...ALGORITHMS, PROTOCOLS AND SYSTEMS FOR REMOTE OBSERVATION USING NETWORKED ROBOTIC CAMERAS A Dissertation by NI QIN Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR...

Qin, Ni

2010-01-16T23:59:59.000Z

320

Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in3.pdfEnergyDepartment ofOil'sofAppendix B,Protocol for Addressing Induced Seismicity

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Climate VISION: Private Sector Initiatives: Lime: GHG Inventory Protocols  

Office of Scientific and Technical Information (OSTI)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformation In closing,-- Energy, science,Links - TechnicalGHGGHG Inventory Protocols

322

Verifying a Simplified Fuel Oil Flow Field Measurement Protocol  

SciTech Connect (OSTI)

The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

Henderson, H.; Dentz, J.; Doty, C.

2013-07-01T23:59:59.000Z

323

"The cream on the pudding..." : An analysis of the Clean Development Mechanism in the Indian wind power sector.  

E-Print Network [OSTI]

??The thesis examines the effects of the Clean Development Mechanism (CDM), a flexible mechanism under the Kyoto Protocol, on the Indian wind power sector. Indian… (more)

Turkanovic, Zlata

2010-01-01T23:59:59.000Z

324

Nuclear Energy Governance and the Politics of Social Justice: Technology, Public Goods, and Redistribution in Russia and France  

E-Print Network [OSTI]

Essentials, March 2007. OECD/Nuclear Energy Agency. "Nuclear Energy and the Kyoto Protocol"OECD/IEA Report OECD/Nuclear Energy Agency. "Nuclear Energy

Grigoriadis, Theocharis N

2009-01-01T23:59:59.000Z

325

E-Print Network 3.0 - asia carbon storage Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy ? Massimo Tavoni1... ., and Dev. Economics, Ohio State University While carbon sequestration was included in the Kyoto Protocol Source: Ris National Laboratory...

326

Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

Many energy-aware routing protocols have been proposed for wireless sensor networks. Most of them are only energy savers and do not take care about energy balancing. The energy saver protocols try to decrease the energy consumption of the network as a whole; however the energy manager protocols balance the energy consumption in the network to avoid network partitioning. This means that energy saver protocols are not necessarily energy balancing and vice versa. However, the lifetime of wireless sensor network is strictly depending on energy consumption; therefore, energy management is an essential task to be considered. This paper proposes an energy aware routing protocol, named FEAR, which considers energy balancing and energy saving. It finds a fair trade-off between energy balancing and energy saving by fuzzy set concept. FEAR routing protocol is simulated and evaluated by Glomosim simulator.

Ahvar, Ehsan; Piran, Mohammad Jalil

2011-01-01T23:59:59.000Z

327

Building America Indoor Temperature and Humidity Measurement Protocol  

SciTech Connect (OSTI)

When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every 4 years the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the 'average occupant' in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

Engebrecht-Metzger, C.; Norton, P.

2014-02-01T23:59:59.000Z

328

International Workshops to Foster Implementation of the IAEA Additional Protocol  

SciTech Connect (OSTI)

A country’s adherence to the International Atomic Energy Agency’s (IAEA) Additional Protocol is an important statement to the world of that country’s commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEA’s regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

2003-07-14T23:59:59.000Z

329

Robustness of two-way quantum communication protocols against Trojan horse attack  

E-Print Network [OSTI]

We discuss the robustness of two-way quantum communication protocols against Trojan horse attack and introduce a novel attack, delay-photon Trojan horse attack. Moreover, we present a practical way for two-way quantum communication protocols to prevent the eavesdropper from stealing the information transmitted with Trojan horse attacks. It means that two-way quantum communication protocols is also secure in a practical application.

Fu-Guo Deng; Ping Zhou; Xi-Han Li; Chun-Yan Li; Hong-Yu Zhou

2005-08-23T23:59:59.000Z

330

Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, 6-27-13.

2006-12-15T23:59:59.000Z

331

Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, dated 6-27-13, cancels DOE O 142.1A. Certified 12-3-14.

2006-12-15T23:59:59.000Z

332

A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes  

Broader source: Energy.gov [DOE]

Summary of LANL?s testing protocol work presented to the High Temperature Membrane Working Group Meeting, Orlando FL, October 17, 2003

333

E-Print Network 3.0 - aware routing protocol Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for Mobile Ad Hoc Networks Morteza Maleki, Karthik Dantu... the network lifetime. Simulation results show that the proposed power-aware source routing protocol has... . The...

334

E-Print Network 3.0 - acid protocols handbook Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to follow a protocol other than Standard Methods, i.e., to report negative acidities as zero... Net alkalinity and net acidity 2: Practical considerations ... Source: Kirby, Carl...

335

E-Print Network 3.0 - area adapted protocol Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Support for Flexible, Function-Based Communication Systems Douglas C. Schmidt Burkhard Stiller Ahmed Tantawy Summary: applications to adaptively update protocol mechanisms and...

336

addition-cambridge trial protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

337

anesthesia gas-guided protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

338

On the group theoretic structure of a class of quantum dialogue protocols  

E-Print Network [OSTI]

Intrinsic symmetry of the existing protocols of quantum dialogue are explored. It is shown that if we have a set of mutually orthogonal $n$-qubit states {\

Chitra Shukla; Vivek Kothari; Anindita Banerjee; Anirban Pathak

2012-03-27T23:59:59.000Z

339

Development and quantitative analyses of a universal rRNA-subtraction protocol for microbial metatranscriptomics  

E-Print Network [OSTI]

Metatranscriptomes generated by pyrosequencing hold significant potential for describing functional processes in complex microbial communities. Meeting this potential requires protocols that maximize mRNA recovery by ...

Stewart, Frank J.

340

Breaking and making quantum money: toward a new quantum cryptographic protocol  

E-Print Network [OSTI]

Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge. There are no secure public-key quantum money schemes in the literature; as we show in this paper, the only previously published scheme [1] is insecure. We introduce a category of quantum money protocols which we call collision-free. For these protocols, even the bank cannot prepare multiple identical-looking pieces of quantum money. We present a blueprint for how such a protocol might work as well as a concrete example which we believe may be insecure.

Andrew Lutomirski; Scott Aaronson; Edward Farhi; David Gosset; Avinatan Hassidim; Jonathan Kelner; Peter Shor

2009-12-21T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

26AUTUMN 2014 Kyoto University Newsletter  

E-Print Network [OSTI]

International Offices: The European Center in Heidelberg and the ASEAN Center in Bangkok World-renowned KU

Takada, Shoji

342

KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS  

E-Print Network [OSTI]

Integrated Human Studies/ Human and Environmental Studies 127 112 140 155 - - 70 46 Energy Science - - 128 1 Brazil 18 Paraguay 1 Uruguay 1 Argentine 5 Chile 4 Bolivia 1 Peru 5 Ecua

Takada, Shoji

343

Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks  

SciTech Connect (OSTI)

We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

344

IBM NJE protocol emulator for VAX/VMS  

SciTech Connect (OSTI)

Communications software has been written at Argonne National Laboratory to enable a VAX/VMS system to participate as an end-node in a standard IBM network by emulating the Network Job Entry (NJE) protocol. NJE is actually a collection of programs that support job networking for the operating systems used on most large IBM-compatible computers (e.g., VM/370, MVS with JES2 or JES3, SVS, MVT with ASP or HASP). Files received by the VAX can be printed or saved in user-selected disk files. Files sent to the network can be routed to any node in the network for printing, punching, or job submission, as well as to a VM/370 user's virtual reader. Files sent from the VAX are queued and transmitted asynchronously to allow users to perform other work while files are awaiting transmission. No changes are required to the IBM software.

Engert, D.E.

1981-01-01T23:59:59.000Z

345

A Zero Knowledge Protocol For Nuclear Warhead Verification  

SciTech Connect (OSTI)

The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

Glaser, Alexander [Princeton, Univ., NJ (United States). Program on Science and Global Security] [Princeton, Univ., NJ (United States). Program on Science and Global Security; Goldston, Robert J. [Princeton Plasma Physics Lab., Princeton, NJ (United States)] [Princeton Plasma Physics Lab., Princeton, NJ (United States)

2014-03-14T23:59:59.000Z

346

Scalable Energy Efficient Location Aware Multicast Protocol for MANET (SEELAMP)  

E-Print Network [OSTI]

Multicast plays an important role in implementing the group communications in bandwidth scarce multihop mobile ad hoc networks. However, due to the dynamic topology of MANETs it is very difficult to build optimal multicast trees and maintaining group membership, making even more challenging to implement scalable and robust multicast in Mobile Ad hoc Networks (MANET). A scalable and energy efficient location aware multicast algorithm, called SEELAMP, for mobile ad hoc networks is presented in the paper that is based on creation of shared tree using the physical location of the nodes for the multicast sessions. It constructs a shared bi-directional multicast tree for its routing operations rather than a mesh, which helps in achieving more efficient multicast delivery. The algorithm uses the concept of small overlapped zones around each node for proactive topology maintenance with in the zone. Protocol depends on the location information obtained using a distributed location service, which effectively reduces th...

Kamboj, Pariza

2010-01-01T23:59:59.000Z

347

Quality Assurance Protocol for AFCI Advanced Structural Materials Testing  

SciTech Connect (OSTI)

The objective of this letter is to inform you of recent progress on the development of advanced structural materials in support of advanced fast reactors and AFCI. As you know, the alloy development effort has been initiated in recent months with the procurement of adequate quantities of the NF616 and HT-UPS alloys. As the test alloys become available in the coming days, mechanical testing, evaluation of optimizing treatments, and screening of environmental effects will be possible at a larger scale. It is therefore important to establish proper quality assurance protocols for this testing effort in a timely manner to ensure high technical quality throughout testing. A properly implemented quality assurance effort will also enable preliminary data taken in this effort to be qualified as NQA-1 during any subsequent licensing discussions for an advanced design or actual prototype. The objective of this report is to describe the quality assurance protocols that will be used for this effort. An essential first step in evaluating quality protocols is assessing the end use of the data. Currently, the advanced structural materials effort is part of a long-range, basic research and development effort and not, as yet, involved in licensing discussions for a specific reactor design. After consultation with Mark Vance (an ORNL QA expert) and based on the recently-issued AFCI QA requirements, the application of NQA-1 quality requirements will follow the guidance provided in Part IV, Subpart 4.2 of the NQA-1 standard (Guidance on Graded Application of QA for Nuclear-Related Research and Development). This guidance mandates the application of sound scientific methodology and a robust peer review process in all phases, allowing for the data to be qualified for use even if the programmatic mission changes to include licensing discussions of a specific design or prototype. ORNL has previously implemented a QA program dedicated to GNEP activities and based on an appropriately graded application of NQA-1 requirements at the site. The current program is being revised to incorporate changes imposed through the recently revised AFCI Technical Integration Office QA requirements. Testing conducted under the AFCI QA program for the advanced structural materials effort shall incorporate the following quality assurance expectations: (1) personnel are adequately trained to perform assigned work; (2) activities are controlled to ensure consistency of results; (3) records necessary to substantiate how the work was performed are maintained (dedicated laboratory notebooks will be used); (4) the pedigree and traceability of the various tested materials are maintained throughout the described processes using consistent sample numbering and adequate record keeping; (5) equipment with the potential to affect the quality of the planned work is calibrated and maintained in accordance with applicable operating requirements. In addition, all reporting or related dissemination by ORNL personnel of the results of the work described in this subcontract shall be conducted in accordance with the requirements described or referenced in the ORNL Standards Based Management System subject area entitled Scientific and Technical Information. Reporting or publications at other institutions will be conducted in accordance with the requirements of that institution. Successful implementation of these protocols will provide a sound basis for future decisions and research. In addition, these steps will also help ensure that results can also be applied to licensing discussions at a future date.

Busby, Jeremy T [ORNL

2009-05-01T23:59:59.000Z

348

Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software  

SciTech Connect (OSTI)

This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

2013-09-06T23:59:59.000Z

349

ANJE5.40. VAX VMS IBM NJE Protocol Emulator  

SciTech Connect (OSTI)

The Argonne NJE (Network Job Entry) communications software allows VAX/VMS systems to participate in a standard IBM peer-to-peer network and communicate with IBM computers with the VM/RSCS, MVS/JES2, MVS/JES3, or VSE/POWER operating systems or with CDC computers having the NJEF product by emulating the NJE protocol. The emulator has limited routing capability and forwards received files and messages to other nodes connected to it via DECnet. DECnet client nodes implementing the NJE system receive full NJE user services via the routing node including access to BITnet. All member nodes of VAX clusters involved in the NJE domain receive full NJE services as well. The emulator`s capabilities include immediate transfer of commands and messages and queued transfer of standard print and punch files. Jobs can be sent from VMS for execution at any node with batch services. The emulator receives files into user designated subdirectories. Two applications are distributed with ANJE. One is an RFC822-conforming interface that enables users of the VMS Mail Utility and either VM/SP NOTE or the IBM PROFS mail to exchange electronic mail. VMS Mail Utility users can also exchange electronic mail with users of BITnet. The other application is an emulator for the IBM Bulk Data Transfer product and IBM NETDATA protocol that enables transmission and reception of arbitrary sequential files with or without character translation. Data conversion subroutines are provided to aid users in converting their data from the binary format of one machine to that of the other.

Raffenetti, R.C.; Osudar, J. [Argonne National Lab., IL (United States)

1990-06-01T23:59:59.000Z

350

Optimal Save-Then-Transmit Protocol for Energy Harvesting Wireless Transmitters  

E-Print Network [OSTI]

In this paper, the design of a wireless communication device relying exclusively on energy harvesting is considered. Due to the inability of rechargeable energy sources to charge and discharge at the same time, a constraint we term the energy half-duplex constraint, two rechargeable energy storage devices (ESDs) are assumed so that at any given time, there is always one ESD being recharged. The energy harvesting rate is assumed to be a random variable that is constant over the time interval of interest. A save-then-transmit (ST) protocol is introduced, in which a fraction of time {\\rho} (dubbed the save-ratio) is devoted exclusively to energy harvesting, with the remaining fraction 1 - {\\rho} used for data transmission. The ratio of the energy obtainable from an ESD to the energy harvested is termed the energy storage efficiency, {\\eta}. We address the practical case of the secondary ESD being a battery with {\\eta} < 1, and the main ESD being a super-capacitor with {\\eta} = 1. The optimal save-ratio that m...

Luo, Shixin; Lim, Teng Joon

2012-01-01T23:59:59.000Z

351

Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals  

E-Print Network [OSTI]

Most experimental realizations of quantum key distribution are based on the Bennett-Brassard 1984 (so-called BB84) protocol. In a typical optical implementation of this scheme, the sender uses an active source to produce the required BB84 signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental setups operating at high transmission rates. Passive schemes might also be more robust against side-channel attacks than active sources. Typical passive devices involve parametric down-conversion. In this paper, we show that both coherent light and practical single photon sources are also suitable for passive generation of BB84 signal states. Our method does not require any external-driven element, but only linear optical components and photodetectors. In the case of coherent light, the resulting key rate is similar to the one delivered by an active source. When the sender uses practical single photon sources, however, the distance covered by a passive transmitter might be longer than the one of an active configuration.

Marcos Curty; Xiongfeng Ma; Hoi-Kwong Lo; Norbert Lütkenhaus

2010-09-20T23:59:59.000Z

352

A Formal Approach to Distance-Bounding RFID Protocols  

E-Print Network [OSTI]

Kasper2 Cristina Onete1 1 Darmstadt University of Technology & CASED, Germany www.minicrypt.de 2 Fraunhofer Institute for Secure Information Technology (SIT) and CASED, Germany Abstract. Distance one or two such threats, but no rigorous cryptographic security models --nor clean security proofs

353

Intelligent Network-Layer Management for Wireless Mesh Networks: Dynamic Tuning of a Reactive Routing Protocol  

E-Print Network [OSTI]

1 Intelligent Network-Layer Management for Wireless Mesh Networks: Dynamic Tuning of a Reactive Routing Protocol Dan Marconett, Minsoo Lee, Xiaohui Ye and S. J. Ben Yoo Dept. of Electrical and Computer learning to dynamically modify reactive routing protocol parameters in real-time, to better facilitate

Kolner, Brian H.

354

Reactive Protocols for Aircraft Electric Power Distribution Huan Xu, Ufuk Topcu, and Richard M. Murray  

E-Print Network [OSTI]

Reactive Protocols for Aircraft Electric Power Distribution Huan Xu, Ufuk Topcu, and Richard M. Murray Abstract-- The increasing complexity of electric power sys- tems leads to integration and verification challenges. We consider the problem of designing a control protocol for the aircraft electric

Murray, Richard M.

355

Energy-Ecient Initialization Protocols for Radio Networks with no Collision Detection  

E-Print Network [OSTI]

Energy-EĂ?cient Initialization Protocols for Radio Networks with no Collision Detection #3; K been initialized in advance. The main contribution of this work is to propose energy- e not be possible while on mission, we are interested in designing protocols that are highly energy

Nakano, Koji

356

LLaannggeerrhhaannss LLaabb PPrroottooccoollss Chemical Waste Disposal Protocol.docx pg 1 of 1  

E-Print Network [OSTI]

LLaannggeerrhhaannss LLaabb PPrroottooccoollss Chemical Waste Disposal Protocol.docx pg 1 of 1 Chemical Waste Disposal Protocol For Chemical Waste Pick-Up: 1. Log on to http://www.ncsu.edu/ehs. 2. Click waste item being submitted. 7. Fill out and affix a Hazardous Waste label, from the drawer labeled

Langerhans, Brian

357

The evaluation of an analytical protocol for the determination of substances in waste for hazard classification  

E-Print Network [OSTI]

1 The evaluation of an analytical protocol for the determination of substances in waste for hazard The classification of waste as hazardous could soon be assessed in Europe using largely the hazard properties of its knowledge of the component constituents of a given waste will therefore be necessary. An analytical protocol

Boyer, Edmond

358

An analytical protocol for the knowledge of waste by Pierre HENNEBERT1  

E-Print Network [OSTI]

An analytical protocol for the knowledge of waste by substances Pierre HENNEBERT1 , Arnaud PAPIN2 1 Technologique ALATA, BP n°2, 60550 Verneuil en Halatte, France. Abstract The hazardousness of waste could samples of different industrial wastes have been tested following (with differences) this protocol by two

Paris-Sud XI, Université de

359

Improving TCP Throughput over Lossy Links Using Protocol-Level Speculations  

E-Print Network [OSTI]

Improving TCP Throughput over Lossy Links Using Protocol-Level Speculations Haowei Bai Honeywell@ou.edu Abstract-- The degradation of Transport Control Protocol (TCP) throughput in networks with lossy links. This is very similar to processor performance degradation due to control hazards in CPU design. First, two

Minnesota, University of

360

Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland ................................................................................................................2 7. Guidance for testing ANSI N42.42 data format requirements ................................2 8..........................................................................................................3 #12;TEST AND EVALUATION PROTOCOL TEP NO. N42.48 PREPARED BY: DIV682 TITLE: Spectroscopic Personal

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Protocol for GL spin columns p10, 200ug capacity. p200, 600ug capacity.  

E-Print Network [OSTI]

Protocol for GL spin columns p10, 200ug capacity. p200, 600ug capacity. Glscienceinc.com product tips (exact protocol from GL Sciences): 1. Bring samples up in 65 uL of Buffer A. 2. Condition a. Add

Richardson, David

362

Hector is an Energy effiCient Tree-based Optimized Routing protocol for wireless networks  

E-Print Network [OSTI]

Hector is an Energy effiCient Tree-based Optimized Routing protocol for wireless networks Nathalie geographic locations. We propose HECTOR, a hybrid energy efficient tree-based optimized routing protocol, based on two sets of virtual coordinates. One set is based on rooted tree coordinates, and the other

Stojmenovic, Ivan

363

EHS-Net Tomato Handling Study EHS-Net Tomato Handling Study Protocol  

E-Print Network [OSTI]

EHS-Net Tomato Handling Study 1 EHS-Net Tomato Handling Study Protocol I. Project Overview Title EHS-Net Tomato Handling Study Protocol Summary Few studies have examined in detail the nature Health Specialists Network (EHS-Net) special study. EHS- Net is a collaboration involving the Centers

364

Energy-Aware Tag Anti-Collision Protocols for RFID Systems Vinod Namboodiri, Lixin Gao  

E-Print Network [OSTI]

provide significant energy savings when compared to the existing Query Tree protocol while sharingEnergy-Aware Tag Anti-Collision Protocols for RFID Systems Vinod Namboodiri, Lixin Gao Department of Electrical and Computer Engineering University of Massachusetts at Amherst Email: {vnambood, lgao

Namboodiri, Vinod

365

A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks  

E-Print Network [OSTI]

A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks H. Yang, F. Ye and B. Sikdar a "Dynamic Query-tree Energy Balancing" (DQEB) protocol to dynamically adjust the tree structure and minimize networks. In [15] it has been shown that the minimum- energy broadcast tree problem is NP

Sikdar, Biplab

366

Optimal Decentralized Protocol for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low  

E-Print Network [OSTI]

Abstract-- Motivated by the power-grid-side challenges in the integration of electric vehicles, we proposeOptimal Decentralized Protocol for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low a decentralized protocol for negotiating day-ahead charging schedules for electric vehicles. The overall goal

Low, Steven H.

367

SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks Venugopalan Ramasubramanian@ece.cornell.edu, egs@cs.cornell.edu} ABSTRACT A central challenge in ad hoc networks is the design of rout- ing--Routing Protocols General Terms Design, Performance Keywords Hybrid, Adaptive, Ad Hoc Networks This work

Keinan, Alon

368

Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks  

E-Print Network [OSTI]

Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks Suyang Ju Submitted to the graduate degree program in Electrical Engineering & Computer Science and the Graduate Faculty of the University of Kansas School...: Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks Dissertation Committee: _____________________________________ Dr. Joseph B. Evans, Advisor Professor, EECS _____________________________________ Dr. Victor Frost...

Ju, Suyang

2011-12-31T23:59:59.000Z

369

Comparison of two Self-Organization and Hierarchical Routing Protocols for Ad Hoc Networks  

E-Print Network [OSTI]

Comparison of two Self-Organization and Hierarchical Routing Protocols for Ad Hoc Networks Bet. In this article, we compare two self-organization and hierarchical rout- ing protocols for ad hoc networks-organization and hierarchical routing in ad hoc networks. keywords: ad hoc networks, hierarchical routing, DHT, comparison

Paris-Sud XI, Université de

370

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols  

E-Print Network [OSTI]

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols Nuno Neves W. Kent that allows the rapid testing of checkpoint protocols with standard benchmarks. To achieve this goal, RENEW evaluated using the RENEW envi- ronment with SPEC and NAS benchmarks on a network of workstations connected

Neves, Nuno

371

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols  

E-Print Network [OSTI]

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols Nuno Neves W. Kent that allows the rapid testing of checkpoint protocols with standard benchmarks. To achieve this goal, RENEW evaluated using the RENEW envi­ ronment with SPEC and NAS benchmarks on a network of workstations connected

Neves, Nuno

372

Tracing Eye Movement Protocols with Cognitive Process Models Dario D. Salvucci (dario+@cs.cmu.edu)  

E-Print Network [OSTI]

1 Tracing Eye Movement Protocols with Cognitive Process Models Dario D. Salvucci (dario+@cmu.edu) Department of Psychology; Carnegie Mellon University Pittsburgh, PA 15213 Abstract In using eye movements to develop cognitive models, researchers typically analyze eye movement protocols with aggregate measures

Salvucci, Dario D.

373

Fish Community Assessment Rapid Bioassessment Protocol V --Fish (EPA 1989, 1999).......................................................693  

E-Print Network [OSTI]

APPENDIX C Fish Community Assessment CONTENTS Rapid Bioassessment Protocol V -- Fish (EPA 1989 ......................................................................................................................................707 RAPID BIOASSESSMENT PROTOCOL V -- FISH (EPA 1989, 1999) The following are excerpts from U.S. EPA, but focuses on fish. Electrofishing, the most common technique used by agencies that monitor fish communities

Pitt, Robert E.

374

BEAM: A Burst-Aware Energy-Efficient Adaptive MAC Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

BEAM: A Burst-Aware Energy-Efficient Adaptive MAC Protocol for Wireless Sensor Networks Markus|wagen|braun|dolfus@iam.unibe.ch Abstract--Low latency for packet delivery, high throughput, good reactivity, and energy-efficient operation that optimizations for energy-efficiency and performance parameters are contradicting, most MAC protocols proposed

Braun, Torsten

375

ERTP: Energy-Efficient and Reliable Transport Protocol for Data Streaming in Wireless Sensor  

E-Print Network [OSTI]

ERTP: Energy-Efficient and Reliable Transport Protocol for Data Streaming in Wireless Sensor applications in Wireless Sensor Networks require re- liable and energy-efficient transport protocols [17] [18 of minutes or hours), energy-efficiency is. Long-term operation and reliable delivery of the sensed data

New South Wales, University of

376

On the Adaptivity of today's Energy-Efficient MAC Protocols under varying Traffic Conditions  

E-Print Network [OSTI]

On the Adaptivity of today's Energy-Efficient MAC Protocols under varying Traffic Conditions typically accounts for a major portion of a WSN node's power consumption, researchers have proposed Energy-Efficient. Such protocols typically trade off energy-efficiency versus classical quality of service parameters (e

Braun, Torsten

377

Utility Accrual Real-Time Resource Access Protocols with Assured Individual Activity Timeliness Behavior  

E-Print Network [OSTI]

Utility Accrual Real-Time Resource Access Protocols with Assured Individual Activity Timeliness Behavior Abstract We present a class of utility accrual resource access protocols for real-time embedded systems. The proto- cols consider application activities that are subject to time/utility function time

Ravindran, Binoy

378

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS  

E-Print Network [OSTI]

1 DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudainayagam of functioning and available resources. In this paper, we propose a Device and Energy Aware Routing protocol-powered nodes and battery-powered nodes. We embed both the energy and the device awareness into the routing

Hou, Y. Thomas

379

GEAMS: A Geographic Energy-Aware Multipath Stream-based Routing Protocol for WMSNs  

E-Print Network [OSTI]

GEAMS: A Geographic Energy-Aware Multipath Stream- based Routing Protocol for WMSNs Samir Medjiah Energy-Aware Multipath Stream-based (GEAMS) routing protocol for WMSNs. GEAMS routing decisions are made transmission in WMSNs. Keywords -- WSN, WMSN, Geographic Routing, Multipath Routing, Energy Aware routing... I

Paris-Sud XI, Université de

380

AGEM: Adaptive Greedy-Compass Energy-aware Multipath Routing Protocol for WMSNs  

E-Print Network [OSTI]

AGEM: Adaptive Greedy-Compass Energy-aware Multipath Routing Protocol for WMSNs Samir Medjiah--This paper presents an Adaptive Greedy-Compass Energy-aware Multipath (AGEM), a novel routing protocol. Index terms--WSN, WMSN, Geographic Routing, Angle Routing Multipath Routing, Energy Aware routing... I

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

The Municipal Solid Waste Landfill as a Source of Montreal Protocol-restricted Halocarbons in the  

E-Print Network [OSTI]

The Municipal Solid Waste Landfill as a Source of Montreal Protocol-restricted Halocarbons of Geophysics #12;2 #12;The Municipal Solid Waste Landfill as a Source of Montreal Protocol municipal solid waste (MSW) landfills. With several hundred MSW landfills in both the US and UK, estimating

382

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks  

E-Print Network [OSTI]

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks François Ingelrest.Mitton,David.Simplot}@lifl.fr Abstract--We present a turnover based adaptive HELLO protocol (TAP), which enables nodes in mobile networks to dynamically adjust their HELLO messages frequency depending on the current speed of nodes. To the best of our

Paris-Sud XI, Université de

383

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

Tygar, Doug

384

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME  

E-Print Network [OSTI]

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

385

METHODOLOGY Open Access Protocol: A simple phenol-based method for 96-well  

E-Print Network [OSTI]

Arabidopsis seedlings. This prompted us to develop a high-throughput RNA extraction protocol (HTP96) adapted. Conclusion: The development of the HTP96 protocol has vastly increased our sample throughput, allowing us in many labs, and develop an effective high-throughput gene expression platform. We propose that the HTP96

Howard, Martin

386

An Opportunistic Virtual MISO (OVM) Protocol for Multi-hop Wireless Networks  

E-Print Network [OSTI]

1 An Opportunistic Virtual MISO (OVM) Protocol for Multi-hop Wireless Networks Van Nguyen-utilized and performance is not maximized. In this work, we propose the Opportunistic Virtual MISO (OVM) protocol for multi-hop wireless networks. OVM combines virtual MISO (using space- time block codes) and cooperative diversity

Perkins, Dmitri

387

Specification and Analysis of the AER/NCA Active Network Protocol Suite in  

E-Print Network [OSTI]

Specification and Analysis of the AER/NCA Active Network Protocol Suite to the specification and analy- sis of the AER/NCA suite of active network multicast protocol compo- nents, AER/NCA poses challenging new problems for its formal specification and analysis. Real-Time Maude

Ă?lveczky, Peter Csaba

388

Algorithms for Categorizing Multiprocessor Communication Under Invalidate and UpdateBased Coherence Protocols \\Lambda  

E-Print Network [OSTI]

of useless traffic entailed by each coherence protocol. Under an invalidate­based protocol, our algorithms and Technology---HighPerformance Computing, Software Science and Tech­ nology program, ARPA Order no. 8930 to intro­ duce useless communication due to a mismatch between the hardware unit of coherence and the data

Bianchini, Ricardo

389

State Pruning for Test Vector Generation for a Multiprocessor Cache Coherence Protocol  

E-Print Network [OSTI]

fist search (BFS) to generate the frontier state, which is similar to [6]. Then each DFS search usesState Pruning for Test Vector Generation for a Multiprocessor Cache Coherence Protocol Ying Chen coherence protocol. Generating traces for system verification using a model checker and then using

Minnesota, University of

390

The past, present and future of protocol checking with CSP and FDR  

E-Print Network [OSTI]

AVoCS 2006 The past, present and future of protocol checking with CSP and FDR Bill Roscoe1 Oxford of these meetings was the development of the CSP model of cryptographic protocols, following Gavin Lowe's discovery the particular advantages of using a process algebra, and CSP in particular, for modelling cryptoprotocols

Paris-Sud XI, Université de

391

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network [OSTI]

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

392

Off-line Micro-payment Protocol for Multiple Vendors in Mobile Commerce Xiaoling Dai1  

E-Print Network [OSTI]

to be enhanced for existing micro- payment approaches. Also, with the proliferation of wireless networks, mobile] and the NetPay micro-payment protocol with the client- side e-wallet in the client-server networks. WeOff-line Micro-payment Protocol for Multiple Vendors in Mobile Commerce Xiaoling Dai1 Oluwatomi

Grundy, John

393

A Tree-based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming  

E-Print Network [OSTI]

1 A Tree-based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming a Tree-based Forward Digest Protocol (TFDP) to verify data integrity in distributed media streaming the effectiveness of TFDP. Keywords: Data integrity, message digest, and media streaming. I. INTRODUCTION Consider

Xu, Dongyan

394

Assessing Rural Transformations: Piloting a Qualitative Impact Protocol in Malawi and Ethiopia  

E-Print Network [OSTI]

Assessing Rural Transformations: Piloting a Qualitative Impact Protocol in Malawi and Ethiopia a Qualitative Impact Protocol in Malawi and Ethiopia James Copestake and Fiona Remnant Abstract This paper impact evaluation of NGO sponsored rural development projects in Malawi and Ethiopia. Two of the projects

Burton, Geoffrey R.

395

Reducing the Replacement Overhead on COMA Protocols for Workstation-Based Architectures  

E-Print Network [OSTI]

Reducing the Replacement Overhead on COMA Protocols for Workstation-Based Architectures Diego R discuss the behavior of the replacement mechanism of well-known COMA protocols applied to a loosely replacement mecha- nism in order to select the destination node of a replacement transaction without

Llanos, Diego R.

396

Environmental Challenges of Climate-Nuclear Fusion: A Case Study of India  

E-Print Network [OSTI]

kyoto. 140. lEA, WORLD ENERGY OUTLOOK 191, 191 (2007) [annual publication, World Energy Outlook (WEO), that nuclearENERGY AGENCY [IEA], WORLD ENERGY OUTLOOK 208 fig.12.2 (

Badrinarayan, Deepa

2011-01-01T23:59:59.000Z

397

Comparison of Digestion Protocols for Microgram Quantities of Enriched Protein Samples  

SciTech Connect (OSTI)

Standard biochemical techniques that are used for protein enrichments, such as affinity isolation and density gradient centrifugation, frequently yield high nanogram to low microgram quantities at a significant expenditure of resources and time. The characterization of selected protein enrichments by the "shotgun" mass spectrometry approach is often compromised by the lack of effective and efficient in-solution proteolysis protocols specifically tailored for these small quantities of proteins. This study compares the results of five different digestion protocols that were applied to 2.5 g portions of protein isolates from two disparate sources: Rhodopseudomonas palustris 70S ribosomal proteins, and Bos taurus microtubule-associated proteins (MAPs). Proteolytic peptides produced according to each protocol in each type of protein isolate were analyzed by one-dimensional liquid chromatography-tandem mass spectrometry (LC-MS/MS). The effectiveness of each digestion protocol was assessed on the basis of three parameters: number of peptide identifications, number of protein identifications, and sequence coverage. The two protocols using a solvent containing 80% acetonitrile (CH3CN) for trypsin digestions performed as well as, and in some instances better than, protocols employing other solvents and chaotropes in both types of protein isolates. A primary advantage of the 80% CH3CN protocol is that it requires fewer sample manipulation steps.

Hervey, IV, William Judson [ORNL; Strader, Michael B [ORNL; Strader, Michael Brad [National Institutes of Health; Hurst, Gregory {Greg} B [ORNL

2007-01-01T23:59:59.000Z

398

JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 13, NO. 3, JUNE 2011 257 Soft-Decision-and-Forward Protocol for Cooperative  

E-Print Network [OSTI]

-decision-and-forward (SDF) with multiple antennas in each node is introduced. SDF protocol exploits the soft decision source be seen through simu- lations that SDF protocol outperforms AF protocol for both OT and NT. Index Terms-likelihood (ML) decoder, soft-decision-and-forward (SDF). I. INTRODUCTION Multiple-antenna transmission has been

No, Jong-Seon

399

SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013  

SciTech Connect (OSTI)

There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

Gordon Rueff; Lyle Roybal; Denis Vollmer

2013-01-01T23:59:59.000Z

400

Non-Intrusive Load Monitoring Assessment: Literature Review and Laboratory Protocol  

SciTech Connect (OSTI)

To evaluate the accuracy of NILM technologies, a literature review was conducted to identify any test protocols or standardized testing approaches currently in use. The literature review indicated that no consistent conventions were currently in place for measuring the accuracy of these technologies. Consequently, PNNL developed a testing protocol and metrics to provide the basis for quantifying and analyzing the accuracy of commercially available NILM technologies. This report discusses the results of the literature review and the proposed test protocol and metrics in more detail.

Butner, R. Scott; Reid, Douglas J.; Hoffman, Michael G.; Sullivan, Greg; Blanchard, Jeremy

2013-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Double blinding-attack on entanglement-based quantum key distribution protocols  

E-Print Network [OSTI]

We propose a double blinding-attack on entangled-based quantum key distribution protocols. The principle of the attack is the same as in existing blinding attack except that instead of blinding the detectors on one side only, Eve is blinding the detectors of both Alice and Bob. In the BBM92 protocol, the attack allows Eve to get a full knowledge of the key and remain undetected even if Alice and Bob are using 100% efficient detectors. The attack can be easily extended to Ekert protocol, with an efficiency as high as 85.3%.

Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

2011-06-14T23:59:59.000Z

402

Protocol for Maximizing Energy Savings and Indoor Environmental Quality Improvements when Retrofitting Apartments  

SciTech Connect (OSTI)

The current focus on building energy retrofit provides an opportunity to simultaneously improve indoor environmental quality (IEQ). Toward this end, we developed a protocol for selecting packages of retrofits that both save energy and improve IEQ in apartments. The protocol specifies the methodology for selecting retrofits from a candidate list while addressing expected energy savings, IEQ impacts, and costs in an integrated manner. Interviews, inspections and measurements are specified to collect the needed input information. The protocol was applied to 17 apartments in three buildings in two different climates within California. Diagnostic measurements and surveys conducted before and after retrofit implementation indicate enhanced apartment performance.

Noris, Federico; Delp, William W.; Vermeer, Kimberly; Adamkiewicz, Gary; Singer, Brett C.; Fisk, William J.

2012-06-18T23:59:59.000Z

403

MIT Joint Program on the Science and Policy of Global Change  

E-Print Network [OSTI]

The Kyoto Protocol and Developing Countries Mustafa Babiker, John M. Reilly and Henry D. Jacoby Report No-profit organizations. To inform processes of policy development and implementation, climate change research needs://web.mit.edu/globalchange/www/ Printed on recycled paper #12;The Kyoto Protocol and Developing Countries Mustafa Babiker, John M. Reilly

404

Behavior-Based Transportation Greenhouse Gas Mitigation Under the Clean Development Mechanism Transport-Efficient Development in Nanchang, China  

E-Print Network [OSTI]

We propose a methodology, consistent with the Kyoto Protocol?s Clean Development Mechanism (CDM), to quantify the greenhouse gas (GHG) emission reduction benefits of transport efficient development (TED). TED aims to reduce ...

Zegras, P. Christopher

405

A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS  

E-Print Network [OSTI]

used in the analysis. The per- formance metrics considered include the average energy consumed per mechanism. The paper also presents the Adaptive Rate Control (ARC) mechanism. This mechanism tries and decremented by multiplying with in the case of a failure. In short alpha is a reward while beta is a penalty

Scheuermann, Peter

406

On-chip COMA Cache-coherence protocol for Microgrids of Microthreaded Cores  

E-Print Network [OSTI]

On-chip COMA Cache-coherence protocol for Microgrids of Microthreaded Cores Li Zhang Chris Jesshope and the development of a co-simulator to the Microgrid CMP emulator. 1 Introduction It is now widely accepted

Jesshope, Chris

407

A syndication-based messaging protocol for the global RFID network  

E-Print Network [OSTI]

This Master of Engineering thesis describes the design and implementation of a syndication based messaging protocol for the global RFID network. The motivation behind the design is to develop a scalable model that can be ...

Sun, Miao, M. Eng. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

408

The ICoN integrated communication and navigation protocol for underwater acoustic networks  

E-Print Network [OSTI]

The deployment of autonomous underwater devices has increased dramatically in the last several years, presenting a strong and growing need for a network protocol to mediate acoustic communications between devices. This ...

Kanthan, Rupesh R

2005-01-01T23:59:59.000Z

409

A protocol for the moderation of non-cooperative nodes in wireless local area networks  

E-Print Network [OSTI]

´opez and Fernando Paganini Universidad ORT Uruguay Abstract-- MAC protocols for wireless networks such as 802 Cuareim 1451, Montevideo, Uruguay. Email: {lopez ma,paganini}@ort.edu.uy. This work was supported by PDT-Uruguay

410

EVALUATION TECHNIQUE IN THE SPI-CALCULUS FOR CRYPTOGRAPHIC PROTOCOLS Hasan M. Al-Refai  

E-Print Network [OSTI]

EVALUATION TECHNIQUE IN THE SPI-CALCULUS FOR CRYPTOGRAPHIC PROTOCOLS Hasan M. Al-Refai halrefai@philadelphia.edu.jo Hasan_alrefai@yahoo.com Mobile Phone #: 00962-777357755 Abstract Bisimulation as a technique could

411

Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol  

E-Print Network [OSTI]

We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automataframework of Lynch, Segala, and Vaandrager. This framework providestools for arguing rigorously ...

Canetti, Ran

2006-06-19T23:59:59.000Z

412

Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol  

E-Print Network [OSTI]

The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about their correctness using multiple levels of abstraction, based on implementation ...

Canetti, Ran

2007-02-16T23:59:59.000Z

413

Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol  

E-Print Network [OSTI]

The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about theircorrectness using multiple levels of abstraction, based on implementation ...

Canetti, Ran

2006-06-20T23:59:59.000Z

414

E-Print Network 3.0 - ad-hoc network protocols Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Powered by Explorit Topic List Advanced Search Sample search results for: ad-hoc network protocols Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel models for...

415

CogPiT ---Configuration of Protocols in TIP Burkhard Stiller \\Lambda  

E-Print Network [OSTI]

CogPiT --- Configuration of Protocols in TIP Burkhard Stiller \\Lambda University of Cambridge 334476, FAX: +44 +1223 334678 E­Mail: Burkhard.Stiller@cl.cam.ac.uk Abstract The variety of upcoming

Haddadi, Hamed

416

Ontario’s Protocols for Evaluating the Energy and Bill Savings from Industrial Energy Efficiency Programs  

E-Print Network [OSTI]

. This paper focuses on how the protocols will help provide more transparent information to building owners about the net savings achieved by a particular energy efficiency investment and reviews the best methods available to estimate both gross and net energy...

Messenger, M.

2007-01-01T23:59:59.000Z

417

GPU-based Parallel Computing Models and Implementations for Two-party Privacy-preserving Protocols  

E-Print Network [OSTI]

resources to handle the encryption-decryption operations. In this dissertation, we study optimal utilization of computing resources on the graphic processor unit (GPU) architecture for privacy-preserving protocols based on secure function evaluation (SFE...

Pu, Shi

2013-11-25T23:59:59.000Z

418

Protocol for Maximizing Energy Savings and Indoor Environmental Quality Improvements when Retrofitting Apartments  

E-Print Network [OSTI]

from furnaces and water heaters.  Some protocols caution with pilot lights,  and water heaters; and installation of natural draft gas water heaters in an internal closet on 

Noris, Federico

2014-01-01T23:59:59.000Z

419

Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)  

E-Print Network [OSTI]

://medsec.medien.uni-weimar.de/ 2 Technical University of Denmark http://www.erikzenner.name/ 3 escrypt Inc., USA http a formal proof of its concrete security. The protocol neither em- ploys asymmetric cryptography, nor

420

Traffic-Aware Multi-Channel Multi-Stage Spectrum Sensing Protocols for Dynamic Spectrum Access  

E-Print Network [OSTI]

radios search for licensed spectral vacancies by performing spectrumspectrum sensing protocol, a DSA radio has to period- ically scan the licensedspectrum scarcity. All usable radio frequencies are already licensed

Gabran, Wesam Ramy I. F.

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Validation of the new mixture design and testing protocol for lime stabilization  

E-Print Network [OSTI]

and testing protocol is presented for lime stabilized subgrades. Comparison of field test data and laboratory test data shows that laboratory design test properties were achieved in the field. These properties are used in a mechanistic analysis to assess...

Yusuf, Fateh Ul Anam Muhammad Shafee

2001-01-01T23:59:59.000Z

422

Protocols for multi-antenna ad-hoc wireless networking in interference environments  

E-Print Network [OSTI]

A fundamental question for the design of future wireless networks concerns the nature of spectrum management and the protocols that govern use of the spectrum. In the oligopoly model, spectrum is owned and centrally managed, ...

Hinton, Danielle A. (Danielle Ayodele), 1978-

2010-01-01T23:59:59.000Z

423

Beamsplitting attack to the revised KKKP protocol and a possible solution  

E-Print Network [OSTI]

We show that the revised KKKP protocol proposed by Kye and Kim [Phys. Rev. Lett. 95,040501(2005)] is still insecure with coherent states by a type of beamsplitting attack. We then further revise the KKKP protocol so that it is secure under such type of beamsplitting attack. The revised scheme can be used for not-so-weak coherent state quantum key distribution.

Xiang-Bin Wang; Qiang Zhang; Yu-Ao Chen; Wong-Young Hwang; Myungshik Kim; Jian-Wei Pan

2006-03-15T23:59:59.000Z

424

A dyadic protocol for training complex skills: a replication using female participants  

E-Print Network [OSTI]

A DYADIC PROTOCOL FOR TRAINING COMPLEX SKILLS: A REPLICA11ON USING FEMALE PARTICIPANTS A Thesis by MARIA LUISA SANCHEZ-KU Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... for the degree of MASTER OF SCIENCE August 1999 Major Subject'. Psychology A DYADIC PROTOCOL FOR TRAINING COMPLEX SKILLS: A REPLICATION USING FEMALE PARTICIPANTS A Thesis by MAIUA LUISA SANCHEZ-KU Submitted to Texas A@M University in partial fulfillment...

Sanchez-Ku, Maria Luisa

1999-01-01T23:59:59.000Z

425

TEEX tackles toxins: TEEX develops ECLOX protocols to detect toxins in drinking water  

E-Print Network [OSTI]

Specialist Keith McLeroy: The equipment came with minimal instructions and no protocols for establishing baseline data for comparing the ECLOX readings. TCEQ turned to the TEEX Water and Wastewater Program to establish baseline data for 24 public...,? said McLeroy of TEEX?s Infrastructure Training and Safety Institute. ?After many years of looking at every research paper with the word ?ECLOX? in it, we were the first to actually achieve this (developing the protocols) with drinking water...

Jordan, Leslie

2010-01-01T23:59:59.000Z

426

Takashi Negishi,"Kyoto School of Modern Economic Theory", Kyoto Economic Review, 73-1, 2004  

E-Print Network [OSTI]

in Asia ASEAN Economy and Sustainable Development Comparative Development Studies Environmental Economic

Takada, Shoji

427

Case No. VWZ-0020  

Broader source: Energy.gov (indexed) [DOE]

DECISION AND ORDER OF THE DEPARTMENT OF ENERGY Motion to Dismiss Name of Case: Lucy B. Smith Date of Filing: October 14, 1999 Case Number: VWZ-0020 This determination will...

428

Beyond the Goldenberg-Vaidman protocol: Secure and efficient quantum communication using arbitrary, orthogonal, multi-particle quantum states  

E-Print Network [OSTI]

It is shown that maximally efficient protocols for secure direct quantum communications can be constructed using any arbitrary orthogonal basis. This establishes that no set of quantum states (e.g. GHZ states, W states, Brown states or Cluster states) has an advantage over the others, barring the relative difficulty in physical implementation. The work provides a wide choice of states for experimental realization of direct secure quantum communication protocols. We have also shown that this protocol can be generalized to a completely orthogonal state based protocol of Goldenberg-Vaidman (GV) type. The security of these protocols essentially arises from duality and monogamy of entanglement. This stands in contrast to protocols that employ non-orthogonal states, like Bennett-Brassard 1984 (BB84), where the security essentially comes from non-commutativity in the observable algebra.

Chitra Shukla; Anirban Pathak; R. Srikanth

2012-10-09T23:59:59.000Z

429

Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses  

E-Print Network [OSTI]

Unconditional security proofs of the Bennett-Brassard protocol of quantum key distribution have been obtained recently. These proofs cover also practical implementations that utilize weak coherent pulses in the four signal polarizations. Proven secure rates leave open the possibility that new proofs or new public discussion protocols obtain larger rates over increased distance. In this paper we investigate limits to error rate and signal losses that can be tolerated by future protocols and proofs.

Marcos Curty; Norbert Lütkenhaus

2005-02-20T23:59:59.000Z

430

A Comprehensive study of a New Multipath Energy Aware Routing Protocol for Mobile Ad-hoc Networks  

E-Print Network [OSTI]

Maximizing network lifetime is a very challenging issue in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since mobile nodes are powered by limited-capacity batteries. Furthermore, replacing or recharging batteries is often impossible in critical environments (e.g. battlefields, disaster areas, etc.) The proposed MEA-DSR (Multipath Energy-Aware on Demand Source Routing) protocol uses a load distribution policy in order to maximize network lifetime. The simulation results have shown the efficiency of the proposed protocol in comparison to DSR routing protocol in many difficult scenarios

Chettibi, Saloua

2009-01-01T23:59:59.000Z

431

Design, rationale, and baseline characteristics of a cluster randomized controlled trial of pay for performance for hypertension treatment: Study Protocol  

E-Print Network [OSTI]

for performance for hypertension treatment: study protocol.for performance for hypertension treatment: study protocolguidelines for treatment, hypertension is controlled in less

2011-01-01T23:59:59.000Z

432

An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution in Mobile Ad Hoc Networks1  

E-Print Network [OSTI]

An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution California {tari, prong, pedram}@usc.edu Abstract This paper introduces a network simulation model

Pedram, Massoud

433

AGEM: Adaptive Greedy-Compass Energy-aware Multipath Routing Protocol for WMSNs  

E-Print Network [OSTI]

This paper presents an Adaptive Greedy-compass Energy-aware Multipath protocol (AGEM), a novel routing protocol for wireless multimedia sensors networks (WMSNs). AGEM uses sensors node positions to make packet forwarding decisions. These decisions are made online, at each forwarding node, in such a way that there is no need for global network topology knowledge and maintenance. AGEM routing protocol performs load-balancing to minimize energy consumption among nodes using twofold policy: (1) smart greedy forwarding, based on adaptive compass and (2) walking back forwarding to avoid holes. Performance evaluations of AGEM compared to GPSR (Greedy Perimeter Stateless Routing) show that AGEM can: (a) maximize the network lifetime, (b) guarantee quality of service for video stream transmission, and (c) scale better on densely deployed wireless sensors network.

Medjiah, Samir; Krief, Francine

2012-01-01T23:59:59.000Z

434

A Multipath Energy-Aware On demand Source Routing Protocol for Mobile Ad-Hoc Networks  

E-Print Network [OSTI]

Energy consumption is the most challenging issue in routing protocol design for mobile ad-hoc networks (MANETs), since mobile nodes are battery powered. Furthermore, replacing or recharging batteries is often impossible in critical environments such as in military or rescue missions. In a MANET, the energy depletion of a node does not affect the node itself only, but the overall network lifetime. In this paper, we present multipath and energy-aware on demand source routing (MEA-DSR) protocol, which exploits route diversity and information about batteries-energy levels for balancing energy consumption between mobile nodes. Simulation results, have shown that MEA-DSR protocol is more energy efficient than DSR in almost mobility scenarios.

Chettibi, Saloua

2009-01-01T23:59:59.000Z

435

Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project  

SciTech Connect (OSTI)

This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

1996-03-01T23:59:59.000Z

436

A novel protocol for linearization of the Poisson-Boltzmann equation  

E-Print Network [OSTI]

A new protocol for linearization of the Poisson-Boltzmann equation is proposed and the resultant electrostatic equation coincides formally with the Debye-Huckel equation, the solution of which is well known for many electrostatic problems. The protocol is examined on the example of electrostatically stabilized nano-bubbles and it is shown that stable nano-bubbles could be present in aqueous solutions of anionic surfactants near the critical temperature, if the surface potential is constant. At constant surface charge non nano-bubble could exist.

R. Tsekov

2014-10-25T23:59:59.000Z

437

Whole Building Cost and Performance Measurement: Data Collection Protocol Revision 2  

SciTech Connect (OSTI)

This protocol was written for the Department of Energy’s Federal Energy Management Program (FEMP) to be used by the public as a tool for assessing building cost and performance measurement. The primary audiences are sustainable design professionals, asset owners, building managers, and research professionals within the Federal sector. The protocol was developed based on the need for measured performance and cost data on sustainable design projects. Historically there has not been a significant driver in the public or private sector to quantify whole building performance in comparable terms. The deployment of sustainable design into the building sector has initiated many questions on the performance and operational cost of these buildings.

Fowler, Kimberly M.; Spees, Kathleen L.; Kora, Angela R.; Rauch, Emily M.; Hathaway, John E.; Solana, Amy E.

2009-03-27T23:59:59.000Z

438

A Case for Climate Neutrality: Case Studies on Moving Towards...  

Open Energy Info (EERE)

for Climate Neutrality: Case Studies on Moving Towards a Low Carbon Economy Jump to: navigation, search Tool Summary LAUNCH TOOL Name: A Case for Climate Neutrality: Case Studies...

439

Project Finance Case Studies  

Broader source: Energy.gov [DOE]

Presentation covers the Project Finance Case Studies and is given at the Spring 2010 Federal Utility Partnership Working Group (FUPWG) meeting in Rapid City, South Dakota.

440

LLaannggeerrhhaannss LLaabb PPrroottooccoollss Live Fish Photography Protocol.docx revised 10/1/13 by JW Page 1 of 2  

E-Print Network [OSTI]

LLaannggeerrhhaannss LLaabb PPrroottooccoollss Live Fish Photography Protocol.docx revised 10/1/13 by JW Page 1 of 2 Live Fish Photography Protocol Set up: Stand the white board used for preserved to the white board. Position camera so that fish area fills view. Make sure auto focus is on. Make camera

Langerhans, Brian

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Sensitivity Analysis of the ATP Protocol Karthikeyan Sundaresan, V. Anantharaman, H.-Y. Hsieh and R. Sivakumar  

E-Print Network [OSTI]

Sensitivity Analysis of the ATP Protocol Parameters Karthikeyan Sundaresan, V. Anantharaman, H-tested the parameters involved in the design of the ATP protocol. The analysis was performed using the NS2 simulator and 15 flows. Each of the flows was an ATP flow with FTP serving as the application generating traffic

Sivakumar, Raghupathy

442

Energy-Efficient Reliable Paths for On-Demand Routing Protocols Tamer Nadeem, Suman Banerjee, Archan Misra, Ashok Agrawala  

E-Print Network [OSTI]

1 Energy-Efficient Reliable Paths for On-Demand Routing Protocols Tamer Nadeem, Suman Banerjee does not work for on-demand protocols and some additional mechanisms are needed to compute energy-efficient-Demand routing proto- col (AODV), and show how it can be enhanced to compute such energy-efficient reliable paths

Banerjee, Suman

443

EnergyEfficient Reliable Paths for OnDemand Routing Protocols Tamer Nadeem, Suman Banerjee, Archan Misra, Ashok Agrawala  

E-Print Network [OSTI]

1 Energy­Efficient Reliable Paths for On­Demand Routing Protocols Tamer Nadeem, Suman Banerjee does not work for on­demand protocols and some additional mechanisms are needed to compute energy­efficient­Demand routing proto­ col (AODV), and show how it can be enhanced to compute such energy­efficient reliable paths

Banerjee, Suman

444

Woody Plant Inventories, CVSEEP Protocol Thomas R. Wentworth, Robert K. Peet, Michael T. Lee, Steven D. Roberts  

E-Print Network [OSTI]

1 Woody Plant Inventories, CVSEEP Protocol Thomas R. Wentworth, Robert K. Peet, Michael T. Lee, Steven D. Roberts Version 4.2 2008 Woody plants are typically inventoried in all five levels of the CVSEEP protocol, although such inventory is optional in Levels 3 and 4. Woody plants fall into two

Peet, Robert K.

445

NCMIR METHODS FOR 3D EM: A NEW PROTOCOL FOR PREPARATION OF BIOLOGICAL SPECIMENS FOR SERIAL BLOCK  

E-Print Network [OSTI]

NCMIR METHODS FOR 3D EM: A NEW PROTOCOL FOR PREPARATION OF BIOLOGICAL SPECIMENS FOR SERIAL BLOCK, University of California, San Diego, La Jolla, CA, USA Note: This protocol was designed to enhance signal followed by 0.15M cacodylate buffer (Ted Pella Inc., Redding, CA) pH 7.4 containing 2.5% glutaraldehyde

Gleeson, Joseph G.

446

Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

1 Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc- demand minimum energy routing protocol and suggests mechanisms for their implementation. We highlight of an 'energy aware' link cache for storing this information. We also compare the performance of an on-demand

Brown, Timothy X.

447

An Autonomous Evolvable Architecture in a Reconfigurable Protocol Chip for Satellite Networks C. Okino, C. Lee, A. Gray, P. Arabshahi  

E-Print Network [OSTI]

://www.earth.nasa.gov/visions/researchstrat/Research_Strategy.htm [3] The Reliability of Data Program, http://www.xilinx.com/products/qa_data/relreprt.pdf [4] W. Huang as depicted in Figure 2. Reconfigurable Protocol Chip Input from Physical Layer Protocol Implementation: COTS

Arabshahi, Payman

448

Protocols for Monitoring Habitat Restoration Projects in the Lower Columbia River and Estuary  

SciTech Connect (OSTI)

Protocols for monitoring salmon habitat restoration projects are essential for the U.S. Army Corps of Engineers' environmental efforts in the Columbia River estuary. This manual provides state-of-the science data collection and analysis methods for landscape features, water quality, and fish species composition, among others.

Roegner, G. Curtis; Diefenderfer, Heida L.; Borde, Amy B.; Thom, Ronald M.; Dawley, Earl M.; Whiting, Allan H.; Zimmerman, Shon A.; Johnson, Gary E.

2008-04-25T23:59:59.000Z

449

A protocol to develop crack-free biomimetic coatings on Ti6Al4V substrates  

E-Print Network [OSTI]

-treated substrates were examined with/without water-soaking treatment before immersing in SBF. This water treatment they were dried slowly. It was observed that the water treatment, irrespective of the drying method coating. Based on these results, the authors suggest a protocol incorporating a water-soaking treatment

Tas, A. Cuneyt

450

Implementing XNS Protocols for 4.2bsd James O'Toole  

E-Print Network [OSTI]

interface code, which were eliminated by * *replacing inline code with protocol specific subroutine stream, and the XNS stream le* *vel is neither. We generalized the socket code to satisfy, and are the primary means of intermachine communication in use in the department today. The* * Xerox PARC Universal

Gifford, David K.

451

PATHS: Analysis of PATH Duration Statistics and their Impact on Reactive MANET Routing Protocols  

E-Print Network [OSTI]

PATHS: Analysis of PATH Duration Statistics and their Impact on Reactive MANET Routing Protocols Department of Electrical Engineering University of Southern California {narayans,fbai,bkrishna,helmy}@usc.edu ABSTRACT We develop a detailed approach to study how mobility im- pacts the performance of reactive MANET

Krishnamachari, Bhaskar

452

On the Use of Fixed Point Approximations to Study Reliable Protocols over Congested Links  

E-Print Network [OSTI]

network operation? iii) What are the sustainable values of link utilization without the risk of network control features) over Internet congested links (the bottlenecks). Within this framework the analysis in a general framework, where only some very elementary properties of the protocols and the network come

453

Energy-Efficient Protocols for Wireless Networks with Adaptive MIMO Capabilities  

E-Print Network [OSTI]

of a power-aware routing (PAR) scheme that selects minimum-energy end-to-end paths. Our adaptive designs (see Krunz et. al [5] for a survey)1 , some of which are aimed at energy conservation (e.g., Agarwal etEnergy-Efficient Protocols for Wireless Networks with Adaptive MIMO Capabilities Mohammad Z. Siam

Krunz, Marwan M.

454

Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

- ing MAC protocols are optimized to conserve energy, trad- ing off latency, throughput and other of sensor nodes with minimum latency and without requir- ing any cooperation or pre-scheduling among the application demands better perfor- mance at the expense of some additional energy. If latency

Namboodiri, Vinod

455

Guidance for use of Radiology Devices and Radioactive Materials in Research Protocols  

E-Print Network [OSTI]

Guidance for use of Radiology Devices and Radioactive Materials in Research Protocols Definition preparation, handling, storage, administration, and waste disposal in sufficient detail to permit a radiological hazards evaluation of the proposal, including potential for radiation dose to other health care

Puglisi, Joseph

456

98 RADIATION SAFETY MANUAL (REVISED MARCH 2010) WORKSHEET FOR RADIOCHEMICAL PROTOCOLS  

E-Print Network [OSTI]

of the worksheet is to identify hazardous or regulated chemicals, operations, and waste streams that might pose WASTE GENERATION None Mark on an attachment, all reagents that are not on the "Non hazardous Waste ListFORMS 98 RADIATION SAFETY MANUAL (REVISED MARCH 2010) WORKSHEET FOR RADIOCHEMICAL PROTOCOLS

457

Testing and Evaluation Protocol for Alarming Personal Radiation Detectors for Homeland Security  

E-Print Network [OSTI]

Personal Radiation Detectors for Homeland Security." [R2] ANSI/IEEE N42.42, "Data format standardTesting and Evaluation Protocol for Alarming Personal Radiation Detectors for Homeland Security T ................................................................................................................2 7. Guidance for testing ANSI N42.42 data format requirements ................................2 8

458

MSIP: A Protocol for E#cient Hando#s of Realtime Multimedia Sessions in Mobile  

E-Print Network [OSTI]

, longer delays and the need for tunneling management. SIP solves many of the problems in Mobile IPMSIP: A Protocol for E#cient Hando#s of Real­time Multimedia Sessions in Mobile Wireless Scenarios Dissertation submitted in partial fulfillment of the requirements for the degree of Master of Technology

Iyer, Sridhar

459

A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots  

E-Print Network [OSTI]

of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

Paris-Sud XI, Université de

460

Stability-Based Multi-Hop Clustering Protocol Jari Tenhunen, Ville Typpo, Marko Jurvansuu  

E-Print Network [OSTI]

, and also make optimizations related to routing and mobility management possible. The protocol detects and radio technology characteristics. I. INTRODUCTION Heterogeneous mobile ad hoc networks (MANETs or travel in groups. One way to approach the problemacy of topology and mobility management is clustering

Toh, C-K.

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

MSIP: A protocol for efficient handoffs of real-time multimedia sessions in mobile wireless scenarios  

E-Print Network [OSTI]

infrastructure is to efficiently manage user mobility. Mobility is handled by Mobile IP (at the network layer in this paper, MSIP, is a combination of network and application layer mobility management models reducesMSIP: A protocol for efficient handoffs of real-time multimedia sessions in mobile wireless

Iyer, Sridhar

462

CAS-based Channel Access Protocol for IEEE 802.11ah WLANs  

E-Print Network [OSTI]

Cities and Smart Grids concepts have motivated the growth of wireless networks based on sensor will extend IEEE 802.11 potential to applications such as smart metering, plan automation, eHealth or surveillance. In this paper we propose a novel channel access protocol for IEEE 802.11ah WLANs based on a smart

Bellalta, Boris

463

IP for Smart Objects Internet Protocol for Smart Objects (IPSO) Alliance  

E-Print Network [OSTI]

, smart cities, structural health management systems, smart grid and energy management, and transportationIP for Smart Objects Internet Protocol for Smart Objects (IPSO) Alliance White paper #1 Adam, Cisco Systems September 2008 Executive Summary The emerging application space for smart objects requires

Dunkels, Adam

464

EHS-Net Hand Hygiene Study EHS-Net Hand Hygiene Study Protocol  

E-Print Network [OSTI]

EHS-Net Hand Hygiene Study 1 EHS-Net Hand Hygiene Study Protocol I. Project Overview Title EHS-Net Network (EHS-Net) special study. EHS- Net is a collaboration involving the Centers for Disease Control. Investigators/collaborators/funding Investigators include EHS-Net staff at each of the eight EHS-Net sites

465

EHS-Net Cooling Study EHS-Net Cooling Study Protocol  

E-Print Network [OSTI]

EHS-Net Cooling Study 1 EHS-Net Cooling Study Protocol 1. Title EHS-Net Cooling Study 2. Research (EHS-Net) special study. EHS-Net is a collaboration involving the Centers for Disease Control confirmed foodborne outbreaks in the US (unpublished FoodNet data). These data clearly indicate

466

Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site. Final [report  

SciTech Connect (OSTI)

Surface and subsurface soil cleanup protocols for the Gunnison, Colorado, processing sits are summarized as follows: In accordance with EPA-promulgated land cleanup standards (40 CFR 192), in situ Ra-226 is to be cleaned up based on bulk concentrations not exceeding 5 and 15 pCi/g in 15-cm surface and subsurface depth increments, averaged over 100-m{sup 2} grid blocks, where the parent Ra-226 concentrations are greater than, or in secular equilibrium with, the Th-230 parent. A bulk interpretation of these EPA standards has been accepted by the Nuclear Regulatory Commission (NRC), and while the concentration of the finer-sized soil fraction less than a No. 4 mesh sieve contains the higher concentration of radioactivity, the bulk approach in effect integrates the total sample radioactivity over the entire sample mass. In locations where Th-230 has differentially migrated in subsoil relative to Ra-226, a Th-230 cleanup protocol has been developed in accordance with Supplemental Standard provisions of 40 CFR 192 for NRC/Colorado Department of Health (CDH) approval for timely implementation. Detailed elements of the protocol are contained in Appendix A, Generic Protocol from Thorium-230 Cleanup/Verification at UMTRA Project Processing Sites. The cleanup of other radionuclides or nonradiological hazards that pose a significant threat to the public and the environment will be determined and implemented in accordance with pathway analysis to assess impacts and the implications of ALARA specified in 40 CFR 192 relative to supplemental standards.

Not Available

1993-09-01T23:59:59.000Z

467

MRTP: A Multi-Flow Realtime Transport Protocol for Ad Hoc Networks  

E-Print Network [OSTI]

MRTP: A Multi-Flow Realtime Transport Protocol for Ad Hoc Networks Shiwen Mao, Dennis Bushmitch@research.panasonic.com, sathya@research.panasonic.com Abstract-- Transporting multimedia data over ad hoc networks is a challenging problem. However, the mesh topology of ad hoc networks implies the existence of multiple paths

Panwar, Shivendra S.

468

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups  

E-Print Network [OSTI]

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups Mark Manulis Horst of various group-oriented applications for mo- bile ad-hoc groups requires a group secret shared between all- and wide-area wired networks, can also be used in ad-hoc sce- narios because of the similar security

Manulis, Mark

469

c Copyright by James Patrick Lyons, 2003 A REPLICATION PROTOCOL FOR AN INTRUSION-TOLERANT  

E-Print Network [OSTI]

c Copyright by James Patrick Lyons, 2003 #12;A REPLICATION PROTOCOL FOR AN INTRUSION-TOLERANT SYSTEM DESIGN BY JAMES PATRICK LYONS B.S., University of Pennsylvania, 2000 THESIS Submitted in partial and Family iii #12;Acknowledgments In writing this thesis many people have provided me with invaluable

Illinois at Urbana-Champaign, University of

470

Dynamic Multi-Wavelength GPON (DMW-GPON) Protocol A. Gliwan, P. Kourtessis, J. M. Senior  

E-Print Network [OSTI]

Dynamic Multi-Wavelength GPON (DMW-GPON) Protocol A. Gliwan, P. Kourtessis, J. M. Senior Science (GPON) upstream map frame format enhancement has been developed to support dynamic multi wavelength (DMW the supported wavelengths. OPNET modelling of the performance characteristics of the DMW-GPON Fibre

Haddadi, Hamed

471

TTUAB PLASTIC & ALUMINUM RECYCLING PROTOCOL Fall 2012 What Plastic Do We Recycle?  

E-Print Network [OSTI]

TTUAB PLASTIC & ALUMINUM RECYCLING PROTOCOL ­ Fall 2012 What Plastic Do We Recycle? TTUAB has taken on the responsibility of recycling #1 PET and #2 HDPE plastics by placing a yellow TTUAB Plastic Recycling bin on each. Technically, we are only responsible for aforementioned plastics and aluminum. However, any trash or other

Rock, Chris

472

TTUAB PLASTIC & ALUMINUM RECYCLING PROTOCOL 2013 What Plastic Do We Recycle?  

E-Print Network [OSTI]

TTUAB PLASTIC & ALUMINUM RECYCLING PROTOCOL 2013 What Plastic Do We Recycle? TTUAB has taken on the responsibility of recycling ALL plastics (#1 through #7) by placing a yellow TTUAB Plastic Recycling bin on each and in LH100. Technically, we are only responsible for aforementioned plastics and aluminum. However, any

Rock, Chris

473

TTUAB PLASTIC RECYCLING PROTOCOL Fall 2011 What Plastic Do We Recycle?  

E-Print Network [OSTI]

TTUAB PLASTIC RECYCLING PROTOCOL ­ Fall 2011 What Plastic Do We Recycle? TTUAB has taken on the responsibility of recycling #1 PET and #2 HDPE plastics by placing a yellow TTUAB Plastic Recycling bin on each floor. Technically, we are only responsible for aforementioned plastics. However, any trash or other

Rock, Chris

474

Wood density measurement protocol J Chave Page 1 Measuring wood density for tropical forest trees  

E-Print Network [OSTI]

Wood density measurement protocol ­ J Chave Page 1 Measuring wood density for tropical forest trees Diversité Biologique Université Paul Sabatier 31000 Toulouse, France 1. Introduction Wood is a biological, that transport the sap along the stem and they are filled by water. The density of tree wood is an interesting

Chave, JĂ©rĂ´me

475

Results of Comparing Bandwidth Usage and Latency: Service Location Protocol and Jini  

E-Print Network [OSTI]

Results of Comparing Bandwidth Usage and Latency: Service Location Protocol and Jini Javier Govea. This paper focuses on analyzing and evaluating two of these limitations, bandwidth usage and latency, of two present the results of our bandwidth usage analysis and the results a comparison of latency of SLP

Barbeau, Michel

476

CHEAP CLEAN-UP PROTOCOL To clean BigDye reactions  

E-Print Network [OSTI]

CHEAP CLEAN-UP PROTOCOL To clean BigDye reactions: 1. Combine and mix MgCl2/ethanol cocktail. 2. Air dry on a Kimwipe or pulse spin upside down. MgCl2/ethanol 1 µL 0.5M MgCl2 1000 µL 70% ethanol

Russell, Amy L.

477

Modification of the GS LT Paired-end Library Protocol for Constructing Longer Insert Size Libraries  

SciTech Connect (OSTI)

Paired-end library sequencing has been proven useful in scaffold construction during de novo assembly of genomic sequences. The ability of generating mate pairs with 8 Kb or greater insert sizes is especially important for genomes containing long repeats. While the current 454 GS LT Paired-end library preparation protocol can successfully construct libraries with 3 Kb insert size, it fails to generate longer insert sizes because the protocol is optimized to purify shorter fragments. We have made several changes in the protocol in order to increase the fragment length. These changes include the use of Promega column to increase the yield of large size DNA fragments, two gel purification steps to remove contaminated short fragments, and a large reaction volume in the circularization step to decrease the formation of chimeras. We have also made additional changes in the protocol to increase the overall quality of the libraries. The quality of the libraries are measured by a set of metrics, which include levels of redundant reads, linker positive, linker negative, half linker reads, and driver DNA contamination, and read length distribution, were used to measure the primary quality of these libraries. We have also assessed the quality of the resulted mate pairs including levels of chimera, distribution of insert sizes, and genome coverage after the assemblies are completed. Our data indicated that all these changes have improved the quality of the longer insert size libraries.

Peng, Ze; Peng, Ze; Hamilton, Matthew; Ting, Sara; Tu, Hank; Goltsman, Eugene; Lapidus, Alla; Lucas, Susan; Cheng, Jan-Fang

2008-05-22T23:59:59.000Z

478

Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol  

E-Print Network [OSTI]

We present the wavelength attack on a practical continuous-variable quantum-key-distribution system with a heterodyne protocol, in which the transmittance of beam splitters at Bob's station is wavelength-dependent. Our strategy is proposed independent of but analogous to that of Huang et al. [arXiv: 1206.6550v1 [quant-ph

Xiang-Chun Ma; Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

2014-03-04T23:59:59.000Z

479

A Delay-Bounded Event-Monitoring and Adversary-Identification Protocol in  

E-Print Network [OSTI]

by compromised nodes in the middle that drop, modify, or delay the event report. To defend against such an attack, we propose Sem, a Secure Event Monitoring protocol against arbitrary malicious attacks by Byzantine there is no attack, and use cryptographic primitives more liberally when an attack is detected. This design has

Zhang, Junshan

480

Interaction systems design and the protocol-and middleware-centred paradigms in distributed application development  

E-Print Network [OSTI]

Interaction systems design and the protocol- and middleware-centred paradigms in distributed the benefits and importance of interaction systems design in the development of distributed applications. We in the development of distributed applications. Typical design methods based on the re-use of middleware platforms

van Sinderen, Marten

Note: This page contains sample records for the topic "kyoto protocol case" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Single-Database Private Information Retrieval Protocols : Overview, Usability and Trends.  

E-Print Network [OSTI]

1 Single-Database Private Information Retrieval Protocols : Overview, Usability and Trends. Carlos in which a user retrieves a record out of N from a replicated database, while hiding from the database interesting sub-field of research, called single- database PIR, deals with the schemes that allow a user

Paris-Sud XI, Université de

482

A Novel Real-Time MAC Protocol Exploiting Spatial and Temporal Channel Diversity in  

E-Print Network [OSTI]

Industrial Networks Kavitha Balasubramanian, G. S. Anil Kumar, G. Manimaran and Z. Wang Dept. of Electrical performance losses, halts/resets of manufacturing pipelines or defects in products. Several wired protocols cost of cabling, ease of configuration and maintenance, extended me- chanical freedom and mobility

Wang, Zhengdao

483

MaxMAC: a Maximally Traffic-Adaptive MAC Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

consumption, researchers have proposed Energy-Efficient Medium Access (E2 -MAC) protocols that switch- traffic phases, while still exhibiting a high energy-efficiency in periods of sparse traffic. The paper-based scenarios require reasonable quality of service during periods of increased activity, and a high energy-efficiency

Braun, Torsten

484

A Location-aided Power-aware Routing Protocol in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

hard problem due to two important fac- tors: First, the nodes may be mobile, demanding the energy-efficient algorithms, we are able to derive critical global properties with re- spect to end-to-end energy-efficient. Such observations pose significant challenges to design energy-efficient packet routing protocols while still ac

Li, Baochun

485

Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for  

E-Print Network [OSTI]

Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor such as the broadcast storm problem [6]. In this paper, we present an energy-efficient flooding mechanism, termed of battery and, hence, any solution must be energy-efficient. . Self-configuration. Since it is not feasible

Chakrabarty, Krishnendu

486

An Energy Efficient Select Optimal Neighbor Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

. This is especially important in wireless sensor networks where energy consumption is the primary concern. A number node compared to CSMA/CA based MAC protocols such as IEEE 802.11. When electronic energy consumption is a considerable part of energy consumption, SON has a better energy performance than traditional optimal pruning

New South Wales, University of

487

A Multipath Energy-Aware On demand Source Routing Protocol for Mobile Ad-Hoc Networks  

E-Print Network [OSTI]

to re-establish broken routes. Thus, a considerable global energy gain can be achieved by minimizing. The choice of the primary route in MEA-DSR is conditioned by two factors: 1) the residual energy of nodesA Multipath Energy-Aware On demand Source Routing Protocol for Mobile Ad-Hoc Networks S. Chettibi

Boyer, Edmond

488

Hydro: A Hybrid Routing Protocol for Low-Power and Lossy Networks  

E-Print Network [OSTI]

1 Hydro: A Hybrid Routing Protocol for Low-Power and Lossy Networks Stephen Dawson-based traffic, or optimize for point-to-point traffic in a homogeneous network. As these networks become more by the resource constraints of low-power and lossy networks (L2Ns). Our design leverages the predominantly two

California at Berkeley, University of

489

Modeling and analysis of security protocols using role based specifications and Petri nets  

E-Print Network [OSTI]

public, private and shared keys), and may interact in a poten- tially hostile environment. The main information necessary to anal- yse the protocol, for instance the public and private context of execution via a network, assume an under- lying infrastructure, composed of (asymmetric) public, private

Paris-Sud XI, Université de

490

A smart multi-hop hierarchical routing protocol for efficient video communication over wireless  

E-Print Network [OSTI]

in environmental monitoring, smart parking, traffic control, smart city and others [2]. In this context, smartA smart multi-hop hierarchical routing protocol for efficient video communication over wireless.costa@itec.ufpa.br, {helderp, kassiolsm, cerqueira}@ufpa.br and braun@iam.unibe.ch Abstract--For smart applications, nodes

Braun, Torsten

491

Energy-efcient Route-aware MAC protocols for Diffusion-based Sensor Networks  

E-Print Network [OSTI]

Energy-efŁcient Route-aware MAC protocols for Diffusion-based Sensor Networks Injong Rhee, Jangwon Route-awareness allows sensor nodes to save energy by "sleep- ing" opportunistically when choices, especially over low energy budget, than existing schemes. Our simulation results show that route-aware

Young, R. Michael

492

Protocols for BoundedConcurrent Secure TwoParty Computation in the Plain Model  

E-Print Network [OSTI]

Protocols for Bounded­Concurrent Secure Two­Party Computation in the Plain Model Yehuda Lindell # Department of Computer Science Bar­Ilan University Ramat Gan, 52900, Israel lindell@cs.biu.ac.il September 26­composition, in the plain model (where the only setup assumption made is that the parties communicate via authenticated

Lindell, Yehuda

493

Autonomous Undersea Systems Network (AUSNet) Protocols To Support Ad-Hoc AUV Communications  

E-Print Network [OSTI]

Autonomous Undersea Systems Network (AUSNet) ­ Protocols To Support Ad-Hoc AUV Communications@technologysystemsinc.com D. Richard Blidberg Steve Chappell Sai Mupparapu Autonomous Undersea Systems Institute 86 Old reports progress within the AUSNET (Autonomous Undersea Systems Network) program. AUSNET addresses

494

AUTONOMOUS UNDERSEA SYSTEMS NETWORK (AUSNET) PROTOCOLS TO SUPPORT AD-HOC AUV COMMUNICATIONS  

E-Print Network [OSTI]

AUTONOMOUS UNDERSEA SYSTEMS NETWORK (AUSNET) ­ PROTOCOLS TO SUPPORT AD-HOC AUV COMMUNICATIONS. Richard Blidberg Steve Chappell Autonomous Undersea Systems Institute Lee, NH (www.ausi.org) blidberg@ausi.org chappell@ausi.org Abstract This paper reports progress within the AUSNET (Autonomous Undersea Systems

495

Energy-Ecient Deterministic Routing Protocols in Radio Networks Koji Nakano Stephan Olariu  

E-Print Network [OSTI]

@cs.odu.edu Albert Zomaya Dept. of Electrical and Electronic Engineering The University of Western Australia PerthEnergy-EĆcient Deterministic Routing Protocols in Radio Networks Koji Nakano Stephan Olariu Dept, WA 6970, AUSTRALIA Abstract A radio network (RN, for short) is a distributed system populated

Nakano, Koji

496

A Collaborative Clinical Trial Protocol Writing System Chunhua Weng M.S.1  

E-Print Network [OSTI]

coordination, or version control. Second, their interfaces are often driven by rigorous comput- able models present a web-based protocol writing sys- tem with integrated support for collaborative reviewing approach to provide a structured document model or reusable text to facili- tate knowledge reuse

Yetisgen-Yildiz, Meliha

497

Energy-Aware Tag Anti-Collision Protocols for RFID Systems  

E-Print Network [OSTI]

Gao, Senior Member, IEEE Abstract-- Energy consumption of portable RFID readers is be- coming consumption of the reader should be minimized. Minimizing reader energy consumption would enable greater1 Energy-Aware Tag Anti-Collision Protocols for RFID Systems Vinod Namboodiri, Member, IEEE, Lixin

Namboodiri, Vinod

498

Expansion of the internet protocol address space with "minor" disruption of current hardware or software  

E-Print Network [OSTI]

Currently, the Internet suite of protocols uses a 32 bit network layer address and requires that each machine have a unique address. The problem: 32 bits only distinguishes 2 32 or 4,294,967,296 machines. Even with four billion addresses, experts...

Wheatley, Philip Stephen

1996-01-01T23:59:59.000Z

499

USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS  

E-Print Network [OSTI]

USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS of polymer electrolyte membrane (PEM) fuel cell components under simulated automotive drive cycle conditions of PEM fuel cells. Corrosion of high-surface area carbon supports poses significant concerns at high

500

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

Xu, Wenyuan