Sample records for kyoto protocol case

  1. The Cost of Kyoto Protocol Targets: The Case of Japan

    E-Print Network [OSTI]

    Paltsev, Sergey.

    This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

  2. The Kyoto Protocol and developing countries

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

    Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

  3. Russia's role in the Kyoto Protocol

    E-Print Network [OSTI]

    Bernard, Alain.

    As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

  4. Kyoto Protocol | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant Jump to: navigation, search GEOTHERMALTexas:Kuju Kanko HotelKwitherbee's blogdoKyoto

  5. Multi-Gas Assessment of the Kyoto Protocol John Reilly,*

    E-Print Network [OSTI]

    Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

  6. Impacts of the Kyoto Protocol on Energy Markets and Economic Activity

    Reports and Publications (EIA)

    1998-01-01T23:59:59.000Z

    Analyzes the impacts on the Kyoto Protocol on U.S. energy markets and the economy in the 2008-2012 time frame.

  7. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol

    SciTech Connect (OSTI)

    JA Edmonds; CN MacCracken; RD Sands; SH Kim

    2000-07-06T23:59:59.000Z

    The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of carbon if a global system of emissions mitigation could be quickly and effectively implemented. But it could also exceed $250 per tonne of carbon if the US must meet its emissions limitations entirely through domestic actions, and if mitigation obligations are not adequately anticipated by decision-makers.

  8. A Proposal to Reform the Kyoto Protocol: the Role of Escape Clauses and Foresight

    E-Print Network [OSTI]

    Karp, Larry S.

    A Proposal to Reform the Kyoto Protocol: the Role of Escape Clauses and Foresight Larry Karp University of California, Berkeley Jinhua Zhao Iowa Sate University February 23, 2007 Abstract A reform be designed. We propose a reform to the Kyoto Proto- col that allows signatories to avoid achieving the target

  9. The effects on developing countries of the Kyoto Protocol and CO? emissions trading

    E-Print Network [OSTI]

    Ellerman, A. Denny.; Jacoby, Henry D.; Decaux, Annelène.

    This paper examines the effect of the Kyoto Protocol on developing economies using marginal abatement curves generated by MIT's Emissions Prediction and Policy Assessment model (EPPA). In particular, the paper addresses ...

  10. A game of climate chicken : can EPA regulate greenhouse gases before the U.S. Senate ratifies the Kyoto Protocol?

    E-Print Network [OSTI]

    Bugnion, Véronique.; Reiner, David M.

    EPA's legal authority to regulate greenhouse gas emissions under the Clean Air Act is reviewed. While EPA clearly does not have the authority to implement the precise terms of the Kyoto Protocol, arguments could be put ...

  11. Impacts of the Kyoto protocol on U.S. energy markets and economic activity

    SciTech Connect (OSTI)

    NONE

    1998-10-01T23:59:59.000Z

    The Intergovernmental Panel on Climate Change (IPCC) was established by the World Meteorological Organization and the United Nations Environment Program in 1988 to assess the available scientific, technical, and socioeconomic information in the field of climate change. The most recent report of the IPCC concluded that ``Our ability to quantify the human influence on global climate is currently limited because the expected signal is still emerging from the noise of natural variability, and because there are uncertainties in key factors. These include the magnitudes and patterns of long-term variability and the time-evolving pattern of forcing by, and response to, changes in concentrations of greenhouse gases and aerosols, and land surface changes. Nevertheless the balance of evidence suggests that there is a discernible human influence on global climate. The first and second Conference of the Parties in 1995 and 1996 agreed to address the issue of greenhouse gas emissions for the period beyond 2000, and to negotiate quantified emission limitations and reductions for the third Conference of the Parties. On December 1 through 11, 1997, representatives from more than 160 countries met in Kyoto, Japan, to negotiate binding limits on greenhouse gas emissions for developed nations. The resulting Kyoto Protocol established emissions targets for each of the participating developed countries--the Annex 1 countries--relative to their 1990 emissions levels. 114 refs., 138 figs., 33 tabs.

  12. The Effects on Developing Countries of the Kyoto Protocol and CO2 Emissions Trading A. Denny Ellerman, Henry D. Jacoby and Annelne Decaux*

    E-Print Network [OSTI]

    The Effects on Developing Countries of the Kyoto Protocol and CO2 Emissions Trading A. Denny by the scope of CO2 emissions trading, by various limitations that Annex I countries might place on emissions.1 Trade in Goods with No Emissions Trading

  13. additional protocol ratification: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Gergely 9 An Economic Assessment of the Kyoto Protocol using the Global Trade and Environment Model CiteSeer Summary: Ratification of the Kyoto Protocol will have major...

  14. Japanese nuclear power and the Kyoto agreement

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Reilly, John M.; Ellerman, A. Denny.

    We find that, on an economic basis, nuclear power could make a substantial contribution for meeting the emissions target Japan agreed to in the Kyoto Protocol. It is unlikely however that the contribution would be as large ...

  15. The evolution of a climate regime: Kyoto to Marrakech

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Jacoby, Henry D.; Reilly, John M.; Reiner, David M.

    At meetings in Bonn and Marrakech in 2001, the Conference of the Parties to the Framework Convention on Climate Change broke through an impasse on the detailed provisions needed to allow the Kyoto Protocol to enter into ...

  16. Introducing Kyoto University Tradition, Innovation

    E-Print Network [OSTI]

    Takada, Shoji

    in the historical city of Kyoto in 1897, Kyoto University is the second oldest research university in Japan. Today and Development Kyoto University's Mission Statement declares its intention to sustain and develop its historical, and a unique balance is achieved between tradition and innovation. While preserving its rich cultural heritage

  17. REMARKS BY PRESIDENTIAL ECONOMIC ADVISER ANDREI ILLARIONOV AT A PRESS CONFERENCE ON RESULTS OF THE CLIMATE CHANGE AND KYOTO

    E-Print Network [OSTI]

    Fischlin, Andreas

    OF THE CLIMATE CHANGE AND KYOTO PROTOCOL SEMINAR IN MOSCOW The Federal News Service - Official Kremlin Int'l News, and if there is a rise, it has nothing to do with climate change. If there is an insignificant increase have repeatedly asked our foreign partners who advocate the Kyoto Protocol and who insist that Russia

  18. Carbon emissions and the Kyoto commitment in the European Union

    E-Print Network [OSTI]

    Viguier, Laurent L.; Babiker, Mustafa H.M.; Reilly, John M.

    We estimate reference CO? emission projections in the European Union, and quantify the economic impacts of the Kyoto commitment on Member States. We consider the case where each EU member individually meets a CO? emissions ...

  19. Environmental Science & Policy 5 (2002) 195206 The evolution of a climate regime: Kyoto to

    E-Print Network [OSTI]

    emissions trading. We analyze the costs of implementation and the environmental effectiveness of the Bonn; Kyoto Protocol; Marrakech accords; Emissions trading; Non-CO2 gases 1. Introduction In November 2000

  20. Kyoto Protocol: Enforcement Prohibitions (West Virginia)

    Broader source: Energy.gov [DOE]

    The West Virginia division of environmental protection shall refrain from proposing or promulgating any new rule intended, in whole or in part, to reduce emissions of greenhouse gases from the...

  1. Kyoto Protocol Act of 1998 (Illinois)

    Broader source: Energy.gov [DOE]

    Effective immediately, the Illinois Environmental Protection Agency and the Pollution Control Board shall not propose or adopt any new rule for the intended purpose of addressing the adverse...

  2. Analysis of Post-Kyoto CO2 Emissions Trading Using Marginal Abatement Curves A. Denny Ellerman and Annelne Decaux

    E-Print Network [OSTI]

    Analysis of Post-Kyoto CO2 Emissions Trading Using Marginal Abatement Curves A. Denny Ellerman the advantages of emissions trading. In this paper, the authors derive MACs from EPPA, the MIT Joint Program the benefits of emissions trading in achieving the emission reduction targets implied by the Kyoto Protocol

  3. Protocol for the Cross-Sectional Exposure Assessment of Case-Children with

    E-Print Network [OSTI]

    Protocol for the Cross-Sectional Exposure Assessment of Case-Children with Leukemia (Acute Lymphocytic and Acute Myelocytic Leukemias) and a Reference Population in Churchill County, Nevada with leukemia (acute lymphocytic leukemia [ALL] and acute myelocytic leukemia [AML]). The exposures of case

  4. Automatic Test Case Generation Using Multi-protocol Test Method Soo-in Lee, Yongbum Park, and Myungchul Kim

    E-Print Network [OSTI]

    Lee, Ben

    Automatic Test Case Generation Using Multi-protocol Test Method Soo-in Lee, Yongbum Park, mckim}@icu.ac.kr Abstract - A method for testing multi-protocol implementation under test (IUT) with a single test suite has been proposed in the literature. It tests a multi-protocol IUT in an integrated way

  5. A Case Study on Reactive Protocols for Aircraft Electric Power Distribution

    E-Print Network [OSTI]

    Xu, Huan

    A Case Study on Reactive Protocols for Aircraft Electric Power Distribution Huan Xu1, Ufuk Topcu2 electric power system that meets system requirements and reacts dynamically to changes in internal system to more-electric aircraft architectures possible. Conventional architectures utilize a combination

  6. KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS

    E-Print Network [OSTI]

    Takada, Shoji

    Energy Science Asian and African Area Studies Informatics Biostudies Global Environmental Studies. The main campus is located in the historic city of Kyoto, a center of traditional Japanese culture. Since

  7. KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS

    E-Print Network [OSTI]

    Takada, Shoji

    Energy Science - - 137 103 - - 19 27 Asian and African Area Studies - - - 55 - - 29 20 Informatics a long history and enduring traditions. The main campus is located in the historic city of Kyoto

  8. KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS

    E-Print Network [OSTI]

    Takada, Shoji

    Energy Science - - 117 98 - - 16 22 Asian and African Area Studies - - - 21 - - 36 13 Informatics - - 182 city of Kyoto, a center of traditional Japanese culture. Since its founding, the University has been

  9. Copyright 2009 IEICE EMC'09/Kyoto

    E-Print Network [OSTI]

    Koledintseva, Marina Y.

    809 Copyright © 2009 IEICE EMC'09/Kyoto Modelling of Absorbing Material Containing Magnetic Platelets Marina Y. Koledintseva#1 , James L. Drewniak#2 , Yongxue He*3 , and Bill Matlin*4 # EMC Laboratory

  10. fter 8 days of fractious negotiating, delegates at the 1997 climate conference in Kyoto, Japan, were running out of

    E-Print Network [OSTI]

    Toohey, Darin W.

    expectations, the delegates bor- rowed heavily from past treaties, including a US­Soviet nuclear-arms agreement-night session, the negotiators finally hammered out the climate agreement known as the Kyoto Protocol and other greenhouse gases. But even before the ink was dry on the agreement, it was clear

  11. Who benefits from the US withdrawal of the Kyoto protocol?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    gases. This convention, called the United Nations Framework Convention on Climate Change (UNFCCC and that Japan and Russia benefited from the United States withdrawal (in term of a priori decisional power). Key-made) interference with the climate system". The UNFCCC is the governing body for international negotiations

  12. he Kyoto Protocol is a symbolically important expression of governments'

    E-Print Network [OSTI]

    Colorado at Boulder, University of

    with stratospheric ozone depletion, acid rain from sulphur emissions and nuclear weapons. Drawing on these plausible in carbon dioxide by allowing countries to buy and sell their agreed allowances of emissions

  13. Fostering the Next Generation Kyoto University launched the John Mung Program* (Kyoto University Young Scholars

    E-Print Network [OSTI]

    Takada, Shoji

    generation, now Opening the door to the next generation with nanocarbon materials. NANO-MAT Graphene.iae.kyoto-u.ac.jp/molecule/index.html Structures of graphene nanoribbons (GNRs). *The program is named after the Japanese sailor, Nakahama Manjir

  14. IFSA, Kyoto, Japan, September 2001 1 Dry Chamber Wall Thermo-Mechanical Behavior

    E-Print Network [OSTI]

    Raffray, A. René

    assessment of dry chamber wall [6] based on ion and photon spectra from new direct-drive target from NRL [3 for an Example Case Without a Protective Chamber Gas #12;IFSA, Kyoto, Japan, September 2001 8 Photon and Ion Time of Temporal Distribution for Photons and Ions Based on Direct Drive Spectrum and 6.5 m Chamber without

  15. KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers

    E-Print Network [OSTI]

    Takada, Shoji

    ............................................. 16 Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market .................................... 20 Transportation in Kyoto City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University Kyoto International Community House

  16. KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers

    E-Print Network [OSTI]

    Takada, Shoji

    Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market Interpretation .................................... 20 Transportation in Kyoto City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University "kokoka" Kyoto International

  17. Formally Reasoning About Security Issues in P2P Protocols: A Case Study

    E-Print Network [OSTI]

    Valencia, Frank D.

    Universidad Javeriana Cali, Colombia aaaristizabal@puj.edu.co, {halopez,crueda}@cic.puj.edu.co 2 CNRS property against outsider attacks. By formally modeling and analyzing a real-world, yet informally. In this paper we present a formal specification of MUTE, a protocol for P2P systems, modelled in the SPL process

  18. Foto mit freundlicher Genehmigung des Primate Research Institute, Kyoto University, Japan

    E-Print Network [OSTI]

    Dettweiler, Michael

    Foto mit freundlicher Genehmigung des Primate Research Institute, Kyoto University, Japan Foto mit freundlicher Genehmigung des Primate Research Institute, Kyoto University, Japan Samstag . . , H FAN

  19. News Letter Institute of Advanced Energy, Kyoto University

    E-Print Network [OSTI]

    Takada, Shoji

    . Abstract definition of energy consists of two parts: Energy = Exergy +Anergy Exergy is a part of energyNews Letter Institute of Advanced Energy, Kyoto University ISSN 1342-3193 IAE-NL-2014 No.54 http -- 2,709 2013 2013 Institute of Advanced Energy, Kyoto University #12; 25 25 11 20

  20. Kyoto University has launched a Japan-Thailand collaborative research

    E-Print Network [OSTI]

    Takada, Shoji

    and efficient utilization of low-rank coals as well as increased use of biomass will help to reduce CO2 emission Japanese researchers from Kyoto University, Akita University, the Central Research Institute for Electric

  1. http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html

    E-Print Network [OSTI]

    2011 P6 http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html web #12;http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html () ( #12;http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html X MeV X Astro-H 2013 TeV10m) #12;http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html 2010 ASTRO-H CCD X (2) () (2) (2

  2. KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers

    E-Print Network [OSTI]

    Takada, Shoji

    ............................................. 16 Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market Other City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University Kyoto International Community House

  3. Workshop on job and worker flows 15-16 November 2012, Kyoto

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Workshop on job and worker flows 15-16 November 2012, Kyoto WORKER FLOWS AND ESTABLISHMENT WAGE attributable to the authors. hal-00833872,version1-13Jun2013 Author manuscript, published in "Workshop on job and worker flows, Kyoto : Japan (2012)" #12;Workshop on job and worker flows, 15-16 November 2012, Kyoto

  4. Ris-R-1405(EN) Energy Technologies for Post Kyoto

    E-Print Network [OSTI]

    Risø-R-1405(EN) Energy Technologies for Post Kyoto Targets in the Medium Term Proceedings Risø and trends in energy technologies which may become main contributors to the energy scene in 15 to 20 years Session 7 Session 1: Global or Regional Scenarios and Technology Prospects 15 Session 2: Energy

  5. Non-Kyoto Radiative Forcing in Long-Run Greenhouse Gas Emissions and Climate Change Scenarios

    SciTech Connect (OSTI)

    Rose, Steven K.; Richels, Richard G.; Smith, Steven J.; Riahi, Keywan; Stefler, Jessica; Van Vuuren, Detlef

    2014-04-27T23:59:59.000Z

    Climate policies designed to achieve climate change objectives must consider radiative forcing from the Kyoto greenhouse gas, as well as other forcing constituents, such as aerosols and tropospheric ozone. Net positive forcing leads to global average temperature increases. Modeling of non-Kyoto forcing is a relatively new component of climate management scenarios. Five of the nineteen models in the EMF-27 Study model both Kyoto and non-Kyoto forcing. This paper describes and assesses current non-Kyoto radiative forcing modeling within these integrated assessment models. The study finds negative forcing from aerosols masking significant positive forcing in reference non-climate policy projections. There are however large differences across models in projected non-Kyoto emissions and forcing, with differences stemming from differences in relationships between Kyoto and non-Kyoto emissions and fundamental differences in modeling structure and assumptions. Air pollution and non-Kyoto forcing decline in the climate policy scenarios. However, non-Kyoto forcing appears to be influencing mitigation results, including allowable carbon dioxide emissions, and further evaluation is merited. Overall, there is substantial uncertainty related to non-Kyoto forcing that must be considered.

  6. Toward a Post-Kyoto Climate Change Architecture: A Political Analysis

    E-Print Network [OSTI]

    Raustiala, Kal; Keohane, Robert O.

    2009-01-01T23:59:59.000Z

    FOR INTERNATIONAL GHG EMISSIONS TRADING (2000), http://al. , International Emissions Trading Rules as a Compliancethe Economic Benefits of Emissions Trading Under the Kyoto

  7. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01T23:59:59.000Z

    2 8 During the mid-year G8 summit in 2009, the majorsee supra note 26. (last 29. James Kirkup, G8 summit: Chinaand India Reject G8 Calls for Climate Targets, TELEGRAPH,

  8. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01T23:59:59.000Z

    installing 1,000 MW of coal power generation each week andof electricity generation is fueled by coal. Id. 121. Id.with coal-fired electric power generation 8 accounting for

  9. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01T23:59:59.000Z

    electricity demand and utilize predominately fossil-fuelsworld demand for energy will grow by 60% and fossil fuelfossil fuels, not renewable power exponential increase in demand."

  10. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01T23:59:59.000Z

    Progress on Post-2012 Emissions Trading Scheme, 39 ENV'T R!European Union's emissions trading scheme, which providesTHE EUROPEAN UNION'S EMISSIONS TRADING SCHEME AND TilE KYoT-

  11. Energy Policy 31 (2003) 459481 The costs of the Kyoto Protocol in the European Union

    E-Print Network [OSTI]

    ``flexible mechanisms'' (emission trading, clean development mechanism, and Joint Implementation) in order emissions trading within the European Union'' that proposes to introduce in 2005 an EU trading system be implemented at national level: e.g., emissions trading systems are in the process of being established

  12. A Proposal to Reform the Kyoto Protocol: the Role of Escape Clauses and Foresight

    E-Print Network [OSTI]

    Karp, Larry; Zhao, Jinhua

    2007-01-01T23:59:59.000Z

    size of its associated IEA, rather than by the identities ofM j+1 are the same type of IEA, and were they are differentM 1 ). Consequently, at any IEA M j , j < k, a group of M k

  13. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01T23:59:59.000Z

    a model for successfully shifting to a renewable power baserenewable power alternatives. The successful demonstrated modelrenewable energy power projects. Fortunately, the proven model

  14. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01T23:59:59.000Z

    Global Boom in Coal Power-and Emissions, CHISm- "IAN ScI.those emissions-particularly with coal-fired electric power

  15. Kyoto University Libraries Reference Guide Ver.1.1 2012.11.1 Information Services Division of Main Library

    E-Print Network [OSTI]

    Takada, Shoji

    Library New Arrival Alert (Serials Alert) 4 You can select the material types and holding libraries. 5 1Kyoto University Libraries Reference Guide 1 Ver.1.1 2012.11.1 Information Services Division of Main Library Kyoto University MyKULINE is... A web library that be customized for every Kyoto

  16. Mensuration protocol National Forest Inventory

    E-Print Network [OSTI]

    NFI: Mensuration protocol for the National Forest Inventory June 2010 E. D. Mackie, R. W. Matthews and A. Brewer1 FR Biometrics Division 1 IFOS, Forestry Commission #12;National Forest Inventory (NFI or square boundary. In the case of a section 2 #12;National Forest Inventory (NFI): Mensuration Protocol

  17. House Simulation Protocols (Building America Benchmark) - Building...

    Energy Savers [EERE]

    House Simulation Protocols. See an example of this Top Innovation in action. Find more case studies of Building America projects across the country that utilize House Simulation...

  18. Greetings from Kyoto-U SPRING 2009 C O N T E N T S

    E-Print Network [OSTI]

    Takada, Shoji

    high energy physics paper of all time as of 2006. The university's GCOE program (see Special Feature of administration: while it belongs to Kyoto University, its administration policies are decided by a steering

  19. Appendix E: Study Protocol Protocol for Biosampling Children with Leukemia (Acute Lymphocytic and

    E-Print Network [OSTI]

    Appendix E: Study Protocol Protocol for Biosampling Children with Leukemia (Acute Lymphocytic and Acute Myelocytic Leukemias) plus a Comparison Population in Sierra Vista, Arizona The protocol Assessment of Case Children with Leukemia (Acute Lymphocytic and Acute Myelocytic Leukemias) and a Reference

  20. http://www.ms.u-tokyo.ac.jp/~yasuyuki/rims2011.htm April 1, 2011 March 31, 2012 RIMS, Kyoto University, Japan

    E-Print Network [OSTI]

    Kawahigashi, Yasuyuki

    University, Japan M. Izumi (Kyoto University),Y. Kawahigashi (University of Tokyo), H. Matui (Chiba) Organized by: September 5 - 9, 2011 (RIMS, Kyoto University, Japan) Invited Speakers: N. Brown, M. Dadarlat and Mathematical Physics December 7 - 16, 2011 (RIMS, Kyoto University, Japan) Invited Speakers: J. Cuntz, D

  1. China's waste could be treasure for Kyoto scheme 01 Mar 2006 12:36:11 GMT

    E-Print Network [OSTI]

    Columbia University

    China's waste could be treasure for Kyoto scheme 01 Mar 2006 12:36:11 GMT Source: Reuters By Stuart Penson COPENHAGEN, March 1 (Reuters) - Hundreds of rubbish landfill sites across China have vast, said Lu Guoqiang, an official at China's state Environmental Protection Administration. "China has 700

  2. Greetings from Kyoto-U AUTUMN 2007 C O N T E N T S

    E-Print Network [OSTI]

    Takada, Shoji

    and Kihachiro Okura, who were leading businessmen in Japan of the time, and was Japan's largest textile factory, incorporating the latest European technology. At the time, as the relocation of the capital to Tokyo had caused Kyoto to begin losing its vitality, advanced industrial technologies were being introduced to the city

  3. University Research Administrator (URA) position availability Yoshida-South campus, Kyoto University

    E-Print Network [OSTI]

    Takada, Shoji

    1 / 3 University Research Administrator (URA) position availability Yoshida-South campus, Kyoto University 24 10 1 1 October 2012 Job title University Research Administrator (URA) Number 1 One network. Please note that the candidate is expected to mainly use English in the workplace, carrying out

  4. Kyoto University Libraries Reference Guide 1. Compare the reference style of books and journals

    E-Print Network [OSTI]

    Takada, Shoji

    Kyoto University Libraries Reference Guide 1. Compare the reference style of books and journals Ex Publisher Year of Publications Pages Ex.3) The basic style of journal articles Fidel, Raya; Green, Maurice -Distinguishing kinds of documents- Ver.1.1, 2008.03.26, Yumi Sugimoto (Eng.Arch.Library), Ver.2.0, 2014

  5. Kyoto University Library Reference Guide What is an E-Journal?

    E-Print Network [OSTI]

    Takada, Shoji

    read the newest article as soon as it is made available. You can read them at a laboratory or a Media Center PC even without going to the library. There are many links to related articles, cited articles, especially international academic journals held at Kyoto University. We hold with a lot of e-journals about

  6. Protocol for House Parties

    Broader source: Energy.gov [DOE]

    Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  7. Role of Bioenergy in the Kyoto Protocol, in the EU-ETS and in future Climate Agreements

    E-Print Network [OSTI]

    of bioenergy use through: Internal emission reductions within the Greenhouse Gas capped sectors Offsetting/CDM CDM project pipeline: > 1000 projects of which: Registered projects: 334 Expected CERs (from RISOE Distribution of projects Bioenergy #12;The EU-ETS and biomass (1) In January 2005 the European

  8. THE RIMINI PROTOCOL Oil Depletion Protocol

    E-Print Network [OSTI]

    Keeling, Stephen L.

    Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict During the Second Half of the Age of Oil As proposed at the 2003 Pio Manzu Conference

  9. Application Protocol Reference Architecture Application Protocol Reference Architecture

    E-Print Network [OSTI]

    van Sinderen, Marten

    Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

  10. Webinar: Hydrogen Refueling Protocols

    Broader source: Energy.gov [DOE]

    Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

  11. Kyoto & Kyoto University Kyoto: A Heartland

    E-Print Network [OSTI]

    Takada, Shoji

    . It was also where the first hydroelectric power plant and tram system were developed, and the location

  12. Kyoto: Think Global, Act Local (K:TGAL) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou NewKorea Parts andKunshan HenghuiKyoto: Think

  13. APS Protocol for

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material...

  14. Kyoto Workshop

    Broader source: Energy.gov (indexed) [DOE]

    and the inert gas environment are programmed and precisely controlled * Custom tooling insert made of graphite to hold the devices and substrate in place as shown *...

  15. AN INTERACTIVE SPIRES PLOT PROTOCOL

    E-Print Network [OSTI]

    Cerny, Barbara

    2013-01-01T23:59:59.000Z

    LBL-11068 AN INTERACTIVE SPIRES PLOT PROTOCOL Barbara Cerny,11068 PLOT PROTOCOL AN INTERACTIVE by Barbara Cerny, Geraldit gives immediate interactive plots that can be displayed

  16. The Kyoto University Research Administration office (KURA) was established to perform a function that is still not widely known

    E-Print Network [OSTI]

    Takada, Shoji

    -Program for World-Leading Innovative R&D on Science and Technology" called "FIRST Program" is one of them. The total that is still not widely known in Japan. After the establishment of KURA, Kyoto University has been engaged and Technology (MEXT) to further reinforce such initiatives. To achieve top-level research activities and high

  17. Proceedings of the 15th International Heat Transfer Conference, IHTC-15 August 10-15, 2014, Kyoto, Japan

    E-Print Network [OSTI]

    pressure drop and reduced heat transfer to the reaction zone. KEY WORDS: Solar energy, Carbon emission combustion as the process heat for calcination. Shimizu et al. performed a thermodynamic analysis on a pairProceedings of the 15th International Heat Transfer Conference, IHTC-15 August 10-15, 2014, Kyoto

  18. White Paper: A Survey of 3D Sync IR Protocols

    E-Print Network [OSTI]

    )..............................................................................................12 Sony Protocol (Standalone emitter

  19. Hydrogen Refueling Protocols Webinar (Text Version) | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Refueling Protocols Webinar (Text Version) Hydrogen Refueling Protocols Webinar (Text Version) Below is the text version of the webinar titled "Hydrogen Refueling Protocols,"...

  20. Estimating the greenhouse gas benefits of forestry projects: A Costa Rican Case Study

    SciTech Connect (OSTI)

    Busch, Christopher; Sathaye, Jayant; Sanchez Azofeifa, G. Arturo

    2000-09-01T23:59:59.000Z

    If the Clean Development Mechanism proposed under the Kyoto Protocol is to serve as an effective means for combating global climate change, it will depend upon reliable estimates of greenhouse gas benefits. This paper sketches the theoretical basis for estimating the greenhouse gas benefits of forestry projects and suggests lessons learned based on a case study of Costa Rica's Protected Areas Project, which is a 500,000 hectare effort to reduce deforestation and enhance reforestation. The Protected Areas Project in many senses advances the state of the art for Clean Development Mechanism-type forestry projects, as does the third-party verification work of SGS International Certification Services on the project. Nonetheless, sensitivity analysis shows that carbon benefit estimates for the project vary widely based on the imputed deforestation rate in the baseline scenario, e.g. the deforestation rate expected if the project were not implemented. This, along with a newly available national dataset that confirms other research showing a slower rate of deforestation in Costa Rica, suggests that the use of the 1979--1992 forest cover data originally as the basis for estimating carbon savings should be reconsidered. When the newly available data is substituted, carbon savings amount to 8.9 Mt (million tones) of carbon, down from the original estimate of 15.7 Mt. The primary general conclusion is that project developers should give more attention to the forecasting land use and land cover change scenarios underlying estimates of greenhouse gas benefits.

  1. Internet Control Message Protocol The Context

    E-Print Network [OSTI]

    1 1 Internet Control Message Protocol ICMP 2 The Context IP-Related Protocol: ICMP TCP/IP Protocol Internet Control Message Protocol (ICMP) The Internet Control Message Protocol (ICMP) is used by routers is a separate protocol that sits above IP and uses IP to transport messages In practice, ICMP is an integral

  2. Enhancing the expressivity and automation of an interactive theorem prover in order to verify multicast protocols 

    E-Print Network [OSTI]

    Ridge, Thomas

    This thesis was motivated by a case study involving the formalisation of arguments that simplify the verification of tree-oriented multicast protocols. As well as covering the case study itself, it discusses our solution ...

  3. Analyzing the Dynamics of Chemical Networking Protocols

    E-Print Network [OSTI]

    Vetter, Thomas

    from several well-established fields, such as model linearization proposed in Metabolic Control congestion control protocol and highlight formerly unknown protocol features. Keywords: dynamic analysis;1 Introduction Predicting and controlling the dynamics of communication protocols are difficult but important

  4. Robust multipartite multilevel quantum protocols

    SciTech Connect (OSTI)

    Nihira, Hideomi; Stroud, C.R. Jr. [The Institute of Optics, University of Rochester, Rochester, New York 14627 (United States)

    2005-08-15T23:59:59.000Z

    We present a quantum protocol utilizing a tripartite three-level state. The state used in this scheme contains entanglement even after one system is traced out and as a result can be used for both a secret-sharing protocol among the three parties and a quantum-key-distribution protocol between any two parties. We show how to utilize this residual entanglement for quantum-key-distribution purposes, and explore a possible realization of the scheme using entanglement of orbital-angular-momentum states of photons.

  5. How to Evaluate the Security of Real-life Cryptographic Protocols?

    E-Print Network [OSTI]

    Basin, David

    How to Evaluate the Security of Real-life Cryptographic Protocols? The cases of ISO/IEC 29128 standard- ized as ISO/IEC 29128 in ISO/IEC JTC1 SC27/WG3, in which three of the authors are project co standard ISO/IEC 11770-2 key-establishment protocol. We propose here standardization activities

  6. Sidewinder: A Predictive Data Forwarding Protocol for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Zhou, Gang

    Sidewinder: A Predictive Data Forwarding Protocol for Mobile Wireless Sensor Networks Matthew wireless sensor network deployments has received little study, such as in the case of floating sensor. Consequently, we propose Sidewinder, a predictive data forwarding protocol for mobile wireless sensor networks

  7. Secure coherent-state quantum key distribution protocols with efficient reconciliation

    SciTech Connect (OSTI)

    Assche, G. van; Cerf, N.J. [QuIC, Ecole Polytechnique, Universite Libre de Bruxelles, CP 165/59, 1050 Brussels (Belgium); Iblisdir, S. [QuIC, Ecole Polytechnique, Universite Libre de Bruxelles, CP 165/59, 1050 Brussels (Belgium); GAP-Optique, University of Geneva, 20 rue de l'Ecole-de-Medecine, CH-1211 Geneva (Switzerland)

    2005-05-15T23:59:59.000Z

    We study the equivalence of a realistic quantum key distribution protocol using coherent states and homodyne detection with a formal entanglement purification protocol. Maximally entangled qubit pairs that one can extract in the formal protocol correspond to secret key bits in the realistic protocol. More specifically, we define a qubit encoding scheme that allows the formal protocol to produce more than one entangled qubit pair per entangled oscillator pair or, equivalently for the realistic protocol, more than one secret key bit per coherent state. The entanglement parameters are estimated using quantum tomography. We analyze the properties of the encoding scheme and investigate the resulting secret key rate in the important case of the attenuation channel.

  8. Shear Transformation Zones: State Determined or Protocol Dependent?

    E-Print Network [OSTI]

    Oleg Gendelman; Prabhat K. Jaiswal; Itamar Procaccia; Bhaskar Sen Gupta; Jacques Zylberg

    2014-08-18T23:59:59.000Z

    The concept of a Shear Transformation Zone (STZ) refers to a region in an amorphous solid that undergoes a plastic event when the material is put under an external mechanical load. An important question that had accompanied the development of the theory of plasticity in amorphous solids for many years now is whether an STZ is a {\\em region} existing in the material (which can be predicted by analyzing the unloaded material), or is it an {\\em event} that depends on the loading protocol (i.e., the event cannot be predicted without following the protocol itself). In this Letter we present strong evidence that the latter is the case. Infinitesimal changes of protocol result in macroscopically big jumps in the positions of plastic events, meaning that these can never be predicted from considering the unloaded material.

  9. Library Protocol Safety and Security

    E-Print Network [OSTI]

    Oxford, University of

    Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

  10. DISTRIBUTED SHORTESTPATH PROTOCOLS TIMEDEPENDENT NETWORKS

    E-Print Network [OSTI]

    Orda, Ariel

    DISTRIBUTED SHORTEST­PATH PROTOCOLS for TIME­DEPENDENT NETWORKS Ariel Orda Raphael Rom+ Department and the dynamic behavior of networks, since a distributed solution enables constant tracking of changes 32000 October 1992 Revised May 1994, October 1995 ABSTRACT This paper addresses algorithms for networks

  11. Experimental study on the thorium-loaded accelerator-driven system at the Kyoto Univ. critical assembly

    SciTech Connect (OSTI)

    Pyeon, C. H.; Yagi, T.; Lim, J. Y.; Misawa, T. [Nuclear Science Engineering Div., Research Reactor Inst., Kyoto Univ., Asashiro-nishi, Kumatori-cho, Sennan-gun, Osaka 590-0494 (Japan)

    2012-07-01T23:59:59.000Z

    The experimental study on the thorium-loaded accelerator-driven system (ADS) is conducted in the Kyoto Univ. Critical Assembly (KUCA). The experiments are carried out in both the critical and subcritical states for attaining the reaction rates of the thorium capture and fission reactions. In the critical system, the thorium plate irradiation experiment is carried out for the thorium capture and fission reactions. From the results of the measurements, the thorium fission reactions are obtained apparently in the critical system, and the C/E values of reaction rates show the accuracy of relative difference of about 30%. In the ADS experiments with 14 MeV neutrons and 100 MeV protons, the subcritical experiments are carried out in the thorium-loaded cores to obtain the capture reaction rates through the measurements of {sup 115}In(n, {gamma}){sup 116m}In reactions. The results of the experiments reveal the difference between the reaction rate distributions for the change in not only the neutron spectrum but also the external neutron source. The comparison between the measured and calculated reaction rate distributions demonstrates a discrepancy of the accuracy of reaction rate analyses of thorium capture reactions through the thorium-loaded ADS experiments with 14 MeV neutrons. Hereafter, kinetic experiments are planned to be carried out to deduce the delayed neutron decay constants and subcriticality using the pulsed neutron method. (authors)

  12. Cell Component Accelerated Stress Test Protocols for PEM Fuel...

    Broader source: Energy.gov (indexed) [DOE]

    Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Accelerated Stress Test Protocols for PEM...

  13. DOE Cell Component Accelerated Stress Test Protocols for PEM...

    Broader source: Energy.gov (indexed) [DOE]

    Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells This document describes test protocols...

  14. Terrestrial Carbon Observations: Protocols for Vegetation Sampling

    E-Print Network [OSTI]

    GTOS GTOS 55 Terrestrial Carbon Observations: Protocols for Vegetation Sampling and Data Submission Shashi Verma #12;(intentionally blank) #12;Terrestrial Carbon Observations: Protocols for Vegetation Forestry University, Bejing 100083, China 5 University of Wisconsin, Milwaukee, WI 6 Microsoft Research

  15. Practical API Protocol Checking with Access Permissions

    E-Print Network [OSTI]

    for a large Java standard API with our approach. We also specify several other Java APIs and identify standard APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2 ProtocolPractical API Protocol Checking with Access Permissions Kevin Bierhoff Nels E. Beckman Jonathan

  16. Statistical Estimation of Quantum Tomography Protocols Quality

    E-Print Network [OSTI]

    Yu. I. Bogdanov; G. Brida; M. Genovese; S. P. Kulik; E. V. Moreva; A. P. Shurupov

    2010-02-18T23:59:59.000Z

    A novel operational method for estimating the efficiency of quantum state tomography protocols is suggested. It is based on a-priori estimation of the quality of an arbitrary protocol by means of universal asymptotic fidelity distribution and condition number, which takes minimal value for better protocol. We prove the adequacy of the method both with numerical modeling and through the experimental realization of several practically important protocols of quantum state tomography.

  17. Automated Eye-Movement Protocol Analysis

    E-Print Network [OSTI]

    Salvucci, Dario D.

    Automated Eye-Movement Protocol Analysis Dario D. Salvucci and John R. Anderson Carnegie Mellon analysis of eye-movement protocols. Although eye movements have be- come increasingly popular as a tool an ap- proach to automating eye-movement protocol analysis by means of tracing--re- lating observed eye

  18. Performances de protocoles transactionnels en environnement mobile

    E-Print Network [OSTI]

    Serrano Alvarado, Patricia

    indices de performance quantitatifs, et étudie ceux-ci sur quatre protocoles (2PC, UCM, CO2PC et TCOT that are studied on four protocols (2PC, UCM, CO2PC et TCOT). Three of them are specifics propositions for mobile revisited to propose adapted transaction models and proper- ties. Proposed algorithms and protocols try

  19. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01T23:59:59.000Z

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  20. Multiple protocol fluorometer and method

    DOE Patents [OSTI]

    Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

    2000-09-19T23:59:59.000Z

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  1. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01T23:59:59.000Z

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  2. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect (OSTI)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01T23:59:59.000Z

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  3. Office Protocols | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse toOctober 2014 National Idling ReductionOffice Protocols

  4. Quantum secret-sharing protocol based on Grover's algorithm

    SciTech Connect (OSTI)

    Hsu, Li-Yi [Physics Division, National Center of Theoretical Sciences, Hsinchu, Taiwan, Republic of China (China)

    2003-08-01T23:59:59.000Z

    A marked state can be found with certainty in the two-qubit case of Grover's algorithm. This property is included in the proposed quantum secret-sharing protocol. In the proposed scheme, the sender prepares some initial state in private and then performs a phase shift of the marked state as the sender's bit. Then, the sender sends these two qubits to each of the two receivers. Only when the sender broadcasts the initially prepared state and then the receivers perform the corresponding inversion operation about the average, is the sender's bit faithfully revealed. Moreover, the sender can detect deception using cheat-detecting states. The proposed quantum secret-sharing protocol is shown to be secure.

  5. Waimairi Clinic Policies, Procedures and Protocols

    E-Print Network [OSTI]

    Hickman, Mark

    Waimairi Clinic Policies, Procedures and Protocols July 2010 College of Education #12;Table The Facilities............................................................................2 Booking a Clinic room ............................................................................................... 3 Access to Clinics.......................................................................3

  6. Estimating Pedestrian Accident Exposure: Protocol Report

    E-Print Network [OSTI]

    Greene-Roesel, Ryan; Diogenes, Mara Chagas; Ragland, David R

    2007-01-01T23:59:59.000Z

    A Method of Measuring Exposure to Pedestrian Accident Risk.Accident Analysis and Prevention, Vol. 14, 1982, pp 397-405.Estimating Pedestrian Accident Exposure: Protocol Report,

  7. Kyoto University International Center

    E-Print Network [OSTI]

    Takada, Shoji

    Chemistry Faculty of Agriculture Bachelor of Agriculture Bioresource Science, Applied Life Sciences, Agricultural and Environmental Engineering, Forest and Biomaterials Science, Food and Environmental Economics and Astronautics, Nuclear Engineering,

  8. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26T23:59:59.000Z

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  9. The Bitcoin Backbone Protocol: Analysis and Applications

    E-Print Network [OSTI]

    The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay.leonardos@gmail.com November 16, 2014 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone

  10. Protocol Number: (IBC office use only)

    E-Print Network [OSTI]

    Asaithambi, Asai

    Protocol Number: (IBC office use only) 1 UNF Registration of Biosafety Level 2 (BSL-2) A-2 Form", describe the methods of inactivation. #12;Protocol Number: (IBC office use only) 2 10. Describe the mechanism for decontaminating lab waste prior to disposal. Yes No If "Yes", describe the methods

  11. Safe Operating Procedure SAFETY PROTOCOL: Rb-86

    E-Print Network [OSTI]

    Farritor, Shane

    of hazardous and/or radioactive wastes are to be followed. Rb- 86 waste should be segregated from all otherSafe Operating Procedure (2/10) SAFETY PROTOCOL: Rb-86 this safety protocol or submit an alternative and equivalent procedure that you develop to meet your unique

  12. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  13. Adaptive best effort protocols for video delivery

    E-Print Network [OSTI]

    Madhwaraj, Ashwin Raj

    1998-01-01T23:59:59.000Z

    This thesis describes the design and implementation of ics. transport level protocols running on top of the IP layer to transmit video data over packet switched networks. These protocols address the issues of meeting real-time deadlines of the video...

  14. Cryptanalysis of the arbitrated quantum signature protocols

    SciTech Connect (OSTI)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2011-08-15T23:59:59.000Z

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  15. NOAA Fisheries Protocols For Sea Scallop Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Sea Scallop Dredge Surveys January 7, 2004 Prepared by: Members..................................................................................................................................... 5 NOAA Fisheries Sea Scallop Dredge Survey Protocols............................................................................................................................. 10 Changes to Regional Scallop Dredge Protocols

  16. Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks

    E-Print Network [OSTI]

    Bruck, Jehoshua (Shuki)

    Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks Michael Langberg is to create distributed protocols that reduce the uncertainty by distributing the knowledge of the network anonymous networks. Keywords: Anonymous networks, directed networks, distributed protocols. 1 Introduction

  17. Proceedings of the 15th International Heat Transfer Conference, IHTC-15 August 10-15, 2014, Kyoto, Japan

    E-Print Network [OSTI]

    for the presented simulation case is reached in 35.5 s. KEY WORDS: Solar energy, CO2 capture, Porous media, Mass

  18. Development of an Accelerated Ash-Loading Protocol for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007...

  19. The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary...

    Open Energy Info (EERE)

    The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative:...

  20. access control protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

  1. access control protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

  2. applicable protocol fails: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    robust, reliable and efficient communication protocols so as to minimize the end-to-end latency and packet drops. Design of a secure and efficient communication protocol for...

  3. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Environmental Management (EM)

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

  4. N-Terminal Enrichment: Developing a Protocol to Detect Specific...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Terminal Enrichment: Developing a Protocol to Detect Specific Proteolytic Fragments. N-Terminal Enrichment: Developing a Protocol to Detect Specific Proteolytic Fragments....

  5. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...

    Broader source: Energy.gov (indexed) [DOE]

    Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Webinar slides from the U.S. Department of Energy...

  6. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  7. A Case Study of a Commissioning Process for Demand Side Energy Conservation of the Large Heat Source Plant in Kyoto Station Building-APCBC

    E-Print Network [OSTI]

    Matsushita, N.; Yoshida,H.

    2014-01-01T23:59:59.000Z

    5 Heat source plant ?Total capacity?26.3MW? Substation ? ? ? Total : 6 Substations Bleed-in Control Substation ? ? ? The chilled water delivery system Large heat source plant similar to a DHC plant ? Total refrigerator capacity 26.3 MW ? Chilled... water is supplied 6 substations - Department store - Hotel - Theater - Train station etc. ? Bleed-in Control ? Commonly equipped in the substations of DHC plants. ? This control maintains the return water temperature to the plant by controlling...

  8. An Energy-Efficient Broadcasting Scheme for Unsynchronized Wireless Sensor MAC Protocols

    E-Print Network [OSTI]

    Braun, Torsten

    An Energy-Efficient Broadcasting Scheme for Unsynchronized Wireless Sensor MAC Protocols Philipp, Switzerland Abstract--In the past couple of years, many Energy-Efficient Medium Access Control (E2 -MAC of energy-efficiency in case of unicast point-to-point transmissions, they yet lack an efficient solution

  9. IT Licentiate theses Ad Hoc Routing Protocol

    E-Print Network [OSTI]

    Flener, Pierre

    IT Licentiate theses 2005-004 Ad Hoc Routing Protocol Validation OSKAR WIBLING UPPSALA UNIVERSITY SWEDEN Dissertation for the degree of Licentiate of Technology in Computer Science at Uppsala University

  10. Membrane and MEA Accelerated Stress Test Protocols

    Broader source: Energy.gov (indexed) [DOE]

    and MEA Accelerated Stress Test Protocols Presented at High Temperature Membrane Working Group Meeting Washington, DC May 14, 2007 T.G. Benjamin Argonne National Laboratory 2 0 10...

  11. A Metaobject Protocol for C++ Shigeru Chiba

    E-Print Network [OSTI]

    Chiba, Shigeru

    A Metaobject Protocol for C++ Shigeru Chiba Xerox PARC & University of Tokyo chiba@parc of the paper, we rst discuss what we want our 1 We use the term library to mean a collection of reusable code

  12. A novel DHT Routing Protocol for MANETs

    E-Print Network [OSTI]

    Chellamani, Deepak

    2010-04-30T23:59:59.000Z

    The central challenge in Mobile Ad hoc Networks (MANETs) is to provide a stable routing strategy without depending on any central administration. This work presents and examines the working of Radio Ring Routing Protocol (RRRP), a DHT based routing...

  13. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect (OSTI)

    Hacke, P.

    2012-03-01T23:59:59.000Z

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  14. The security of Ping-Pong protocol

    E-Print Network [OSTI]

    Jian-Chuan Tan; An Min Wang

    2008-08-28T23:59:59.000Z

    Ping-Pong protocol is a type of quantum key distribution which makes use of two entangled photons in the EPR state. Its security is based on the randomization of the operations that Alice performs on the travel photon (qubit), and on the anti-correlation between the two photons in the EPR state. In this paper, we study the security of this protocol against some known quantum attacks, and present a scheme that may enhance its security to some degree.

  15. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2001 SECURE SOCKETS LAYER (SSL) v layered on top of TCP v SSL versions 1.0, 2.0, 3.0, 3.1 v Netscape protocol v later refitted as IETF standard TLS (Transport Layer Security) v TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

  16. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 3© Ravi Sandhu 2000

  17. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

  18. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect (OSTI)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01T23:59:59.000Z

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  19. EnergyEfficient Initialization Protocols for Adhoc Radio Networks ?

    E-Print Network [OSTI]

    Nakano, Koji

    Energy­Efficient Initialization Protocols for Ad­hoc Radio Networks ? J. L. Bordim 1 , J. Cui 1 , T contribution of this work is to propose energy­ efficient randomized initialization protocols for ad­hoc radio this protocol to de­ sign an energy­efficient initialization protocol that terminates, with high probability

  20. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  1. Presentation 2.8: Program for the conversion of Russian municipal boilers with 20MW maximum capacity to biofuel due to funds from the emissions reduction units sell, under the Kyoto Protocol

    E-Print Network [OSTI]

    -55% to 80-85%, · Increased dependability of heat supply, · solving the problem of settlement heat supply

  2. Chapter 15: Commercial New Construction Protocol

    SciTech Connect (OSTI)

    Keates, S.

    2014-09-01T23:59:59.000Z

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  3. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect (OSTI)

    Benton, N.

    2014-11-01T23:59:59.000Z

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  4. Light storage protocols in Tm:YAG

    E-Print Network [OSTI]

    T. Chanelière; R. Lauro; J. Ruggiero; J. -L. Le Gouët

    2009-11-17T23:59:59.000Z

    We present two quantum memory protocols for solids: A stopped light approach based on spectral hole burning and the storage in an atomic frequency comb. These procedures are well adapted to the rare-earth ion doped crystals. We carefully clarify the critical steps of both. On one side, we show that the slowing-down due to hole-burning is sufficient to produce a complete mapping of field into the atomic system. On the other side, we explain the storage and retrieval mechanism of the Atomic Frequency Comb protocol. This two important stages are implemented experimentally in Tm$^{3+}$- doped yttrium-aluminum-garnet crystal.

  5. Optimal measurement-based feedback control for a single qubit: a candidate protocol

    E-Print Network [OSTI]

    Ashkan Balouchi; Kurt Jacobs

    2014-07-30T23:59:59.000Z

    Feedback control of quantum systems via continuous measurement involves complex nonlinear dynamics. Except in very special cases, even for a single qubit optimal feedback protocols are unknown. Not even do intuitive candidates exist for choosing the measurement basis, which is the primary non-trivial ingredient in the feedback control of a qubit. Here we present a series of arguments that suggest a particular form for the optimal protocol for a broad class of noise sources in the regime of good control. This regime is defined as that in which the control is strong enough to keep the system close to the desired state. With the assumption of this form the remaining parameters can be determined via a numerical search. The result is a non-trivial feedback protocol valid for all feedback strengths in the regime of good control. We conjecture that this protocol is optimal to leading order in the small parameters that define this regime. The protocol can be described relatively simply, and as a notable feature contains a discontinuity as a function of the feedback strength.

  6. Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols

    E-Print Network [OSTI]

    Vadim Makarov; Johannes Skaar

    2007-11-23T23:59:59.000Z

    In quantum cryptosystems, variations in detector efficiency can be exploited to stage a successful attack. This happens when the efficiencies of Bob's two detectors are different functions of a control parameter accessible to Eve (e.g., timing of the incoming pulses). It has previously been shown that the Bennett-Brassard 1984 (BB84) protocol is vulnerable to this attack. In this paper, we show that several other protocols and encodings may also be vulnerable. We consider a faked states attack in the case of a partial efficiency mismatch on the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol, and derive the quantum bit error rate as a function of detector efficiencies. Additionally, it is shown how faked states can in principle be constructed for quantum cryptosystems that use a phase-time encoding, the differential phase shift keying (DPSK) and the Ekert protocols.

  7. Web Applications and Security Web protocol overview

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

  8. Security proofs of cryptographic protocols Eva Jencusova

    E-Print Network [OSTI]

    with FinePrint pdfFactory trial version http://www.fineprint.com #12;2 2 Database and logic abduction method is independent on used crypto-system in analyzing protocol. Our model DLA (=database and logic abduction that there exists knowledge to lead to an attack we use the logic abduction (top-down reasoning) to describe

  9. Optimal Decentralized Protocols for Electric Vehicle Charging

    E-Print Network [OSTI]

    Low, Steven H.

    into the electric power grid. EV charging increases the electricity demand, and potentially amplifies the peak1 Optimal Decentralized Protocols for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low Abstract--We propose decentralized algorithms for optimally scheduling electric vehicle (EV) charging

  10. Transposon extraction protocol Maitreya Dunham November 2006

    E-Print Network [OSTI]

    Dunham, Maitreya

    Transposon extraction protocol Maitreya Dunham November 2006 modification of the Qiagen HSE precipitate. Mix equal amounts of DNA from each digest if multiple digests. Extraction In a screw-cap tube (Qiagen), and water to bring to 30 µl total. Heat for 15 minutes at 95C with a 100C block on top (blocks

  11. Secure Anonymous RFID Authentication Protocols Christy Chatmon

    E-Print Network [OSTI]

    Burmester, Mike

    technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags do attention as is seen by an increase in its deployment, such as object tracking and monitoring, supply-chain management, and personal- ized information services. Numerous authentication protocols for RFID systems were

  12. Coherent feedback that beats all measurement-based feedback protocols

    E-Print Network [OSTI]

    Jacobs, Kurt

    We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, ...

  13. NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys: Surf Clams and Ocean Quahogs December 19..................................................................................................................................... 1 NOAA Fisheries Hydro-dynamic Clam Dredge Survey Protocols........................................................................... 5 Clam Dredge Construction and Repair

  14. Airblue: A System for Cross-Layer Wireless Protocol Development

    E-Print Network [OSTI]

    Ng, Man Cheuk

    Over the past few years, researchers have developed many crosslayer wireless protocols to improve the performance of wireless networks. Experimental evaluations of these protocols have been carried out mostly using ...

  15. Protocols for the Equitable Assessment of Marine Energy Converters 

    E-Print Network [OSTI]

    Ingram, David; Smith, George; Bittencourt-Ferreira, Claudio; Smith, Helen

    This book contains the suite of protocols for the equitable evaluation of marine energy converters (based on either tidal or wave energy) produced by the EquiMar consortium led by the University of Edinburgh. These protocols ...

  16. Coherent feedback that beats all measurement-based feedback protocols

    E-Print Network [OSTI]

    Kurt Jacobs; Xiaoting Wang; Howard M. Wiseman

    2014-07-21T23:59:59.000Z

    We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, where the latter are defined in a strict sense. The superiority of the coherent protocol is due to the fact that it can exploit a geodesic path in Hilbert space, a path that measurement-based protocols cannot follow.

  17. Performance Test Protocol for Evaluating Inverters Used in Grid...

    Office of Scientific and Technical Information (OSTI)

    Performance Test Protocol for Evaluating Inverters Used in Grid-Connected Photovoltaic Systems. Re-direct Destination: Abstract not provided....

  18. COMPUTER SUPPORT FOR PROTOCOL-BASED TREATMENT OF CANCER1

    E-Print Network [OSTI]

    Sergot, Marek

    COMPUTER SUPPORT FOR PROTOCOL-BASED TREATMENT OF CANCER1 PETER HAMMOND2 AND MAREK SERGOT3 July 1994 Cancer treatment is often carried out within protocol-based clinical trials. An oncology clinic may take of many protocols, the life-threatening nature of cancer and the toxicity of treatment side

  19. Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens,

    E-Print Network [OSTI]

    to infinity. We call such protocols asymp- totic and the fraction of distilled Bell states per initial copy#12;#12;Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens, Jeroen: July 13, 2006) We present a new asymptotic bipartite entanglement distillation protocol

  20. Wireless Sensor Networks: The Protocol Stack Iowa State University

    E-Print Network [OSTI]

    McCalley, James D.

    Wireless Sensor Networks: The Protocol Stack Mat Wymore Iowa State University Wind Energy Science Protocol Stack March 26, 2014 1 / 15 #12;One-Slide Refresher Wireless Sensor Networks (WSNs) Could be used;Wireless access point network Layers Application Google Chrome Transport Transmission Control Protocol (TCP

  1. Using CSP for protocol analysis: the Needham-Schroeder

    E-Print Network [OSTI]

    Doran, Simon J.

    Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

  2. PERFORMANCE EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR NETWORKS

    E-Print Network [OSTI]

    1/6 PERFORMANCE EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR NETWORKS Yi Qian 1 , Kejie Lu 2 on a priority based secure MAC protocol for vehicular networks and present detailed security and performance and simulations that the MAC protocol can achieve both security and QoS requirements for vehicular network safety

  3. Superior Energy Performance Measurement and Verification Protocol...

    Energy Savers [EERE]

    Energy Performance SEP and ISO 50001 Certification Process The Business Case for SEP Case Studies Certified Facilities Toolbox and Expertise About SEP About ISO 50001 Contact...

  4. Fuel ethanol produced from U.S. Midwest corn : help or hindrance to the vision of Kyoto?

    SciTech Connect (OSTI)

    Wang, M.; Saricks, C.; Wu, M.; Energy Systems

    1999-07-01T23:59:59.000Z

    In this study, we examined the role of corn-feedstock ethanol in reducing greenhouse gas (GHG) emissions, given present and near-future technology and practice for corn farming and ethanol production. We analyzed the full-fuel-cycle GHG effects of corn-based ethanol using updated information on corn operations in the upper Midwest and existing ethanol production technologies. Information was obtained from representatives of the U.S. Department of Agriculture, faculty of midwestern universities with expertise in corn production and animal feed, and acknowledged authorities in the field of ethanol plant engineering, design, and operations. Cases examined included use of E85 (85% ethanol and 15% gasoline by volume) and E10 (10% ethanol and 90% gasoline). Among key findings is that Midwest-produced ethanol outperforms conventional (current) and reformulated (future) gasoline with respect to energy use and GHG emissions (on a mass emission per travel mile basis). The superiority of the energy and GHG results is well outside the range of model noise. An important facet of this work has been conducting sensitivity analyses. These analyses let us rank the factors in the corn-to-ethanol cycle that are most important for limiting GHG generation. These rankings could help ensure that efforts to reduce that generation are targeted more effectively.

  5. 08/05/2011. Current Standard Operating Protocols (SOP), NCBS MS-Facility Proteomics Tryptic Digest Protocols

    E-Print Network [OSTI]

    Udgaonkar, Jayant B.

    Digest Protocols Protocol: 1 Ingel Digestion Protocol with Incubation Overnight Reference: In-gel digestion for mass spectrometric characterization of proteins and proteomes. Shevchenko et al. Nature in vacuum centrifuge. 8. Samples are now ready for digestion. Alternatively, they can be stored at -20o C

  6. Automated Verification of Quantum Protocols using MCMAS

    E-Print Network [OSTI]

    F. Belardinelli; P. Gonzalez; A. Lomuscio

    2012-07-04T23:59:59.000Z

    We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC), an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  7. Building America House Simulation Protocols (Revised)

    SciTech Connect (OSTI)

    Hendron, R.; Engebrecht, C.

    2010-10-01T23:59:59.000Z

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  8. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect (OSTI)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25T23:59:59.000Z

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  9. Protocols for Authorized Release of Concrete

    SciTech Connect (OSTI)

    Smith, Agatha Marie; Meservey, Richard Harlan; Chen, S.Y.; Powell, James Edward; PArker, F.

    2000-06-01T23:59:59.000Z

    Much of the clean or slightly contaminated concrete from Decontamination and Decommissioning (D&D) activities could be re-used. Currently, there is no standardized approach, or protocol, for managing the disposition of such materials. Namely, all potential disposition options for concrete, including authorized release for re-use, are generally not fully evaluated in D&D projects, so large quantities have been unduly disposed of as low-level radioactive waste. As a result, costs of D&D have become prohibitively high, hindering expedient cleanup of surplus facilities. The ability to evaluate and implement the option of authorized release of concrete from demolition would result in significant cost savings, while maintaining protection of environmental health and safety, across the Department of Energy (DOE) complex. The Idaho National Engineering and Environmental Laboratory (INEEL), Argonne National Laboratory East (ANL-E), and Vanderbilt University have teamed to develop a protocol for the authorized release of concrete, based on the existing DOE guidance of Order 5400.5, that applies across the DOE complex. The protocol will provide a streamlined method for assessing risks and costs, and reaching optimal disposal options, including re-use of the concrete within the DOE system.

  10. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    E-Print Network [OSTI]

    Yu, Hong

    2012-01-01T23:59:59.000Z

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  11. Soft-Decision-and-Forward Protocol for Cooperative Communication Networks Based on Alamouti Code

    E-Print Network [OSTI]

    No, Jong-Seon

    protocol called soft-decision-and- forward (SDF) is introduced. SDF protocol exploits the soft decision with low decoding complexity are proposed. From simulations, it can be seen that SDF protocol outperforms protocol called soft-decision- and-forward (SDF) is introduced. Unlike AF and DF protocols, SDF protocol

  12. Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols

    E-Print Network [OSTI]

    Duan, Pu

    2012-07-16T23:59:59.000Z

    ................... 17 3 The flowchart of the proposed PSI protocol ........................................................... 30 4 The flowchart of the proposed SH protocol ............................................................ 50 5 A secret handshake protocol...-preserving element matching protocols ................................ 13 5 Comparison between PSI protocols ........................................................................ 33 6 Comparison between SH protocols...

  13. Case Studies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Case Studies Case Studies The following case studies will be included in the HEP report. Final case studies are due January 7, 2013. Lattice Gauge Theories - Lead: Doug Toussaint...

  14. Error tolerance of two-basis quantum-key-distribution protocols using qudits and two-way classical communication

    SciTech Connect (OSTI)

    Nikolopoulos, Georgios M.; Ranade, Kedar S.; Alber, Gernot [Institut fuer Angewandte Physik, Technische Universitaet Darmstadt, 64289 Darmstadt (Germany)

    2006-03-15T23:59:59.000Z

    We investigate the error tolerance of quantum cryptographic protocols using d-level systems. In particular, we focus on prepare-and-measure schemes that use two mutually unbiased bases and a key-distillation procedure with two-way classical communication. For arbitrary quantum channels, we obtain a sufficient condition for secret-key distillation which, in the case of isotropic quantum channels, yields an analytic expression for the maximally tolerable error rate of the cryptographic protocols under consideration. The difference between the tolerable error rate and its theoretical upper bound tends slowly to zero for sufficiently large dimensions of the information carriers.

  15. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01T23:59:59.000Z

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  16. Adaptive protocols for mobile ad hoc networks

    E-Print Network [OSTI]

    Holland, Gavin Douglas

    2005-02-17T23:59:59.000Z

    . We investigate new link layer mechanisms that dynamically monitor and adapt to changes in link quality, including a protocol that uses common control messages to form a tight feedback control loop for adaptation of the link data rate to best match... of the presence of multirate links. We then investigate the performance of iv TCP, showing how communication outages caused by link failures and routing delays can be very detrimental to its performance. In response, we present a solution to this problem that uses...

  17. Privacy of encrypted Voice Over Internet Protocol

    E-Print Network [OSTI]

    Lella, Tuneesh Kumar

    2008-10-10T23:59:59.000Z

    of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the gen- eration of tra c whenever the sender detects a voice inactivity period. We use the simple Bayesian classi er and the complex HMM... (Hidden Markov Models) classi er to evaluate the performance of our attack. Then we describe the usage of acoustic features in our attack to improve the performance. We conclude by presenting a number of problems that need in-depth study in order to be e...

  18. Device-independent entanglement-based Bennett 1992 protocol

    E-Print Network [OSTI]

    Marco Lucamarini; Giuseppe Vallone; Ilaria Gianani; Giovanni Di Giuseppe; Paolo Mataloni

    2012-10-05T23:59:59.000Z

    In this paper we set forth a novel connection between the Bennett 1992 protocol and a Bell inequality. This allows us to extend the usual prepare-and-measure protocol to its entanglement-based formulation. We exploit a recent result in the frame of device-independent quantum key distribution to provide a simple, model-independent, security proof for the new protocol. The minimum efficiency required for a practical implementation of the scheme is the lowest reported to date.

  19. Fibred Coalgebraic Logic and Quantum Protocols

    E-Print Network [OSTI]

    Daniel Marsden

    2014-12-30T23:59:59.000Z

    Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

  20. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01T23:59:59.000Z

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  1. An immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol

    E-Print Network [OSTI]

    Osamu Hirota; Kaoru Kurosawa

    2006-04-06T23:59:59.000Z

    This paper presents the security analysis on the quantum stream cipher so called Yuen-2000 protocol (or $\\alpha\\eta$ scheme) against the fast correlation attack, the typical attack on stream ciphers. Although a very simple experimental model of the quantum stream cipher without a random mapper may be decrypted in the information theoretic sense by the fast correlation algorithm, it is not a basic feature of Yuen 2000 protocol. In fact, we clarify that there exists a randomization scheme which attains the perfect correlation immunity against such attacks under an approximation. And in this scheme, the running key correlation from the second randomization that determines the mapping patterns is dismissed also by quantum noise. In such a case, any fast correlation attack does not work on the quantum stream cipher.

  2. Office of Environment, Safety and Health Assessments Protocol...

    Energy Savers [EERE]

    the Development and Maintenance of Criteria Review and Approach Documents, March 2015 (Revision 1) - PROTOCOL - EA-30-01 Office of Environment, Safety and Health Assessments...

  3. APS Protocol for Reporting Construction Vibration Issues for...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    that shown in the online version. Advanced Photon Source APS Protocol for Reporting Construction Vibration Issues for Beamlines Section where used: This procedure describes the...

  4. aided routing protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    reduction in the number of routing messages. However, current position Yasinsac, Alec 2 Energy Efficient Location Aided Routing Protocol for Wireless MANETs CERN Preprints...

  5. The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport...

    Open Energy Info (EERE)

    calculation-toolsall-tools Cost: Free The Greenhouse Gas Protocol tool for mobile combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions...

  6. Dynamic Protocol Tuning Algorithms for High Performance Data...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Dynamic Protocol Tuning Algorithms for High Performance Data Transfers Event Sponsor: Mathematics and Computing Science Seminar Start Date: Apr 3 2015 - 2:00pm BuildingRoom:...

  7. DOE Cell Component Accelerated Stress Test Protocols for PEM...

    Broader source: Energy.gov (indexed) [DOE]

    CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) March 2007 Fuel cells, especially for...

  8. Cell Component Accelerated Stress Test Protocols for PEM Fuel...

    Broader source: Energy.gov (indexed) [DOE]

    USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May...

  9. acids extraction protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  10. aureus decolonisation protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  11. addfam study protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  12. antineoplastic combined chemotherapy protocols: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  13. afinos study protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  14. agrobacterium-mediated transformation protocol: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  15. antineoplastic protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  16. Protective Force Protocols for ESS Supported Performance Tests...

    Broader source: Energy.gov (indexed) [DOE]

    security force-on-force performance tests and exercises. Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 More Documents & Publications...

  17. BPA Response to Comments on Oversupply Management Protocol

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind energy producers, regional utilities, interest groups and others submitted approximately 90 comments on Bonneville Power Administration's Feb. 7 proposed protocol for...

  18. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    NONE

    1996-03-01T23:59:59.000Z

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  19. GGREENHOUSE JJUSTICE MOVING BEYOND KYOTO

    E-Print Network [OSTI]

    Delaware, University of

    for UNFCC COP-8 New Delhi, India 23 October - 01 November 2002 Center for Energy & Environmental Policy, YU-MI MUN, NOAH TOLY & YOUNG-DOO WANG Position Paper prepared for UNFCC COP-8 New Delhi, India 23 October - 01 November 2002 Center for Energy & Environmental Policy tel: 302.831.8405 · web: www

  20. Case Studies

    Broader source: Energy.gov [DOE]

    The following case studies are examples of integrating renewable energy into Federal new construction and major renovation projects. Additional renewable energy case studies are also available.

  1. Modelling unbounded parallel sessions of security protocols in CSP

    E-Print Network [OSTI]

    Roscoe, Bill

    Modelling unbounded parallel sessions of security protocols in CSP E. Kleiner and A.W. Roscoe that a simplification to earlier CSP models designed to prove protocols correct on the FDR model checker is valid of injective authentication. Essentially for historical reasons, that paper created a model with both

  2. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

  3. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

  4. SHUSH: Reactive Transmit Power Control For Wireless MAC Protocols

    E-Print Network [OSTI]

    Han, Richard Y.

    SHUSH: Reactive Transmit Power Control For Wireless MAC Protocols Anmol Sheth and Richard Han@cs.colorado.edu Abstract-- Asymmetric transmission ranges caused due to transmit power control have the undesirable effect access. In this paper we present a new reactive power controlled MAC protocol, SHUSH, which tackles

  5. A Power Control MAC Protocol for Ad Hoc Networks

    E-Print Network [OSTI]

    A Power Control MAC Protocol for Ad Hoc Networks Eun-Sun Jung Dept. of Computer Science Texas A This paper presents a power control MAC protocol that al- lows nodes to vary transmit power level on a per control. The main idea of these power control schemes is to use different power lev- els for RTS

  6. Distributed Temporal Logic for the Analysis of Security Protocol Models

    E-Print Network [OSTI]

    Basin, David

    , showing that it is sufficient to consider models in which the intruder completely controls the networkDistributed Temporal Logic for the Analysis of Security Protocol Models David Basin Department to reason about and relate different security-protocol models. This includes reasoning about model

  7. On the Security of the Ping-Pong Protocol

    E-Print Network [OSTI]

    Kim Bostroem; Timo Felbinger

    2008-07-07T23:59:59.000Z

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

  8. METHODOLOGY Open Access An improved pyrite pretreatment protocol for

    E-Print Network [OSTI]

    Halevy, Itay

    METHODOLOGY Open Access An improved pyrite pretreatment protocol for kinetic and isotopic studies, therefore, desirable. A robust standardized pretreatment protocol for removal of fine particles. Results: Our data demonstrate the presence of large fractions of S0 on untreated pyrite particle surfaces

  9. Cross-layered Synchronization Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Cross-layered Synchronization Protocol for Wireless Sensor Networks Thomas Beluch, Daniela. Advances in wireless sensor network performances and improvement of attainable bit rates allow research on such measurement systems using Wireless Sensor Networks (WSNs). However, current WSN synchronization protocols do

  10. Evaluating complex MAC protocols for sensor networks with APMC

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 Evaluating complex MAC protocols for sensor networks with APMC Micha¨el Cadilhac1 Thomas present an analysis of a MAC (Medium Access Control) protocol for wireless sensor net- works. The purpose insights about it performance. Keywords: Wireless sensor networks, approximate verification 1 Introduction

  11. Field and Lab Methods & Protocols University of Michigan

    E-Print Network [OSTI]

    Kling, George W.

    SAFETY AND ORDERING PROCEDURES 309 (VIII-4) HAZARDOUS MATERIALS AND WASTE 313 (VIII-5) PRINTERS 315 (VIIIField and Lab Methods & Protocols Kling Lab University of Michigan Updated: December 2012 In use from: May 2012 Protocol version: v2.9 Last update: 8 November 2013 1 #12;LAST UPDATE: 29 MAY 2013 1

  12. Adaptive Data Collection Protocol using Reinforcement Learning for VANETs

    E-Print Network [OSTI]

    Boyer, Edmond

    Adaptive Data Collection Protocol using Reinforcement Learning for VANETs Ahmed Soua, and Hossam. Here, an Adap- tive Data cOllection Protocol using rEinforcement Learning (ADOPEL) is proposed that drivers can be alerted in advance. Since each vehicle in a vehicular environment can detect a hazardous

  13. A Locationaided Poweraware Routing Protocol in Mobile Ad Hoc Networks

    E-Print Network [OSTI]

    Nahrstedt, Klara

    ­hop wireless ad­hoc networks, designing energy­efficient rout­ ing protocols is critical since nodes are power be mobile, demanding the energy­efficient routing protocol to be fully distributed and adaptive­ spect to end­to­end energy­efficient routes. Finally, preliminary simulation results are presented

  14. Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols

    E-Print Network [OSTI]

    Wang, Yu

    28223, USA {lcao2, tdahlber, ywang32}@uncc.edu Abstract-- Energy aware routing protocols metric and aim to save energy consumption per packet. However, such protocols do not take the nodes' energy capacity into account. Thus, the energy consumption is not fair among nodes in the network

  15. DTK Security Protocol: A Kerberos Infrastructure for Data Sensing Network

    E-Print Network [OSTI]

    Shenoy, Prashant

    DTK Security Protocol: A Kerberos Infrastructure for Data Sensing Network Xiaolong Li, Pengyu Zhang security protocol, is proposed in this paper to secure data sensing networks. With the use of symmetric to evaluate the performance of DTK, and their relationship is derived. Furthermore, simulation carried on real

  16. Implementation of Secure Quantum Protocol using Multiple Photons for Communication

    E-Print Network [OSTI]

    Sayonnha Mandal; Gregory Macdonald; Mayssaa El Rifai; Nikhil Punekar; Farnaz Zamani; Yuhua Chen; Subhash Kak; Pramode K. Verma; Robert C Huck; James Sluss

    2012-08-30T23:59:59.000Z

    The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.

  17. Improved protocols of secure quantum communication using W states

    E-Print Network [OSTI]

    Chitra Shukla; Anindita Banerjee; Anirban Pathak

    2012-04-20T23:59:59.000Z

    Recently, Hwang et al. [Eur. Phys. J. D. 61, 785 (2011)] and Yuan et al. [Int. J. Theo. Phys. 50, 2403 (2011)] have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.

  18. Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)

    E-Print Network [OSTI]

    Thomas, Andrew

    the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

  19. Multiple-Photon Absorption Attack on Entanglement-Based Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

    2011-02-16T23:59:59.000Z

    In elaborating on the multiple-photon absorption attack on Ekert protocol proposed in arXiv:1011.4740, we show that it can be used in other entanglement-based protocols, in particular the BBM92 protocol. In this attack, the eavesdropper (Eve) is assumed to be in control of the source, and she sends pulses correlated in polarization (but not entangled) containing several photons at frequencies for which only multiple-photon absorptions are possible in Alice's and Bob's detectors. Whenever the photons stemming from one pulse are dispatched in such a way that the number of photons is insufficient to trigger a multiple-photon absorption in either channel, the pulse remains undetected. We show that this simple feature is enough to reproduce the type of statistics on the detected pulses that are considered as indicating a secure quantum key distribution, even though the source is actually a mixture of separable states. The violation of Bell inequalities measured by Alice and Bob increases with the order of the multiple-photon absorption that Eve can drive into their detectors, while the measured quantum bit error rate decreases as a function of the same variable. We show that the attack can be successful even in the simplest case of a two-photon absorption or three-photon absorption attack, and we discuss possible countermeasures, in particular the use of a fair sampling test.

  20. Shortcomings of the Cartagena Protocol: Resolving the Liability Loophole at an International Level

    E-Print Network [OSTI]

    Kohm, Katherine E.

    2009-01-01T23:59:59.000Z

    Protocol both focus on the effects of transboundary shipping, hazardous wasteProtocol on Liability and Compensation for Damage Resulting from Transboundary Movements of Hazardous Wasteshazardous wastes and other wastes subject to the Convention. The Cartagena Protocol

  1. Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Horace P. Yuen

    2014-05-07T23:59:59.000Z

    In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

  2. RADCAL Operations Manual Radiation Calibration Laboratory Protocol

    SciTech Connect (OSTI)

    Bogard, J.S.

    1998-12-01T23:59:59.000Z

    The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

  3. A New Protocol of Continuous-Variable Entanglement Distillation

    E-Print Network [OSTI]

    Shi Jin; Xian-Min Jin; Joshua Nunn; Animesh Datta; Ian Walmsley

    2012-10-16T23:59:59.000Z

    We introduce a new protocol in continuous variable entanglement distillation that requires only linear temporal and constant physical or spatial resources.Compared with the existing protocols, our protocol uses atom-photon entanglement to substitute for atom-atom entanglement in existing protol, which will not only save the number of quantum memories, but also has the advantages in operation efficiency and temporal saving. The distillation can be realized by a fixed model of iterations, in which only three quantum memories and photon detectors are required.

  4. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  5. Parallel decomposition of the logical link control protocol

    E-Print Network [OSTI]

    Bajpai, Dhruv Haribanshnath

    1991-01-01T23:59:59.000Z

    INTRODUCTION II PROTOCOLS AND FINITE STATE MACHINES A. PROTOCOLS B. FINITE STATE MACHINES III LOGICAL LINK CONTROL PROTOCOL 1V LLC STATE TABLE DESCRIPTION A. LLC STATES V THE PS I ARCHITECTURE VI RESULTS A. LINK INITIALIZATION SUBMACHINES . . B... expressions that govern the transition are given below Bin I (A) SET ABME+ SET ABME (Ts=Vc=O, Vi=0) + SET ABME (Ts=Vc&, Vi =RIp). (B) DEACTIVATE LS. (G) ENTER LCL Busy + EXIT LCL Busy + LPDU Invalid + SEND XID + SET ADM+ Ti Expired+ Tl Expired+ TEST LINK...

  6. Protocol for secure quantum machine learning at a distant place

    E-Print Network [OSTI]

    Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

    2015-04-20T23:59:59.000Z

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A tradeoff between the inaccuracy and the learning time is also analyzed.

  7. Optimization Online - Quantum and classical coin-flipping protocols ...

    E-Print Network [OSTI]

    Ashwin Nayak

    2015-04-21T23:59:59.000Z

    Apr 21, 2015 ... In this analogy, classical systems correspond to linear programming ... Moreover, if the product of Alice and Bob's optimal cheating probabilities is 1/2, then exactly one party can perfectly control the outcome of the protocol.

  8. The Greenhouse Gas Protocol Initiative: Measurement and Estimation...

    Open Energy Info (EERE)

    in conjunction with other WRI tools (e.g., the GHG Protocol tools for stationary combustion and purchased electricity), or in conjunction with other non-WRI tools that a...

  9. Transaction Abort Rate Reduction with Prioritized Atomic Multicast Protocols

    E-Print Network [OSTI]

    Muñoz, Francesc

    and Francesc D. Mu~noz-Esco´i Instituto Tecnol´ogico de Inform´atica Universitat Polit`ecnica de Val Abort Rate Reduction with Prioritized Atomic Multicast Protocols Emili Miedes and Francesc D. Mu~noz-Esco

  10. Proposals for Non-PGM Catalyst Target and Test Protocols

    Broader source: Energy.gov (indexed) [DOE]

    Fuel Cell Tech Team Proposals for Non-PGM catalyst target and test protocols FCTT (USCAR) Shinichi Hirano (co-chair), Tarek Abdel-Baset, Balsu Lakshmanan, David Masten, Mark...

  11. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    crafted request to submit a user-controlled AJP protocol message to the Tomcat server. This can be exploited to spoof the name of the target user and the client IP address...

  12. User managed wireless protocol stacks Vijay T. Raisinghani

    E-Print Network [OSTI]

    Iyer, Sridhar

    User experience on mobile devices is bound by the device constraints of memory, processing power, battery life and variations in the wireless network. Cross layer feedback in the protocol stack is useful

  13. A scalable protocol for the synthesis and use of neomenthyldiphenylphosphine.

    E-Print Network [OSTI]

    Van Dyke, Aaron R. (Aaron Robert)

    2009-01-01T23:59:59.000Z

    A scalable and reproducible protocol has been developed for the preparation of (-)- neomenthyldiphenylphosphine ((-)-1) from inexpensive starting materials. This ligand was then utilized in the nickel-catalyzed reductive ...

  14. Modeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    -parallel poset verification is a powerful methodology for proving the design correctness of complex systemsModeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov Department verification methodologies has evolved in two directions: powerful, general techniques capable of accurately

  15. Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''

    E-Print Network [OSTI]

    Schlick, Tamar

    Biomolecular free energy profiles by a shootingÕumbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

  16. Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol

    SciTech Connect (OSTI)

    Osterwald, C. R.

    2008-03-01T23:59:59.000Z

    This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

  17. Dynamic address allocation protocols for Mobile ad hoc networks

    E-Print Network [OSTI]

    Patchipulusu, Praveena

    2001-01-01T23:59:59.000Z

    Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

  18. an Enhanced Slotted MAC Protocol for MANETs Marceau Coupechoux

    E-Print Network [OSTI]

    Coupechoux, Marceau

    CROMA - an Enhanced Slotted MAC Protocol for MANETs Marceau Coupechoux Institut Eurecom and Alcatel: +33 1 69 63 43 60 marceau.coupechoux@alcatel.fr Bruno Baynat University Pierre et Marie Curie, Paris

  19. A Study of Transport Protocols for Wide Area Scientific Applications

    SciTech Connect (OSTI)

    Vishal Misra

    2011-03-01T23:59:59.000Z

    This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

  20. Predictive Protocol Management with Contingency Planning for Wireless Sensor Networks

    E-Print Network [OSTI]

    Raja, Anita

    characteristics of the Radio-Frequency (RF) in which the network operates. I. INTRODUCTION Energy efficiency protocol model with contingency planning (PPM & CP). The premise behind the approach is that providing

  1. Distributed Protocols as Behaviours in Erlang Darren Demicoli

    E-Print Network [OSTI]

    Francalanza, Adrian

    Distributed Protocols as Behaviours in Erlang Darren Demicoli CS, ICT Univeristy of Malta ddem0003@um.edu.mt Adrian Francalanza CS, ICT Univeristy of Malta adrian.francalanza@um.edu.mt ABSTRACT We

  2. Modeling in dyadic protocols for training complex skills

    E-Print Network [OSTI]

    Jordan, Jeffrey Alan

    1991-01-01T23:59:59.000Z

    MODELING IN DYADIC PROTOCOLS FOR TRAINING COMPLEX SKILLS A Thesis by JEFFREY ALAN JORDAN Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE...) Charles FL Shea (Member) t n Worchel / e d of Department) / December 1991 ABSTRACT Modeling in Dyadic Protocols for Training Complex Skills. (December 1991) Jeffrey Alan Jordan, B. S. , Texas A&M University Chair of Advisory Committee: Dr. Wayne...

  3. Effective algorithms and protocols for wireless networking: a topological approach

    E-Print Network [OSTI]

    Zhang, Fenghui

    2008-10-10T23:59:59.000Z

    EFFECTIVE ALGORITHMS AND PROTOCOLS FOR WIRELESS NETWORKING: A TOPOLOGICAL APPROACH A Dissertation by FENGHUI ZHANG Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of DOCTOR OF PHILOSOPHY August 2008 Major Subject: Computer Science EFFECTIVE ALGORITHMS AND PROTOCOLS FOR WIRELESS NETWORKING: A TOPOLOGICAL APPROACH A Dissertation by FENGHUI ZHANG Submitted to the Office of Graduate Studies of Texas A&M University...

  4. New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless

    E-Print Network [OSTI]

    Jain, Raj

    New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

  5. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol and several new active

  6. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol and several new active

  7. Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches

    E-Print Network [OSTI]

    Anirban Pathak

    2014-11-24T23:59:59.000Z

    Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient. Here, we have shown that the efficiency of Hassanpour Houshmand (HH) protocol is not high, and there exist several approaches through which more efficient protocols for the same task can be designed. To establish this point, we have proposed an efficient protocol of controlled deterministic secure quantum communication which is based on permutation of particles (PoP) technique and is considerably efficient compared to HH protocol. We have also generalized this protocol into its bidirectional counterpart. Interestingly, bipartite entanglement (Bell state) is sufficient for the realization of the proposed protocols, but HH protocol and other existing protocols require at least tripartite entanglement. Further, we have shown that it is possible to construct a large number of efficient protocols of unidirectional and bidirectional controlled deterministic secure quantum communication by using various alternative approaches and different quantum states. These alternative protocols can be realized by modifying the existing protocols of quantum secure direct communication and deterministic secure quantum communication. We have also shown that it is possible to design completely orthogonal-state-based protocols for unidirectional and bidirectional controlled deterministic secure quantum communication.

  8. Mobile Application Part protocol implementation in OPNET Vladimir Vukadinovic and Ljiljana Trajkovic

    E-Print Network [OSTI]

    Trajkovic, Ljiljana

    , ljilja}@cs.sfu.ca Abstract This paper describes OPNET implementation of the Mobile Application Part (MAP) protocol within the General Packet Radio Service (GPRS) model. MAP represents an application layer protocol residing on top of the Signaling System 7 (SS7) protocol stack. In GPRS networks, MAP protocol supports

  9. Design and Performance Analysis of an Aeronautical Routing Protocol with Ground Station Updates

    E-Print Network [OSTI]

    Narra, Hemanth

    2011-08-31T23:59:59.000Z

    Aeronautical routing protocol (AeroRP) is a position-based routing protocol developed for highly dynamic airborne networks. It works in conjunction with the aeronautical network protocol (AeroNP). AeroRP is a multi-modal protocol that operates...

  10. A Simplified Hierarchical Dynamic Quantum Secret Sharing Protocol with Added Features

    E-Print Network [OSTI]

    Sandeep Mishra; Chitra Shukla; Anirban Pathak; R. Srikanth; Anu Venugopalan

    2014-09-06T23:59:59.000Z

    Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.

  11. Use of multiple digital libraries: a case study Ann Blandford

    E-Print Network [OSTI]

    Blandford, Ann

    Use of multiple digital libraries: a case study Ann Blandford Middlesex University Bounds Green University Bounds Green Road London, N11 2NQ, U.K. +44 20 8362 6905 H.Stelmaszewska @mdx.ac.uk Nick Bryan raised when digital libraries are used in a natural setting. The method used was a protocol analysis

  12. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    SciTech Connect (OSTI)

    Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

    2013-05-01T23:59:59.000Z

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  13. Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique

    E-Print Network [OSTI]

    Preeti Yadav; R. Srikanth; Anirban Pathak

    2014-09-09T23:59:59.000Z

    The Goldenberg-Vaidman (GV) protocol for quantum key distribution (QKD) uses orthogonal encoding states of a particle. Its security arises because operations accessible to Eve are insufficient to distinguish the two states encoding the secret bit. We propose a two-particle cryptographic protocol for quantum secure direct communication, wherein orthogonal states encode the secret, and security arises from restricting Eve from accessing any two-particle operations. However, there is a non-trivial difference between the two cases. While the encoding states are perfectly indistinguishable in GV, they are partially distinguishable in the bi-partite case, leading to a qualitatively different kind of information-vs-disturbance trade-off and also options for Eve in the two cases.

  14. Case Study

    Office of Environmental Management (EM)

    Case Study M2M Smart Grid Investment Grant 1 An irrigation pump connected to a web---to---wireless controller designed by M2M Communications. Agricultural Demand Response Program...

  15. Streaming multimedia over WMSNs: an online multipath routing protocol

    E-Print Network [OSTI]

    Medjiah, Samir; Asgari, Abolghasem Hamid

    2012-01-01T23:59:59.000Z

    Routing is a challenge to Wireless Multimedia Sensor Networks (WMSNs) for supporting multimedia applications due to nodes' energy constraints and computational capabilities, and the ways sensor nodes obtain forwarding information. In this paper, we propose an online multipath routing protocol that uses nodes' positions to make forwarding decisions at each hop. Real-time decisions are made without any need to have the entire network topology knowledge. The protocol achieves load-balancing and minimises nodes' energy consumption by utilizing: (a) smart greedy forwarding scheme for selecting next hop, and (b) walking back forwarding scheme to bypass network holes. Performance comparisons of the proposed protocol (schemes) are made with TPGF and GPSR. The results show that our schemes: (a) maximise the overall network lifespan by not draining energy from some specific nodes, (b) provide QoS delivery for video streams by using best nodes along the route, and (c) scale better in high density WMSN.

  16. A practical approach to the interGroup protocols

    SciTech Connect (OSTI)

    Berket, Karlo; Agarwal, Deborah A.; Chevassut, Olivier

    2001-11-12T23:59:59.000Z

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

  17. Information Security and Quantum Mechanics: Security of Quantum Protocols

    E-Print Network [OSTI]

    P. Oscar Boykin

    2002-10-28T23:59:59.000Z

    The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.

  18. Protocol development for evaluation of commercial catalytic cracking catalysts

    SciTech Connect (OSTI)

    Mitchell, M.M. Jr.; Moore, H.F. (Ashland Petroleum Co., KY (USA))

    1988-09-01T23:59:59.000Z

    A complete, new set of testing protocols has been developed for qualification of catalysts for Ashland's commercial catalytic cracking units. The objective of this test development is to identify new generations of improved cracking catalysts. Prior test protocols have classically utilized microactivity (MAT) testing of steamed virgin catalysts, while more advanced methods have utilized fixed fluid bed and/or circulating pilot units. Each of these techniques, however, have been limited by their correlation to commercial operations, weaknesses in metallation and preparation of pseudo-equilibrium catalysts, and mechanical constraints on the use of heavy, vacuum bottoms-containing feedstocks. These new protocols have been baselined, compared to commercial Ashland results on known catalytic cracking catalysts, and utilized to evaluate a range of potentially new catalyst samples.

  19. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  20. A test case generation approach for conformance testing of SDL systems1

    E-Print Network [OSTI]

    Aboulhamid, El Mostapha

    1 A test case generation approach for conformance testing of SDL systems1 C. Bourhfir2 , E This paper presents an approach for automatic executable test case and test sequence generation for a protocol modeled by an SDL system. Our methodology uses a uni- fied method which tests an Extended Finite

  1. Shor-Preskill Type Security-Proofs for Concatenated Bennett-Brassard 1984 Quantum Key Distribution Protocol

    E-Print Network [OSTI]

    W. -Y. Hwang; K. Matsumoto; H. Imai; J. Kim; H. -W. Lee

    2002-10-31T23:59:59.000Z

    We discuss long code problems in the Bennett-Brassard 1984 (BB84) quantum key distribution protocol and describe how they can be overcome by concatenation of the protocol. Observing that concatenated modified Lo-Chau protocol finally reduces to the concatenated BB84 protocol, we give the unconditional security of the concatenated BB84 protocol.

  2. Testing Protocol for Module Encapsulant Creep (Presentation)

    SciTech Connect (OSTI)

    Kempe, M. D.; Miller, D. C.; Wohlgemuth, J. H.; Kurtz, S. R.; Moseley, J. M.; Shah, Q.; Tamizhmani, G.; Sakurai, K.; Inoue, M.; Doi, T.; Masuda, A.

    2012-02-01T23:59:59.000Z

    Recently there has been an interest in the use of thermoplastic encapsulant materials in photovoltaic modules to replace chemically crosslinked materials, e.g., ethylene-vinyl acetate. The related motivations include the desire to: reduce lamination time or temperature; use less moisture-permeable materials; or use materials with better corrosion characteristics. However, the use of any thermoplastic material in a high-temperature environment raises safety and performance concerns, as the standardized tests currently do not expose the modules to temperatures in excess of 85C, yet modules may experience temperatures above 100C in operation. Here we constructed eight pairs of crystalline-silicon modules and eight pairs of glass/encapsulation/glass mock modules using different encapsulation materials of which only two were designed to chemically crosslink. One module set was exposed outdoors with insulation on the back side in Arizona in the summer, and an identical set was exposed in environmental chambers. High precision creep measurements and performance measurements indicate that despite many of these polymeric materials being in the melt state at some of the highest outdoor temperatures achievable, very little creep was seen because of their high viscosity, temperature heterogeneity across the modules, and in the case of the crystalline-silicon modules, the physical restraint of the backsheet. These findings have very important implications for the development of IEC and UL qualification and safety standards, and in regards to the necessary level of cure during the processing of crosslinking encapsulants.

  3. Performance Analysis of Link Rendezvous Protocol for Cognitive Radio Networks

    E-Print Network [OSTI]

    Turgut, Damla

    of a crisis. Our protocol does not rely on critical infrastructure. It is designed to be spectrally efficient then present the link rendezvous process in detail. At the heart of this process is an attention signal, inability to scale to meet the capacity demands of the crisis, and in some instances, difficulty

  4. Typhoon: A Reliable Data Dissemination Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Amir, Yair

    and energy consumption by up to three times compared to Deluge. These improvements are most prominent of these factors on the protocol's behavior. Moreover, we compare Typhoon's performance to that of Deluge--the de times faster than Deluge in sparse and lossy networks. This paper has five sections. We summarize

  5. Tone based MAC protocol for use with Adaptive Array Antennas

    E-Print Network [OSTI]

    Singh, Suresh

    Abstract--This paper presents a novel Tone-based 802.11b protocol for use in wireless networks where nodes understand the networking issues in WLAN. The predominant model used in most of this work has assumed omni-directional antennas in which the transmission energy is spread out in all the directions from the sender. In this work

  6. How to Use Bitcoin to Design Fair Protocols Iddo Bentov

    E-Print Network [OSTI]

    How to Use Bitcoin to Design Fair Protocols Iddo Bentov idddo@cs.technion.ac.il Ranjit Kumaresan then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-or-refund"), that formalizes and abstracts the exact properties we require from the Bitcoin network to achieve our goals

  7. REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL

    E-Print Network [OSTI]

    REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

  8. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01T23:59:59.000Z

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  9. On the construction of digest functions for manual authentication protocols

    E-Print Network [OSTI]

    Jeavons, Peter

    On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16­32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

  10. Reducing Transaction Abort Rates with Prioritized Atomic Multicast Protocols

    E-Print Network [OSTI]

    Muñoz, Francesc

    D. Mu~noz-Esco´i Instituto Tecnol´ogico de Inform´atica Universidad Polit´ecnica de Valencia 46022 Valencia (SPAIN) {emiedes,fmunyoz}@iti.upv.es Technical Report TR-ITI-ITE-07/22 E.Miedes,F.D.Mu~noz-Esco´i Transaction Abort Rates with Prioritized Atomic Multicast Protocols Emili Miedes, Francesc D. Mu~noz-Esco

  11. GUV formation protocol: -Ethanol, DI water and Kimwipes for cleaning

    E-Print Network [OSTI]

    Movileanu, Liviu

    GUV formation protocol: Materials: - Ethanol, DI water and Kimwipes for cleaning - 5-10 µl glass with ethanol and DI water using Kimwipes alternating the solvents at least twice to make sure any grease-ring using a Kimwipe and ethanol. Use Que-tip or grease slide to apply a thin layer of vacuum grease to one

  12. SMDP a Simple Multimedia Service Description Protocol on the Internet

    E-Print Network [OSTI]

    Lung, Chung-Horng

    SMDP ­ a Simple Multimedia Service Description Protocol on the Internet Qiang Nelson Yin Chung}@sce.carleton.ca Abstract Downloading multimedia content from the Internet becomes more and more popular. Consumers have. Based on the current model, it is time consuming for consumers to obtain the desired multimedia content

  13. Refrigerator Recycling Evaluation Protocol Doug Bruchs, The Cadmus Group, Inc.

    E-Print Network [OSTI]

    1 Refrigerator Recycling Evaluation Protocol Doug Bruchs, The Cadmus Group, Inc. Refrigerator Description Refrigerator recycling programs are designed to save energy through the removal of old-but- operable refrigerators from service. By offering free pick-up, providing incentives, and disseminating

  14. WHOP: Wormhole Attack Detection Protocol using Hound Packet

    E-Print Network [OSTI]

    Dharmaraja, S.

    WHOP: Wormhole Attack Detection Protocol using Hound Packet Saurabh Gupta Indian Institute infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack

  15. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute infrastructure in adhoc net- work makes it vulnerable to various attacks. MANET routing disrupts attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh

  16. Localized radio frequency communication using asynchronous transfer mode protocol

    DOE Patents [OSTI]

    Witzke, Edward L. (Edgewood, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM)

    2007-08-14T23:59:59.000Z

    A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

  17. Announced Dynamic Access Probability protocol for next generation wireless networks

    E-Print Network [OSTI]

    Levy, Hanoch

    Announced Dynamic Access Probability protocol for next generation wireless networks Z. NAOR #3; H probability. Keywords: wireless networks, multiple access, MAC #3; naorz@post.tau.ac.il y hanoch@cs.tau.ac.il 1 #12; 1 Introduction Wireless networks are rapidly expanding. Future satellite-based networks

  18. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    establishment mechanisms using symmetric cryptography, ISO/IEC 11770-2, appeared in 1996 [8], and no problems protocols (mechanisms 12 and 13 of ISO/IEC 11770- 2) both assume that the two parties who wish to establish centre). 1 #12;· In 2004 Cheng and Comley [5, 6] described two attacks on mechanism 12 from ISO/IEC 11770

  19. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    establishment mechanisms using symmetric cryptography, ISO/IEC 11770­2, appeared in 1996 [8], and no problems protocols (mechanisms 12 and 13 of ISO/IEC 11770­ 2) both assume that the two parties who wish to establish centre). 1 #12; . In 2004 Cheng and Comley [5, 6] described two attacks on mechanism 12 from ISO/IEC

  20. Energy Analysis of Four Wireless Sensor Network MAC Protocols

    E-Print Network [OSTI]

    Kinicki, Robert E.

    Energy Analysis of Four Wireless Sensor Network MAC Protocols Brian Bates, Andrew Keating, Robert-hop network topology were conducted using three wireless sensor net- work traffic patterns (broadcast which reduce radio energy consumption is important for wireless sensor networks (WSNs). The most

  1. Routing protocol for anycast communications in a wireless sensor network

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Routing protocol for anycast communications in a wireless sensor network Nancy El Rachkidy. 1 Introduction In the past few years, wireless sensor networks have been used in several moni University Complexe scientifique des C´ezeaux, 63177 Aubi`ere cedex, France Abstract. In wireless sensor

  2. PSFQ: A Reliable Transport Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Han, Richard Y.

    PSFQ: A Reliable Transport Protocol for Wireless Sensor Networks Chieh-Yih Wan Dept. of Electrical class of reliable data applications emerging in wireless sensor networks. For example, currently sensor of sensors in wireless sensor networks on the fly (e.g., during disaster recovery). Due to the application

  3. Towards a Protocol-Independent Internet Transport API

    E-Print Network [OSTI]

    Welzl, Michael

    a standardized API yet, and at the time of writing, the most recent Internet-draft specifying the SCTP API [1Towards a Protocol-Independent Internet Transport API Michael Welzl University of Oslo Email Gjessing University of Oslo Email: steing@ifi.uio.no Abstract--The conjoint API of TCP, UDP, UDP-Lite, SCTP

  4. A Review of Embedded Automotive Protocols Nicolas Navet

    E-Print Network [OSTI]

    Navet, Nicolas

    is given. Next, the current eorts of the automotive industry on middleware technologies which mayA Review of Embedded Automotive Protocols Nicolas Navet 1 , Françoise Simonot-Lion 2 April 14, 2008 of a large number of automotive networks such as LIN, J1850, CAN, FlexRay, MOST, etc.. This pa- per rst

  5. LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note

    E-Print Network [OSTI]

    Raizada, Manish N.

    LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note: The Luciferase enzyme is unstable-ground samples. 2. Collect liquid nitrogen from downstairs and place 24 frozen tissue samples inside. 3. Place the power. 14.The luminometer cuvettes can be reused, BUT ONLY if they have been thoroughly soaked

  6. The COMPOW Protocol for Power Control in Ad Hoc Networks

    E-Print Network [OSTI]

    Kawadia, Vikas

    .S Sreenivas and P.R. Kumar The Power Control problem · How do we choose the right transmit power level ­ Power;3 Affects battery life · Higher power transmission is unnecessary if the receiver is close of links is critical · Find a way to ensure bidirectionality without breaking existing protocols

  7. Air to Air Communication Protocol Arjan Durresi1

    E-Print Network [OSTI]

    Jain, Raj

    1 Air to Air Communication Protocol Arjan Durresi1 , Vamsi Paruchuri1 , Leonard Barolli2 and Raj. Louis, MO 63130, USA 314-935-4963, jain@cse.wustl.edu Abstract--We present Air to Air Communication (AAC........................................................2 3. AIR TO AIR COMMUNICATION..............................3 4. SIMULATIONS

  8. Reply to "Comment on Protocol for Direct Counterfactual Quantum Communication"

    E-Print Network [OSTI]

    Hatim Salih; Zheng-Hong Li; M. Al-Amri; M. Suhail Zubairy

    2014-04-28T23:59:59.000Z

    In reply to Vaidman's Comment [arXiv:1304.6689], we show that his claim that our Protocol for Direct Counterfactual Quantum Communication [PRL 110, 170502 (2013), arXiv:1206.2042] is counterfactual only for one type of information bit is wrong.

  9. Survivability validation protocol issues for a system-of-systems

    SciTech Connect (OSTI)

    Brock, G.; Ianacone, K.J.; Stringer, T.A. [Kaman Sciences Corp., Colorado Springs, CO (United States)

    1993-08-01T23:59:59.000Z

    This paper illuminates the various issues confronting a protocol developer as he attempts to construct a system-of-systems (SOS) survivability validation protocol. These issues are considered in the context of a Battle Management Command, Control, and Communications (BMC{sup 3}) network in the form of a Hypothetical System Architecture consisting of air, sea, ground, and space platforms. The purpose of the protocol of concem is to validate the nuclear survivability of the BMC{sup 3} SOS. To achieve this validation, the combined susceptibilities of the SOS platforms and communications links must be considered. A basic SOS simulation concept is described, which assumes individual platform survivability. The nuclear environments to be considered in the simulation are outlined with a discussion of the relationship to basic system susceptibility. Various validation concepts for the SOS protocol are summarized in relation to the life cycle phase during which they would be utilized. Computer simulation issues are discussed, including the environments to be modeled, validation of the codes, documentation, and configuration control. Concluding remarks center on the most likely way of simulating nuclear effects and on treating simulation tools like mission critical items.

  10. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  11. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  12. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  13. An Authentication and Security Protocol for Mobile Computing

    E-Print Network [OSTI]

    Zheng, Yuliang

    networks such as public switched telephone/data networks, and hence many security issues with wire-line-air transmission of signals and low power supply of a mobile user. #12;When examining security in a wirelessAn Authentication and Security Protocol for Mobile Computing Yuliang Zheng Monash University Mc

  14. Energy Aware Implementation of an Ad Hoc Routing Protocol

    E-Print Network [OSTI]

    Brown, Timothy X.

    Energy Aware Implementation of an Ad Hoc Routing Protocol by Shweta Bhandare Scriptor B in Telecommunications Department of InterDisciplinary Telecommunications 2003 #12;This thesis entitled: Energy Aware mentioned discipline. #12;iii Scriptor, Shweta Bhandare (M.S., Telecommunications) Energy Aware

  15. Safeguards Agreement and Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-01-07T23:59:59.000Z

    To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

  16. Lightweight Protocol Suite for Wireless Sensor Networks: Design and Evaluation

    E-Print Network [OSTI]

    Huang, Changcheng

    , China Graduate School of the Chinese Academy of Sciences, Beijing, 100049, China E-mail: {chenhaiming phenomena [1]. Forecasting its wide application in both civilian and industrial fields, more and more are on the networking issues and energy consumption problems. To date, lots of efficient protocols have been proposed

  17. A proposed protocol for remote control of automated assessment devices

    SciTech Connect (OSTI)

    Kissock, P.S. [AlliedSignal FM and T/NM, Albuquerque, NM (United States); Pritchard, D.A. [Sandia National Labs., Albuquerque, NM (United States)

    1996-12-31T23:59:59.000Z

    Systems and devices that are controlled remotely are becoming more common in security systems in the US Air Force and other government agencies to provide protection of valuable assets. These systems reduce the number of needed personnel while still providing a high level of protection. However, each remotely controlled device usually has its own communication protocol. This limits the ability to change devices without changing the system that provides the communications control to the device. Sandia is pursuing a standard protocol that can be used to communicate with the different devices currently in use, or may be used in the future, in the US Air Force and other government agencies throughout the security community. Devices to be controlled include intelligent pan/tilt mounts, day/night video cameras, thermal imaging cameras, and remote data processors. Important features of this protocol include the ability to send messages of varying length, identify the sender, and more importantly, control remote data processors. This paper describes the proposed public domain protocol, features, and examples of use. The authors hope to elicit comments from security technology developers regarding format and use of remotely controlled automated assessment devices.

  18. A Program Logic for Verifying Secure Routing Protocols

    E-Print Network [OSTI]

    Sandholm, Tuomas W.

    protocol implementations; and thus, both verifica- tion and empirical evaluation of secure routing based on SANDLog specification and ran the code in simulation. 1 Introduction In recent years, we have, evaluated primarily experimentally, and their security properties shown via informal reasoning. Existing

  19. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  20. An efficient protocol for radiochromic film dosimetry combining calibration and measurement in a single scan

    SciTech Connect (OSTI)

    Lewis, David; Micke, Andre; Yu Xiang; Chan, Maria F. [Advanced Materials Group, Ashland Inc., 1361 Alps Road, Wayne, New Jersey 07470 (United States); Department of Medical Physics, Memorial Sloan-Kettering Cancer Center, 136 Mountain View Boulevard, Basking Ridge, New Jersey 07920 (United States)

    2012-10-15T23:59:59.000Z

    Purpose: Radiochromic film provides dose measurement at high spatial resolution, but often is not preferred for routine evaluation of patient-specific intensity modulated radiation therapy (IMRT) plans owing to ease-of-use factors. The authors have established an efficient protocol that combines calibration and measurement in a single scan and enables measurement results to be obtained in less than 30 min. This avoids complications due to postexposure changes in radiochromic film that delay the completion of a measurement, often for up to 24 h, in commonly used methods. In addition, the protocol addresses the accuracy and integrity of the measurement by eliminating environmental and interscan variability issues. Methods: The authors collected dose-response data from six production lots of Gafchromic EBT3 film and three production lots of EBT2 film at doses up to 480 cGy. In this work, the authors used seven different scanners of two different models-Epson 10000XL and V700; postexposure times before scanning from 30 min to 9 days; ambient temperatures for scanning spanning 11 Degree-Sign C; and two film orientations. Scanning was in 48-bit RGB format at 72 dpi resolution. Dose evaluation was conducted using a triple-channel dosimetry method. To evaluate the measurement protocol, patient specific IMRT and volumetric modulated arc therapy (VMAT) plans were exposed onto EBT3 films on a Varian Trilogy Linac. Film scanning was done following the protocol under a number of different conditions and the dose maps were analyzed to demonstrate the equivalence of results. Results: The results indicated that the dose-response data could be fit by a set of related rational functions leading to the description of a generic calibration curve. A simplified dosimetry protocol was established where dose-response data for a specific film lot, scanner, and scanning conditions could be derived from two films exposed to known doses. In most cases only one calibrated exposure was required since the dose for one of the films could be zero. Using the Gamma test criterion of 2%/2 mm to evaluate the measurements, similar passing rates ranging between about 95% and 99% for the fields studied were obtained from application films digitized under a variety of conditions all of them different than the conditions under which the calibration films were scanned. Conclusions: The authors have developed a simplified and efficient protocol to measure doses delivered by an IMRT or VMAT plan using only the patient film, one calibration film, one unexposed film, and applying a single scan to acquire a digital image for calculation and analysis. The simplification and timesaving offer a potential practical solution for using radiochromic film for routine treatment plan quality assurance without sacrificing spatial resolution for convenience.

  1. Security bound of two-basis quantum-key-distribution protocols using qudits

    SciTech Connect (OSTI)

    Nikolopoulos, Georgios M.; Alber, Gernot [Institut fuer Angewandte Physik, Technische Universitaet Darmstadt, 64289 Darmstadt (Germany)

    2005-09-15T23:59:59.000Z

    We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.

  2. Rethinking Internet Traffic Management: From Multiple Decompositions to a Practical Protocol

    E-Print Network [OSTI]

    Singh, Jaswinder Pal

    management spans congestion control (at end hosts), routing protocols (on routers), and traffic engineering (by network operators). Historically, this division of functionality evolved organically- tures of the algorithms, we construct TRUMP: a traffic man- agement protocol that is distributed

  3. TDROP: A routing protocol for physically hierarchical ad hoc mobile networks

    E-Print Network [OSTI]

    Ahmed, Zaheer

    2000-01-01T23:59:59.000Z

    Many protocols for routing in mobile ad hoc networks have been proposed. None of these protocols differentiates mobile nodes based on their physical characteristics and also there is only one proposal for connecting ad hoc networks together to form...

  4. Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on Diesel Aftertreatment (Agreement 13415) Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on...

  5. Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

    SciTech Connect (OSTI)

    Tamaki, Kiyoshi; Koashi, Masato; Imoto, Nobuyuki [CREST Research Team for Interacting Carrier Electronics, School of Advanced Sciences, Graduate University for Advanced Studies (SOKENDAI), Hayama, Kanagawa 240-0193 (Japan)

    2003-03-01T23:59:59.000Z

    The security of two-state quantum-key distribution against individual attack is estimated when the channel has losses and noises. We assume that Alice and Bob use two nonorthogonal single-photon polarization states. To make our analysis simple, we propose a modified B92 protocol in which Alice and Bob make use of inconclusive results, and Bob performs a kind of symmetrization of received states. Using this protocol, Alice and Bob can estimate Eve's information gain as a function of a few parameters that reflect the imperfections of devices, or Eve's disturbance. In some parameter regions, Eve's maximum information gain shows counterintuitive behavior, namely, it decreases as the amount of disturbances increases. For a small noise rate, Eve can extract perfect information in the case where the angle between Alice's two states is small or large, while she cannot extract perfect information for intermediate angles. We also estimate the secret key gain, which is the net growth of the secret key per pulse. We show the region where the modified B92 protocol over a realistic channel is secure against individual attack.

  6. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures

    SciTech Connect (OSTI)

    Burgess, R.; Blake, C.; Tracy, C. E.

    2008-09-01T23:59:59.000Z

    This test protocol document includes an overview of hydrogen sensor technologies, test hardware requrements, and an outline of potential testing.

  7. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    SciTech Connect (OSTI)

    Mickalonis, J.

    2014-09-16T23:59:59.000Z

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  8. On the Performance of Collision Avoidance Protocols in Ad-Hoc Networks

    E-Print Network [OSTI]

    Paterakis, Michael

    the dialogue-based scheme. Examples of such protocols are: MACA [1], MACAW [2], DBTMA [3], FPRP [5], HRMA [7

  9. Performance Test Protocol for Evaluating Inverters Used in Grid-Connected

    E-Print Network [OSTI]

    Performance Test Protocol for Evaluating Inverters Used in Grid-Connected Photovoltaic Systems....................................................................................... 6 4.1 Inverter Size

  10. INSPECTING THE SOURCE CODE THAT IMPLEMENTS THE PPP PROTOCOL IN LINUX

    E-Print Network [OSTI]

    Smith, Spencer

    INSPECTING THE SOURCE CODE THAT IMPLEMENTS THE PPP PROTOCOL IN LINUX By SRDJAN RUSOVAN, B Code that Implements the PPP Protocol in Linux AUTHOR: Srdjan Rusovan, B.Sc. (University of Belgrade: viii, 145 #12;iii ABSTRACT The Point-to-Point Protocol (PPP) is a widely accepted standard used

  11. Internalising agents in CSP protocol models P.J. Broadfoot and A.W. Roscoe

    E-Print Network [OSTI]

    Roscoe, Bill

    . . An essential part of our CSP models is knowing what a given agent believes about the progress of its protocolInternalising agents in CSP protocol models P.J. Broadfoot and A.W. Roscoe Oxford University of cryptographic protocols using CSP [11] and FDR [5], often via extensions to Casper [6]. Since FDR can only check

  12. A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments

    SciTech Connect (OSTI)

    Top, P; Kohlhepp, V; Dowla, F

    2005-09-30T23:59:59.000Z

    A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

  13. Dynamic Total Order Protocol Replacement Emili Miedes, Francesc D. Mu~noz-Escoi

    E-Print Network [OSTI]

    Muñoz, Francesc

    Dynamic Total Order Protocol Replacement Emili Miedes, Francesc D. Mu~noz-Esco´i InstitutoMiedesetal.:DynamicTotalOrderProtocolReplacementITI-SIDI-2012/009 #12;#12;Dynamic Total Order Protocol Replacement Emili Miedes, Francesc D. Mu~noz-Esco

  14. A Taxonomy of Routing Protocols for Wireless Sensor Networks Gergely Acs, Levente Buttyan

    E-Print Network [OSTI]

    Levente, Buttyán

    A Taxonomy of Routing Protocols for Wireless Sensor Networks Gergely ´Acs, Levente Butty application scenarios. In this work, we propose a taxonomy of sensor network routing protocols, and classify the mainstream protocols proposed in the literature using this taxonomy. We distinguish five families

  15. Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky

    E-Print Network [OSTI]

    Zelikovsky, Alexander

    Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing pro- tocols and workload balancing techniques for improving MANET routing protocols and energy efficiency. We give new routing protocol

  16. QoS-aware Optimization Strategy for Security Ranking in SSL Protocol , Zhe Tang 1

    E-Print Network [OSTI]

    Wu, Jie

    QoS-aware Optimization Strategy for Security Ranking in SSL Protocol Fang Qi 1 , Zhe Tang 1 socket layer protocol (SSL) is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the SSL handshake protocol is the server's RSA

  17. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Wagner, David

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised November 19, 1996 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol

  18. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Boult, Terrance E.

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised April 15, 1997 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol

  19. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised April 15, 1997 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol

  20. An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network

    E-Print Network [OSTI]

    Brown, Timothy X.

    An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi the necessary features of an on-demand minimum energy routing protocol and suggests mechanisms the performance of an on-demand minimum energy routing protocol in terms of energy savings with an existing on

  1. An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network

    E-Print Network [OSTI]

    An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi of an on-demand minimum energy routing protocol and suggests mechanisms for their imple- mentation. We of an on-demand minimum energy routing protocol in terms of energy savings with an existing on-demand ad

  2. A CDMA-Based, Self-Organizing, Location-Aware Media Access Control Protocol

    E-Print Network [OSTI]

    New South Wales, University of

    protocols for sensor networks such as S-MAC [12] primarily prioritize energy-efficiency over latency. Our MAC protocols for sensor networks such as S-MAC [12] primarily prioritize energy-efficiency over protocol design balances the con- siderations of energy-efficiency, latency, accuracy, and fault

  3. A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks

    E-Print Network [OSTI]

    Demirbas, Murat

    A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks Murat Abstract RTS-CTS handshake based protocols achieve "reliable unicast" by eliminating the hidden node. Here we present a simple, light-weight, and self- stabilizing MAC protocol, namely Busy Elimination

  4. PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Shihada, Basem

    PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks Lei Tang-MAC (Predictive-Wakeup MAC), a new energy-efficient MAC protocol based on asyn- chronous duty cycling. In PW it to X-MAC, WiseMAC, and RI-MAC, three previous energy-efficient MAC protocols, under multiple concurrent

  5. Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security

    E-Print Network [OSTI]

    Perkins, Richard A.

    Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland .........................................................................................................3 #12;TEST AND EVALUATION PROTOCOL TEP NO. N42.35 PREPARED BY: DIV682 TITLE: Radiation Detection and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security 1. Scope

  6. Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland..........................................................................................................3 #12;TEST AND EVALUATION PROTOCOL TEP NO. N42.35 PREPARED BY: DIV682 TITLE: Radiation Detection and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security 1. Scope

  7. Protocols for conducting Environmental Management Assessments of DOE organizations

    SciTech Connect (OSTI)

    Not Available

    1993-08-01T23:59:59.000Z

    To assess the effectiveness of DOE`s environmental programs, the Office of Environmental Audit conducts Environmental Management Assessments of DOE programs and facilities. These assessments take a broad programmatic view of environmental systems which may cover multiple sites. The focus of the assessment is on the infrastructure, systems, programs, and tools to manage environmental issues, not on the compliance issues themselves. Protocols have been developed to assist in the conduct of Environmental Management Assessments. The protocols are, based on and serve as implementing guidelines for the Environmental Management Section of ``Performance Objectives and Criteria for Conducting DOE Environmental Audits`` (DOE/EH-022). They are intended to provide guidance to the Assessment Team in conducting these reviews.

  8. The thermodynamics of creating correlations: Limitations and optimal protocols

    E-Print Network [OSTI]

    David Edward Bruschi; Martí Perarnau-Llobet; Nicolai Friis; Karen V. Hovhannisyan; Marcus Huber

    2015-03-11T23:59:59.000Z

    We establish a rigorous connection between fundamental resource theories at the quantum scale. Correlations and entanglement constitute indispensable resources for numerous quantum information tasks. However, their establishment comes at the cost of energy, the resource of thermodynamics, and is limited by the initial entropy. Here, the optimal conversion of energy into correlations is investigated. Assuming the presence of a thermal bath, we establish general bounds for arbitrary systems and construct a protocol saturating them. The amount of correlations, quantified by the mutual information, can increase at most linearly with the available energy, and we determine where the linear regime breaks down. We further consider the generation of genuine quantum correlations, focusing on the fundamental constituents of our universe: fermions and bosons. For fermionic modes, we find the optimal entangling protocol. For bosonic modes, we show that while Gaussian operations can be outperformed in creating entanglement, their performance is optimal for high energies.

  9. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  10. Case Study

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China U.S. Department ofJuneWaste To Wisdom:EnergyJoshua DeLung What does thisCase

  11. Case Studies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWPSuccess StoriesFebruary 26,ComputersTrinitytheOptimizationCase Studies

  12. Security Cases

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMay 2015ParentsMiddle| DepartmentAchievementEnergyWide Areasecurity-cases

  13. Single-step distillation protocol with generalized beam splitters

    SciTech Connect (OSTI)

    Martin-Delgado, M. A.; Navascues, M. [Departamento de Fisica Teorica I, Universidad Complutense, 28040 Madrid, (Spain)

    2003-07-01T23:59:59.000Z

    We develop a distillation protocol for multilevel qubits (qudits) using generalized beam splitters like in the proposal of Pan et al. for ordinary qubits. We find an acceleration with respect to the scheme of Bennet et al. when extended to qudits. It is also possible to distill entangled pairs of photons carrying orbital angular momenta states that conserve the total angular momenta as those produced in recent experiments.

  14. Protocols of radiocontaminant air monitoring for inhalation exposure estimates

    SciTech Connect (OSTI)

    Shinn, J.H.

    1995-09-01T23:59:59.000Z

    Monitoring the plutonium and americium particle emissions from soils contaminated during atmospheric nuclear testing or due to accidental releases is important for several reasons. First, it is important to quantify the extent of potential human exposure from inhalation of alpha-emitting particles, which is the major exposure pathway from transuranic radionuclides. Second, the information provided by resuspension monitoring is the basis of criteria that determine the target soil concentrations for management and cleanup of contaminated soil sites. There are other radioactive aerosols, such as the fission products (cesium and strontium) and neutron-activation products (europium isotopes), which may be resuspended and therefore necessary to monitor as well. This Standard Protocol (SP) provides the method used for radiocontaminant air monitoring by the Health and Ecological Assessment Division (formerly Environmental Sciences Division), Lawrence Livermore National Laboratory, as developed and tested at Nevada Test Site (NTS) and in the Marshall Islands. The objective of this SP is to document the applications and methods of monitoring of all the relevant variables. This protocol deals only with measuring air concentrations of radionuclides and total suspended particulates (TSP, or {open_quotes}dust{close_quotes}). A separate protocol presents the more difficult measurements required to determine transuranic aerosol emission rates, or {open_quotes}resuspension rate{close_quotes}.

  15. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    SciTech Connect (OSTI)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01T23:59:59.000Z

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  16. Nuclear Energy Governance and the Politics of Social Justice: Technology, Public Goods, and Redistribution in Russia and France

    E-Print Network [OSTI]

    Grigoriadis, Theocharis N

    2009-01-01T23:59:59.000Z

    Essentials, March 2007. OECD/Nuclear Energy Agency. "Nuclear Energy and the Kyoto Protocol"OECD/IEA Report OECD/Nuclear Energy Agency. "Nuclear Energy

  17. Biosampling Case Children with Leukemia (Acute Lymphocytic and Myelocytic Leukemia) and a Reference Population in Sierra Vista, Arizona

    E-Print Network [OSTI]

    Biosampling Case Children with Leukemia (Acute Lymphocytic and Myelocytic Leukemia) and a Reference. Statistical methods E. Investigation Protocol, Biosampling of case Children with Leukemia (Acute Lymphocytic and Acute Myelocytic Leukemia) and a Reference Population in Sierra Vista, Arizona 2 #12;Tables 1. Selected

  18. Efficient protocols for deterministic secure quantum communication using GHZ-like states

    E-Print Network [OSTI]

    Anindita Banerjee; Anirban Pathak

    2012-01-18T23:59:59.000Z

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols can be modified to an equivalent but more efficient protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed in detail and are critically compared with the existing protocols. It is shown that the proposed protocols are highly efficient. It is also shown that all the physical systems where dense coding is possible can be used to design maximally efficient protocol of DSQC and QSDC. Further, it is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols of the present kind. We have shown that there exist a large class of quantum state which can be used to design maximally efficient DSQC and QSDC protocols of the present kind. It is further, observed that maximally efficient QSDC protocols are more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate.

  19. NP Case Studies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HPC Requirements Reviews Requirements Reviews: Target 2014 Nuclear Physics (NP) Case Studies Case Studies The core of the NERSC requirements workshops are the case...

  20. Algorithms, Protocols & Systems for Remote Observation Using Networked Robotic Cameras

    E-Print Network [OSTI]

    Qin, Ni

    2010-01-16T23:59:59.000Z

    assist in waste cleanup using Point- and-Direct (PAD) commands. Users point to cleanup locations in a shared image and a robot excavates each location in turn. Recent developments in MOSR systems can be found in [26,27]. In [27] Goldberg et al. propose...ALGORITHMS, PROTOCOLS AND SYSTEMS FOR REMOTE OBSERVATION USING NETWORKED ROBOTIC CAMERAS A Dissertation by NI QIN Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR...

  1. Verifying a Simplified Fuel Oil Flow Field Measurement Protocol

    SciTech Connect (OSTI)

    Henderson, H.; Dentz, J.; Doty, C.

    2013-07-01T23:59:59.000Z

    The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

  2. Addendum to the Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

    2012-12-01T23:59:59.000Z

    As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  3. The two phase commit protocol simulation and analysis

    E-Print Network [OSTI]

    Bokil, Anupam

    1993-01-01T23:59:59.000Z

    IDENTIFICATION II. A Failures in a. Distributed DBMS 10 HI ATOIYIIC COMMITMENT HI. A Uncertainty Period . HI. B Blocking HI C Independent Recovery 17 17 IU THE TWO PHASE COMMIT PROTOCOL V111 CHAPTER Pa, ge IV. A Timeout Actions 21 IV. B Recovery..., 55 LIST OF TABLES TABLE Page Comparison of three versions of the two phase comniit CHAPTER I INTRODUCTION A database management system(DBMS) consists of a collection of interrelated, persis- tent data. and a set of programs to access this data...

  4. ASHRAE's New Performance Measurement Protocols for Commercial Buildings

    E-Print Network [OSTI]

    Haberl, J.; Davies, H.; Owens, B.; Hunn, B.

    meters. Figure 8 shows an example of photograph of a lighting modelcompared with a simulated image using Radiance software. Chapter 5:Acoustics (CurtEichelberger). In Chapter 5 protocols are provided for the performance measurement of indoor acoustics...-metering of specific water using loads such as landscapewateringor coolingtowers. In a similar fashion as Level 1, the benchmark for Level 2 would be a comparison to a national database.Level 3 would consist of Level 2 information and hourly metering from data loggers...

  5. Generic protocol for environmental audits at federal facilities

    SciTech Connect (OSTI)

    NONE

    1989-08-01T23:59:59.000Z

    The Generic Protocol is a supplement to earlier efforts by EPA to provide technical assistance to Federal agencies on environmental auditing. EPA`s Office of Federal Activities (OFA) issued the Federal Facility Compliance Strategy (referred to as the `Yellow Book`), prepared in 1984 and revised in 1988, as a framework for EPA`s media programs to follow to ensure that Federal facilities are fully integrated into Federal and State compliance monitoring and enforcement activities. The policy encourages Federal agencies to voluntarily develop comprehensive auditing programs to ensure environmental compliance.

  6. Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014, an OHASeptember 2010 |ofDepartment of Energy November 2012 Protocol

  7. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMay 2015 < prev nextEnergy Consumer Privacy whileProtocol for

  8. Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Ahvar, Ehsan; Piran, Mohammad Jalil

    2011-01-01T23:59:59.000Z

    Many energy-aware routing protocols have been proposed for wireless sensor networks. Most of them are only energy savers and do not take care about energy balancing. The energy saver protocols try to decrease the energy consumption of the network as a whole; however the energy manager protocols balance the energy consumption in the network to avoid network partitioning. This means that energy saver protocols are not necessarily energy balancing and vice versa. However, the lifetime of wireless sensor network is strictly depending on energy consumption; therefore, energy management is an essential task to be considered. This paper proposes an energy aware routing protocol, named FEAR, which considers energy balancing and energy saving. It finds a fair trade-off between energy balancing and energy saving by fuzzy set concept. FEAR routing protocol is simulated and evaluated by Glomosim simulator.

  9. Adding Priorities to Total Order Broadcast Protocols Emili Miedes, Francesc D. Mu~noz-Escoi

    E-Print Network [OSTI]

    Muñoz, Francesc

    Adding Priorities to Total Order Broadcast Protocols Emili Miedes, Francesc D. Mu~noz-Esco,fmunyoz}@iti.upv.es Technical Report TR-ITI-ITE-07/23 (supersedes TR-ITI-ITE-07/07) E.Miedes,F.D.Mu~noz-Esco´i:AddingPrioritiestoTotalOrderBroadcastProtocolsTR-ITI-ITE-07/23( #12;#12;Adding Priorities to Total Order Broadcast Protocols Emili Miedes, Francesc D. Mu~noz-Esco

  10. On the Cost of Prioritized Atomic Multicast Protocols Emili Miedes, Francesc D. Mu~noz-Escoi

    E-Print Network [OSTI]

    Muñoz, Francesc

    On the Cost of Prioritized Atomic Multicast Protocols Emili Miedes, Francesc D. Mu~noz-Esco,fmunyoz}@iti.upv.es Technical Report ITI-SIDI-2009/002 E.Miedes,F.D.Mu~noz-Esco´i:OntheCostofPrioritizedAtomicMulticastProtocolsITI-SIDI-2009/002 #12;#12;On the Cost of Prioritized Atomic Multicast Protocols Emili Miedes, Francesc D. Mu~noz-Esco

  11. Robustness of two-way quantum communication protocols against Trojan horse attack

    E-Print Network [OSTI]

    Fu-Guo Deng; Ping Zhou; Xi-Han Li; Chun-Yan Li; Hong-Yu Zhou

    2005-08-23T23:59:59.000Z

    We discuss the robustness of two-way quantum communication protocols against Trojan horse attack and introduce a novel attack, delay-photon Trojan horse attack. Moreover, we present a practical way for two-way quantum communication protocols to prevent the eavesdropper from stealing the information transmitted with Trojan horse attacks. It means that two-way quantum communication protocols is also secure in a practical application.

  12. Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-15T23:59:59.000Z

    The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, 6-27-13.

  13. Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-15T23:59:59.000Z

    The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, dated 6-27-13, cancels DOE O 142.1A. Certified 12-3-14.

  14. International Workshops to Foster Implementation of the IAEA Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

    2003-07-14T23:59:59.000Z

    A country’s adherence to the International Atomic Energy Agency’s (IAEA) Additional Protocol is an important statement to the world of that country’s commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEA’s regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

  15. Building America Indoor Temperature and Humidity Measurement Protocol

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Norton, P.

    2014-02-01T23:59:59.000Z

    When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every 4 years the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the 'average occupant' in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

  16. Trapped Ion Quantum Error Correcting Protocols Using Only Global Operations

    E-Print Network [OSTI]

    Joseph F. Goodwin; Benjamin J. Brown; Graham Stutter; Howard Dale; Richard C. Thompson; Terry Rudolph

    2014-07-07T23:59:59.000Z

    Quantum error-correcting codes are many-body entangled states that are prepared and measured using complex sequences of entangling operations. Each element of such an entangling sequence introduces noise to delicate quantum information during the encoding or reading out of the code. It is important therefore to find efficient entangling protocols to avoid the loss of information. Here we propose an experiment that uses only global entangling operations to encode an arbitrary logical qubit to either the five-qubit repetition code or the five-qubit code, with a six-ion Coulomb crystal architecture in a Penning trap. We show that the use of global operations enables us to prepare and read out these codes using only six and ten global entangling pulses, respectively. The proposed experiment also allows the acquisition of syndrome information during readout. We provide a noise analysis for the presented protocols, estimating that we can achieve a six-fold improvement in coherence time with noise as high as $\\sim 1\\%$ on each entangling operation.

  17. Kyoto Dynamics Days 4 Mechanics and Dynamics

    E-Print Network [OSTI]

    Arai, Zin

    of the "Saari's conjecture'' for planar three- body orbit will also be presented. #12;4:30-5:30 Konstantin

  18. Graduate School of Economics Kyoto Universitycontents

    E-Print Network [OSTI]

    Takada, Shoji

    Economies Economic Change and Restructuring #12;#12;Canadian Journal of Economics Journal of Environmental Theory Journal of Banking and Finance Journal of Economic Dynamics & Control #12;Review of Economic Studies Journal of Economic Theory Journal of Technology Transfer Japanese Economic Review #12;Journal

  19. 14MIB*ft* * * Kyoto Japan

    E-Print Network [OSTI]

    Sparks, Donald L.

    of molybdate and sulfate sorption/ desorption on goethite. For molybdate, a postulated reaction mechanism triple layer model (TLM) was employed to calculate the distribution of ionic species on the goethite mechanisms indicating they were operational for sulfate adsorption on goethite. Using calcu- lated ki and k

  20. KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS

    E-Print Network [OSTI]

    Takada, Shoji

    Integrated Human Studies/ Human and Environmental Studies 127 112 140 155 - - 70 46 Energy Science - - 128 1 Brazil 18 Paraguay 1 Uruguay 1 Argentine 5 Chile 4 Bolivia 1 Peru 5 Ecua

  1. KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS

    E-Print Network [OSTI]

    Takada, Shoji

    and Environmental Studies 125 129 166 150 - - 82 52 Energy Science - - 137 103 - - 19 27 Asian and African Area 12 Republic of Serbia 1 Slovak Republic 1 Spain 3 Kingdom of Sweden 4 Swiss Confederation 5 Ukraine 3

  2. KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS

    E-Print Network [OSTI]

    Takada, Shoji

    Energy Science - - 117 98 - - 16 22 Asian and African Area Studies - - - 21 - - 36 13 Informatics - - 182 Republic of Serbia 1 Slovak Republic 1 Kingdom of Spain 5 Kingdom of Sweden 2 Swiss Confederation 5 Ukraine

  3. KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS

    E-Print Network [OSTI]

    Takada, Shoji

    and Environmental Studies 129 127 150 161 - - 86 44 Energy Science - - 135 107 - - 14 15 Asian and African Area Republic 2 Republic of Serbia 1 Czech Republic 1 Federal Republic of Germany 11 Kingdom of Norway 1

  4. KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS

    E-Print Network [OSTI]

    Takada, Shoji

    Integrated Human Studies/ Human and Environmental Studies 129 127 150 161 - - 86 44 Energy Science - - 135 of Sweden 5 Spain 5 Slovak Republic 2 Republic of Serbia 1 Czech Republic 1 Federa

  5. addition-cambridge trial protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  6. anesthesia gas-guided protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  7. A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes

    Broader source: Energy.gov [DOE]

    Summary of LANL?s testing protocol work presented to the High Temperature Membrane Working Group Meeting, Orlando FL, October 17, 2003

  8. On the group theoretic structure of a class of quantum dialogue protocols

    E-Print Network [OSTI]

    Chitra Shukla; Vivek Kothari; Anindita Banerjee; Anirban Pathak

    2012-03-27T23:59:59.000Z

    Intrinsic symmetry of the existing protocols of quantum dialogue are explored. It is shown that if we have a set of mutually orthogonal $n$-qubit states {\

  9. An Efficient Protocol for Negotiation over Multiple Indivisible Resources Sabyasachi Saha and Sandip Sen

    E-Print Network [OSTI]

    Sen, Sandip

    An Efficient Protocol for Negotiation over Multiple Indivisible Resources Sabyasachi Saha and Sandip Sen Department of Mathematical & Computer Sciences The University of Tulsa {sabyasachi-saha

  10. A Case for Variable-Range Transmission Power Control in Wireless Multihop Networks

    E-Print Network [OSTI]

    Gomez-Castellanos, Javier

    A Case for Variable-Range Transmission Power Control in Wireless Multihop Networks Javier Gomez Department of Electrical Engineering National Autonomous University of Mexico Ciudad Universitaria, C radios and protocols for wireless ad hoc networks are primarily based on common-range transmission

  11. DNA Extraction From Processed Wood: A Case Study for the Identification of an Endangered

    E-Print Network [OSTI]

    Protocols DNA Extraction From Processed Wood: A Case Study for the Identification of an Endangered to the extraction of whole genomic DNA from processed wood samples to explore the possibility of identifying an endangered trop- ical timber species by using DNA sequencing technology. High-yield and high-quality DNA

  12. LDP : location discovery protocol for data center networks

    E-Print Network [OSTI]

    Pamboris, Andreas

    2009-01-01T23:59:59.000Z

    4 Failure Analysis . . . . . . . . . . . . . . . . . . .of ; Chapter 4 Failure Analysis The following analysisand a preliminary failure case analysis in Chapters 3 and 4

  13. A fission matrix based validation protocol for computed power distributions in the advanced test reactor

    SciTech Connect (OSTI)

    Nielsen, J. W. [Idaho National Laboratory, MS 3840, PO Box 1625, Idaho Falls, ID 83415 (United States); Nigg, D. W. [Idaho National Laboratory, MS 3860, PO Box 1625, Idaho Falls, ID 83415 (United States); LaPorta, A. W. [Idaho National Laboratory, MS 7136, PO Box 1625, Idaho Falls, ID 83415 (United States)

    2013-07-01T23:59:59.000Z

    The Idaho National Laboratory (INL) has been engaged in a significant multi year effort to modernize the computational reactor physics tools and validation procedures used to support operations of the Advanced Test Reactor (ATR) and its companion critical facility (ATRC). Several new protocols for validation of computed neutron flux distributions and spectra as well as for validation of computed fission power distributions, based on new experiments and well-recognized least-squares statistical analysis techniques, have been under development. In the case of power distributions, estimates of the a priori ATR-specific fuel element-to-element fission power correlation and covariance matrices are required for validation analysis. A practical method for generating these matrices using the element-to-element fission matrix is presented, along with a high-order scheme for estimating the underlying fission matrix itself. The proposed methodology is illustrated using the MCNP5 neutron transport code for the required neutronics calculations. The general approach is readily adaptable for implementation using any multidimensional stochastic or deterministic transport code that offers the required level of spatial, angular, and energy resolution in the computed solution for the neutron flux and fission source. (authors)

  14. Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Hoi-Kwong Lo; Norbert Lütkenhaus

    2010-09-20T23:59:59.000Z

    Most experimental realizations of quantum key distribution are based on the Bennett-Brassard 1984 (so-called BB84) protocol. In a typical optical implementation of this scheme, the sender uses an active source to produce the required BB84 signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental setups operating at high transmission rates. Passive schemes might also be more robust against side-channel attacks than active sources. Typical passive devices involve parametric down-conversion. In this paper, we show that both coherent light and practical single photon sources are also suitable for passive generation of BB84 signal states. Our method does not require any external-driven element, but only linear optical components and photodetectors. In the case of coherent light, the resulting key rate is similar to the one delivered by an active source. When the sender uses practical single photon sources, however, the distance covered by a passive transmitter might be longer than the one of an active configuration.

  15. A Zero Knowledge Protocol For Nuclear Warhead Verification

    SciTech Connect (OSTI)

    Glaser, Alexander [Princeton, Univ., NJ (United States). Program on Science and Global Security] [Princeton, Univ., NJ (United States). Program on Science and Global Security; Goldston, Robert J. [Princeton Plasma Physics Lab., Princeton, NJ (United States)] [Princeton Plasma Physics Lab., Princeton, NJ (United States)

    2014-03-14T23:59:59.000Z

    The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

  16. IBM NJE protocol emulator for VAX/VMS

    SciTech Connect (OSTI)

    Engert, D.E.

    1981-01-01T23:59:59.000Z

    Communications software has been written at Argonne National Laboratory to enable a VAX/VMS system to participate as an end-node in a standard IBM network by emulating the Network Job Entry (NJE) protocol. NJE is actually a collection of programs that support job networking for the operating systems used on most large IBM-compatible computers (e.g., VM/370, MVS with JES2 or JES3, SVS, MVT with ASP or HASP). Files received by the VAX can be printed or saved in user-selected disk files. Files sent to the network can be routed to any node in the network for printing, punching, or job submission, as well as to a VM/370 user's virtual reader. Files sent from the VAX are queued and transmitted asynchronously to allow users to perform other work while files are awaiting transmission. No changes are required to the IBM software.

  17. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  18. Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software

    SciTech Connect (OSTI)

    Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

    2013-09-06T23:59:59.000Z

    This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

  19. Scalable Energy Efficient Location Aware Multicast Protocol for MANET (SEELAMP)

    E-Print Network [OSTI]

    Kamboj, Pariza

    2010-01-01T23:59:59.000Z

    Multicast plays an important role in implementing the group communications in bandwidth scarce multihop mobile ad hoc networks. However, due to the dynamic topology of MANETs it is very difficult to build optimal multicast trees and maintaining group membership, making even more challenging to implement scalable and robust multicast in Mobile Ad hoc Networks (MANET). A scalable and energy efficient location aware multicast algorithm, called SEELAMP, for mobile ad hoc networks is presented in the paper that is based on creation of shared tree using the physical location of the nodes for the multicast sessions. It constructs a shared bi-directional multicast tree for its routing operations rather than a mesh, which helps in achieving more efficient multicast delivery. The algorithm uses the concept of small overlapped zones around each node for proactive topology maintenance with in the zone. Protocol depends on the location information obtained using a distributed location service, which effectively reduces th...

  20. ANJE5.40. VAX VMS IBM NJE Protocol Emulator

    SciTech Connect (OSTI)

    Raffenetti, R.C.; Osudar, J. [Argonne National Lab., IL (United States)

    1990-06-01T23:59:59.000Z

    The Argonne NJE (Network Job Entry) communications software allows VAX/VMS systems to participate in a standard IBM peer-to-peer network and communicate with IBM computers with the VM/RSCS, MVS/JES2, MVS/JES3, or VSE/POWER operating systems or with CDC computers having the NJEF product by emulating the NJE protocol. The emulator has limited routing capability and forwards received files and messages to other nodes connected to it via DECnet. DECnet client nodes implementing the NJE system receive full NJE user services via the routing node including access to BITnet. All member nodes of VAX clusters involved in the NJE domain receive full NJE services as well. The emulator`s capabilities include immediate transfer of commands and messages and queued transfer of standard print and punch files. Jobs can be sent from VMS for execution at any node with batch services. The emulator receives files into user designated subdirectories. Two applications are distributed with ANJE. One is an RFC822-conforming interface that enables users of the VMS Mail Utility and either VM/SP NOTE or the IBM PROFS mail to exchange electronic mail. VMS Mail Utility users can also exchange electronic mail with users of BITnet. The other application is an emulator for the IBM Bulk Data Transfer product and IBM NETDATA protocol that enables transmission and reception of arbitrary sequential files with or without character translation. Data conversion subroutines are provided to aid users in converting their data from the binary format of one machine to that of the other.

  1. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Tygar, Doug

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

  2. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME

    E-Print Network [OSTI]

    Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

  3. Performance Comparison of the RPL and LOADng Routing Protocols in a Home Automation Scenario

    E-Print Network [OSTI]

    Performance Comparison of the RPL and LOADng Routing Protocols in a Home Automation Scenario Malisa as an alternative solution. In this paper, we compare the performance of the two protocols in a Home Automation of Home Automation networks. Routing in LLNs is one of the key challenges for the IoT emergence

  4. METHODOLOGY Open Access Protocol: A simple phenol-based method for 96-well

    E-Print Network [OSTI]

    Howard, Martin

    Arabidopsis seedlings. This prompted us to develop a high-throughput RNA extraction protocol (HTP96) adapted. Conclusion: The development of the HTP96 protocol has vastly increased our sample throughput, allowing us in many labs, and develop an effective high-throughput gene expression platform. We propose that the HTP96

  5. An Opportunistic Virtual MISO (OVM) Protocol for Multi-hop Wireless Networks

    E-Print Network [OSTI]

    Perkins, Dmitri

    1 An Opportunistic Virtual MISO (OVM) Protocol for Multi-hop Wireless Networks Van Nguyen-utilized and performance is not maximized. In this work, we propose the Opportunistic Virtual MISO (OVM) protocol for multi-hop wireless networks. OVM combines virtual MISO (using space- time block codes) and cooperative diversity

  6. The Factor: Inferring Protocol Performance Using Inter-link Reception Correlation

    E-Print Network [OSTI]

    Levis, Philip

    of performance of opportunistic routing and network coding protocols. Comparing Deluge and Rateless Deluge, Deluge's network coding counterpart, we find that can predict which of the two is best suited is the ability to send a single packet to multiple receivers. Data dissemi- nation protocols such as Deluge [8

  7. A Tree-based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming

    E-Print Network [OSTI]

    Xu, Dongyan

    1 A Tree-based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming a Tree-based Forward Digest Protocol (TFDP) to verify data integrity in distributed media streaming the effectiveness of TFDP. Keywords: Data integrity, message digest, and media streaming. I. INTRODUCTION Consider

  8. Team Oriented Multicast: a Scalable Routing Protocol for Large Mobile Networks

    E-Print Network [OSTI]

    Park, Joon-Sang

    Team Oriented Multicast: a Scalable Routing Protocol for Large Mobile Networks Yunjung Yi, Mario Team Oriented Multicast (TOM). TOM builds up a "motion aware" hierarchy to support efficient, scalable team multicast protocol. TOM identifies clusters of nodes with same affinity as teams and manages

  9. Reducing the Replacement Overhead on COMA Protocols for Workstation-Based Architectures

    E-Print Network [OSTI]

    Llanos, Diego R.

    Reducing the Replacement Overhead on COMA Protocols for Workstation-Based Architectures Diego R discuss the behavior of the replacement mechanism of well-known COMA protocols applied to a loosely replacement mecha- nism in order to select the destination node of a replacement transaction without

  10. STUDY PROTOCOL Open Access Evaluation of the Housing First program in

    E-Print Network [OSTI]

    Boyer, Edmond

    disorders in France: study protocol for a randomized controlled trial Aurelie Tinland1,2 , Cecile Fortanier1 Background: Recent studies in North American contexts have suggested that the Housing First model randomized protocols, to evaluate the impact of Housing First approaches in France. Method and design

  11. State Pruning for Test Vector Generation for a Multiprocessor Cache Coherence Protocol

    E-Print Network [OSTI]

    Minnesota, University of

    }@ece.umn.edu dabts@cray.com Abstract Verification is extremely important in designing digital systems such as a cache coherence protocol. Generating traces for system verification using a model checker and then using bugs in the Stanford DASH cache coherence protocol. Using an IBM Power4 system with the Berkeley Active

  12. Design for MOSIS Educational Program (Research) Testchip for AHIP protocol, ASIC flow, and Leakage Control

    E-Print Network [OSTI]

    protocol) block on the Xilinx controller. Our lab setup and testing methodology is similar to that of ATC0Design for MOSIS Educational Program (Research) Testchip for AHIP protocol, ASIC flow, and Leakage Control Through Body Biasing Seongmoo Heo, Graduate Student Krste Asanovi´c, Associate Professor

  13. 14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS

    E-Print Network [OSTI]

    Stojmenovic, Ivan

    1 14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS Yousef efficiency. In this paper, we provide the first known taxonomy of VANET data communication protocols, based, vehicle connectivity, urgency, and message contents. The taxonomy provides fundamental blocks in VANET

  14. Tracing Eye Movement Protocols with Cognitive Process Models Dario D. Salvucci (dario+@cs.cmu.edu)

    E-Print Network [OSTI]

    Salvucci, Dario D.

    1 Tracing Eye Movement Protocols with Cognitive Process Models Dario D. Salvucci (dario+@cmu.edu) Department of Psychology; Carnegie Mellon University Pittsburgh, PA 15213 Abstract In using eye movements to develop cognitive models, researchers typically analyze eye movement protocols with aggregate measures

  15. Assessing Rural Transformations: Piloting a Qualitative Impact Protocol in Malawi and Ethiopia

    E-Print Network [OSTI]

    Burton, Geoffrey R.

    Assessing Rural Transformations: Piloting a Qualitative Impact Protocol in Malawi and Ethiopia a Qualitative Impact Protocol in Malawi and Ethiopia James Copestake and Fiona Remnant Abstract This paper impact evaluation of NGO sponsored rural development projects in Malawi and Ethiopia. Two of the projects

  16. ACOS: An Area-based Collaborative Sleeping Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Tong University, Shanghai 200030, China 2 Department of Electrical and Computer Engineering The University of New Mexico, Albuquerque, New Mexico, USA {cai-yanli,li-ml,wu protocol, named Area-based Collaborative Sleeping (ACOS). The ACOS protocol, based on the net sensing area

  17. IFTP-W: A TCP-Friendly Protocol for Multimedia Applications over Wireless Networks

    E-Print Network [OSTI]

    Miles, Will

    IFTP-W: A TCP-Friendly Protocol for Multimedia Applications over Wireless Networks Hala El on wireless networks is calling for the development of a protocol that is both TCP-friendly and capable of conforming to the constraints of wireless networks. This paper presents IFTP-W, an end-to-end congestion

  18. Cell synchrony and chromosomal protocols for somatic cells of cotton gossypium hirsutum

    SciTech Connect (OSTI)

    Van`t Hof, J.; Lamm, S.S.

    1994-10-10T23:59:59.000Z

    The intent of this pamphlet is to share information with others who are interested in useful protocols for cotton cytogenetics and cytology. The protocols described are a beginning effort and they are expected to be improved. All methods, results and data given pertain to cultivar MD 51ne. We are not satisfied with our results of in situ hybridization.

  19. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  20. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770­2 [7] is vulnerable to a replay attack and also

  1. Intelligent Network-Layer Management for Wireless Mesh Networks: Dynamic Tuning of a Reactive Routing Protocol

    E-Print Network [OSTI]

    Kolner, Brian H.

    1 Intelligent Network-Layer Management for Wireless Mesh Networks: Dynamic Tuning of a Reactive Routing Protocol Dan Marconett, Minsoo Lee, Xiaohui Ye and S. J. Ben Yoo Dept. of Electrical and Computer learning to dynamically modify reactive routing protocol parameters in real-time, to better facilitate

  2. Reactive Protocols for Aircraft Electric Power Distribution Huan Xu, Ufuk Topcu, and Richard M. Murray

    E-Print Network [OSTI]

    Murray, Richard M.

    Reactive Protocols for Aircraft Electric Power Distribution Huan Xu, Ufuk Topcu, and Richard M. Murray Abstract-- The increasing complexity of electric power sys- tems leads to integration and verification challenges. We consider the problem of designing a control protocol for the aircraft electric

  3. EHS-Net Hand Hygiene Study EHS-Net Hand Hygiene Study Protocol

    E-Print Network [OSTI]

    EHS-Net Hand Hygiene Study 1 EHS-Net Hand Hygiene Study Protocol I. Project Overview Title EHS-Net Hand Hygiene Study Protocol Summary Good hand hygiene is of critical importance in preventing of personal hygiene policies and practices in food service establishments. The purpose of this study

  4. Energy-Ecient Initialization Protocols for Radio Networks with no Collision Detection

    E-Print Network [OSTI]

    Nakano, Koji

    Energy-EÃ?cient Initialization Protocols for Radio Networks with no Collision Detection #3; K been initialized in advance. The main contribution of this work is to propose energy- e not be possible while on mission, we are interested in designing protocols that are highly energy

  5. BeamStar: A New Low-cost Data Routing Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Hou, Y. Thomas

    BeamStar: A New Low-cost Data Routing Protocol for Wireless Sensor Networks Shiwen Mao and Y-assisted, location-aware routing protocol, which we call BeamStar, for wireless sensor networks. We make a major microorganisms, contaminant transport, ecosystems, and battlefields. Wireless sensor networks, in which each

  6. CSMAC: A Novel DS-CDMA Based MAC Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bulusu, Nirupama

    MAC protocols for sensor networks such as S-MAC [10] primarily prioritize energy efficiency over for sensor networks such as SMAC [10] primarily prioritize energy efficiency over reducing network latency latency. Our protocol design balances the considerations of energy efficiency, latency, accuracy

  7. DATA COMMUNICATIONS PROTOCOL PERFORMANCE ON GEOSTATIONARY SATELLITE LINKS --LESSONS LEARNED USING ACTS

    E-Print Network [OSTI]

    Kruse, Hans

    studied the SNA/SDLC protocol in Normal Response Mode. Our observation of TCP/IP confirms the need modifications at or below the transport layer. Our study of SDLC suggests a response time degradation the SNA/SDLC and the TCP/IP protocol families. The operation of the ACTS system has confirmed that its

  8. LLaannggeerrhhaannss LLaabb PPrroottooccoollss Chemical Waste Disposal Protocol.docx pg 1 of 1

    E-Print Network [OSTI]

    Langerhans, Brian

    LLaannggeerrhhaannss LLaabb PPrroottooccoollss Chemical Waste Disposal Protocol.docx pg 1 of 1 Chemical Waste Disposal Protocol For Chemical Waste Pick-Up: 1. Log on to http://www.ncsu.edu/ehs. 2. Click waste item being submitted. 7. Fill out and affix a Hazardous Waste label, from the drawer labeled

  9. The evaluation of an analytical protocol for the determination of substances in waste for hazard classification

    E-Print Network [OSTI]

    Boyer, Edmond

    1 The evaluation of an analytical protocol for the determination of substances in waste for hazard The classification of waste as hazardous could soon be assessed in Europe using largely the hazard properties of its knowledge of the component constituents of a given waste will therefore be necessary. An analytical protocol

  10. An analytical protocol for the knowledge of waste by Pierre HENNEBERT1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An analytical protocol for the knowledge of waste by substances Pierre HENNEBERT1 , Arnaud PAPIN2 1 Technologique ALATA, BP n°2, 60550 Verneuil en Halatte, France. Abstract The hazardousness of waste could samples of different industrial wastes have been tested following (with differences) this protocol by two

  11. Improving TCP Throughput over Lossy Links Using Protocol-Level Speculations

    E-Print Network [OSTI]

    Minnesota, University of

    Improving TCP Throughput over Lossy Links Using Protocol-Level Speculations Haowei Bai Honeywell@ou.edu Abstract-- The degradation of Transport Control Protocol (TCP) throughput in networks with lossy links. This is very similar to processor performance degradation due to control hazards in CPU design. First, two

  12. Extending the TOKENCMP Cache Coherence Protocol for Low Overhead Fault Tolerance

    E-Print Network [OSTI]

    Acacio, Manuel

    , the reliability of electronic components is never perfect. Electronic components are subject to several types sufficiently reliable CMPs. In this work, we present a coherence protocol aimed at dealing with transient reliable. In particular, our proposal extends a token-based cache coherence protocol so that no data can

  13. The Municipal Solid Waste Landfill as a Source of Montreal Protocol-restricted Halocarbons in the

    E-Print Network [OSTI]

    The Municipal Solid Waste Landfill as a Source of Montreal Protocol-restricted Halocarbons of Geophysics #12;2 #12;The Municipal Solid Waste Landfill as a Source of Montreal Protocol municipal solid waste (MSW) landfills. With several hundred MSW landfills in both the US and UK, estimating

  14. On the Energy Efficiency of Hybrid-ARQ Protocols in Fading Channels

    E-Print Network [OSTI]

    Yener, Aylin

    On the Energy Efficiency of Hybrid-ARQ Protocols in Fading Channels Igor Stanojev1, Osvaldo Simeone the power amplifier. In this paper, the energy efficiency of Hybrid-ARQ Type I, Chase Combining protocols, such as Automatic-Repeat- ReQuest (ARQ) and Hybrid-ARQ (HARQ) are known to provide energy

  15. A Machine Learning Approach to Performance Prediction of Total Order Broadcast Protocols()

    E-Print Network [OSTI]

    Rodrigues, Luís E.T.

    as of a number of specialized replication protocols tailored for, e.g., database systems [19] and transactional and evaluation of TOB protocols (extensively surveyed by Defago et al. [5]). However, we are not aware of any) through the PIDDAC Program funds and Aristos project (PTDC/EIA-EIA/102496/2008) and by the European

  16. A Novel Anti-Collision Protocol for Energy Efficient Identification and Monitoring in

    E-Print Network [OSTI]

    Chin, Kwan-Wu

    1 A Novel Anti-Collision Protocol for Energy Efficient Identification and Monitoring in RFID}@uow.edu.au Abstract-- This paper presents a dynamic framed slotted Aloha (DFSA) protocol that is energy efficient identification. Critically, they cannot be used to monitor tags in an energy efficient manner. Thus, making them

  17. BEAM: A Burst-Aware Energy-Efficient Adaptive MAC Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Braun, Torsten

    BEAM: A Burst-Aware Energy-Efficient Adaptive MAC Protocol for Wireless Sensor Networks Markus|wagen|braun|dolfus@iam.unibe.ch Abstract--Low latency for packet delivery, high throughput, good reactivity, and energy-efficient operation that optimizations for energy-efficiency and performance parameters are contradicting, most MAC protocols proposed

  18. ERTP: Energy-Efficient and Reliable Transport Protocol for Data Streaming in Wireless Sensor

    E-Print Network [OSTI]

    New South Wales, University of

    ERTP: Energy-Efficient and Reliable Transport Protocol for Data Streaming in Wireless Sensor applications in Wireless Sensor Networks require re- liable and energy-efficient transport protocols [17] [18 of minutes or hours), energy-efficiency is. Long-term operation and reliable delivery of the sensed data

  19. On the Adaptivity of today's Energy-Efficient MAC Protocols under varying Traffic Conditions

    E-Print Network [OSTI]

    Braun, Torsten

    On the Adaptivity of today's Energy-Efficient MAC Protocols under varying Traffic Conditions typically accounts for a major portion of a WSN node's power consumption, researchers have proposed Energy-Efficient. Such protocols typically trade off energy-efficiency versus classical quality of service parameters (e

  20. EHS-Net Tomato Handling Study EHS-Net Tomato Handling Study Protocol

    E-Print Network [OSTI]

    EHS-Net Tomato Handling Study 1 EHS-Net Tomato Handling Study Protocol I. Project Overview Title EHS-Net Tomato Handling Study Protocol Summary Few studies have examined in detail the nature Health Specialists Network (EHS-Net) special study. EHS- Net is a collaboration involving the Centers

  1. Generating Code Structures for Petri NetBased Agent Interaction Protocols Using Net Components

    E-Print Network [OSTI]

    Hamburg.Universit�¤t

    Generating Code Structures for Petri Net­Based Agent Interaction Protocols Using Net Components@informatik.uni­hamburg.de July 31, 2003 Abstract In this paper we introduce a straight forward approach for generating Petri Net of net components which provide basic tasks and the structure for Petri Nets. Agent interaction protocol

  2. Generating Code Structures for Petri Net-Based Agent Interaction Protocols Using Net Components

    E-Print Network [OSTI]

    Hamburg.Universit�¤t

    Generating Code Structures for Petri Net-Based Agent Interaction Protocols Using Net Components@informatik.uni-hamburg.de March 31, 2004 Abstract In this paper we introduce a straight forward approach for generating Petri Net of net components which provide basic tasks and the structure for Petri Nets. Agent interaction protocol

  3. Towards a Wireless Building Management System Requiring no Change to Upper-layer Protocols

    E-Print Network [OSTI]

    Wang, Dan

    communications to support transmission, design protocols for sensor networking and conduct application that converts existing wired sensor network into wireless without changing upper layer protocols decent understanding on the design within a wireless sensor network, e.g., OS, programming languages

  4. Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security

    E-Print Network [OSTI]

    Perkins, Richard A.

    Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security 1. Scope with the following documents: [R1] ANSI N42.33, "American National Standard for Portable Radiation Detection

  5. Testing and Evaluation Protocol for Backpack-Based Radiation Detection Systems Used for Homeland

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Radiation Detection Systems Used for Homeland Security EFF. DATE 2013-05-30 REV. 2.00 PAGE 1 of 10 Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Security 1. Scope

  6. A Protocol for Disaster Data Evacuation Tilmann Rabl, Florian Stegmaier, Mario Dller, and The Tong Vang

    E-Print Network [OSTI]

    Hammerton, James

    send proto- col (DFSP), a new bulk data transfer protocol. It employs striping to dynamic intermediate is im- portant. Therefore, an enhanced version, the Dynamic Fast Send Protocol (DFSP), has been implemented which over- comes the identified weaknesses. DFSP comprises a novel Copyright is held

  7. CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

  8. The past, present and future of protocol checking with CSP and FDR

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 The past, present and future of protocol checking with CSP and FDR Bill Roscoe1 Oxford of these meetings was the development of the CSP model of cryptographic protocols, following Gavin Lowe's discovery the particular advantages of using a process algebra, and CSP in particular, for modelling cryptoprotocols

  9. PhD Forum: Routing Protocol and Performance Modeling in Delay Tolerant Vehicular Networks

    E-Print Network [OSTI]

    vehicle research and development program with the goal of develop- ing technology that will enable routing protocols from MANET research is difficult. There are several models discussed in related work applications such as accident avoidance messaging, In Proc. 17th IEEE Intl. Conf. on Networking Protocols

  10. DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

    E-Print Network [OSTI]

    Hou, Y. Thomas

    1 DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudainayagam of functioning and available resources. In this paper, we propose a Device and Energy Aware Routing protocol-powered nodes and battery-powered nodes. We embed both the energy and the device awareness into the routing

  11. GEAMS: A Geographic Energy-Aware Multipath Stream-based Routing Protocol for WMSNs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    GEAMS: A Geographic Energy-Aware Multipath Stream- based Routing Protocol for WMSNs Samir Medjiah Energy-Aware Multipath Stream-based (GEAMS) routing protocol for WMSNs. GEAMS routing decisions are made transmission in WMSNs. Keywords -- WSN, WMSN, Geographic Routing, Multipath Routing, Energy Aware routing... I

  12. AGEM: Adaptive Greedy-Compass Energy-aware Multipath Routing Protocol for WMSNs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AGEM: Adaptive Greedy-Compass Energy-aware Multipath Routing Protocol for WMSNs Samir Medjiah--This paper presents an Adaptive Greedy-Compass Energy-aware Multipath (AGEM), a novel routing protocol. Index terms--WSN, WMSN, Geographic Routing, Angle Routing Multipath Routing, Energy Aware routing... I

  13. Sea Star Wasting Syndrome Protocols for Subtidal Surveys February 13, 2014

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Sea Star Wasting Syndrome Protocols for Subtidal Surveys February 13, 2014 Value of Citizen Science and track changes through time. Citizen science groups can collect subtidal sea star syndrome data using possible, a researcher familiar with the protocol should accompany each citizen science group in the field

  14. Algorithms for Categorizing Multiprocessor Communication Under Invalidate and UpdateBased Coherence Protocols \\Lambda

    E-Print Network [OSTI]

    Bianchini, Ricardo

    of useless traffic entailed by each coherence protocol. Under an invalidate­based protocol, our algorithms and Technology---HighPerformance Computing, Software Science and Tech­ nology program, ARPA Order no. 8930 to intro­ duce useless communication due to a mismatch between the hardware unit of coherence and the data

  15. Benchmarking Wireless Network Protocols: Threat and Challenge Analysis of the AeroRP

    E-Print Network [OSTI]

    Broyles, Dan

    2011-06-24T23:59:59.000Z

    , OLSR, DSDV, and AeroRP that is part of the Aero protocol stack developed at The University of Kansas. AeroRP outperforms the traditional MANET routing protocols in benchmarks that involve either highly-dynamic networks or disruptions in connectivity....

  16. Environmental Challenges of Climate-Nuclear Fusion: A Case Study of India

    E-Print Network [OSTI]

    Badrinarayan, Deepa

    2011-01-01T23:59:59.000Z

    kyoto. 140. lEA, WORLD ENERGY OUTLOOK 191, 191 (2007) [annual publication, World Energy Outlook (WEO), that nuclearENERGY AGENCY [IEA], WORLD ENERGY OUTLOOK 208 fig.12.2 (

  17. Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol

    SciTech Connect (OSTI)

    Qin Sujuan [State Key Laboratory of Network Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); School of Science, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); Gao Fei; Wen Qiaoyan [State Key Laboratory of Network Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, P. O. Box 810, Chengdu, 610041 (China)

    2007-12-15T23:59:59.000Z

    The participant attack is the most serious threat for quantum secret-sharing protocols. We present a method to analyze the security of quantum secret-sharing protocols against this kind of attack taking the scheme of Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59, 1829 (1999)] as an example. By distinguishing between two mixed states, we derive the necessary and sufficient conditions under which a dishonest participant can attain all the information without introducing any error, which shows that the HBB protocol is insecure against dishonest participants. It is easy to verify that the attack scheme of Karlsson, Koashi, and Imoto [Phys. Rev. A 59, 162 (1999)] is a special example of our results. To demonstrate our results further, we construct an explicit attack scheme according to the necessary and sufficient conditions. Our work completes the security analysis of the HBB protocol, and the method presented may be useful for the analysis of other similar protocols.

  18. Quantum Brachistochrone Curves as Geodesics: Obtaining Accurate Minimum-Time Protocols for the Control of Quantum Systems

    E-Print Network [OSTI]

    Wang, Xiaoting

    Most methods of optimal control cannot obtain accurate time-optimal protocols. The quantum brachistochrone equation is an exception, and has the potential to provide accurate time-optimal protocols for a wide range of ...

  19. Attacking the Asokan-Ginzboorg Protocol for Key Distribution in an Ad-Hoc Bluetooth Network Using CORAL 

    E-Print Network [OSTI]

    Steel, G.; Maidl, M.; Bundy, Alan

    We describe Coral, a counterexample finder for incorrect inductive conjectures. By devising a first-order version of Paulson's formalism for cryptographic protocol analysis, we are able to use Coral to attack protocols which may have an unbounded...

  20. Abridged Edition Environmental Report 2009

    E-Print Network [OSTI]

    Banbara, Mutsunori

    rain polluting our forests and lakes, and toxic substances emerging from waste. Faced with such environmental destruction, the 1997 COP3 conference in Kyoto adopted the Kyoto Protocol, whose purpose in February, 2005. The developed countries that signed the protocol are to aim at reducing the amount of CO2

  1. A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS

    E-Print Network [OSTI]

    Scheuermann, Peter

    used in the analysis. The per- formance metrics considered include the average energy consumed per and decremented by multiplying with in the case of a failure. In short alpha is a reward while beta is a penalty

  2. iTOUGH2 Universal Optimization Using the PEST Protocol

    SciTech Connect (OSTI)

    Finsterle, S.A.

    2010-07-01T23:59:59.000Z

    iTOUGH2 (http://www-esd.lbl.gov/iTOUGH2) is a computer program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis [Finsterle, 2007a, b, c]. iTOUGH2 contains a number of local and global minimization algorithms for automatic calibration of a model against measured data, or for the solution of other, more general optimization problems (see, for example, Finsterle [2005]). A detailed residual and estimation uncertainty analysis is conducted to assess the inversion results. Moreover, iTOUGH2 can be used to perform a formal sensitivity analysis, or to conduct Monte Carlo simulations for the examination for prediction uncertainties. iTOUGH2's capabilities are continually enhanced. As the name implies, iTOUGH2 is developed for use in conjunction with the TOUGH2 forward simulator for nonisothermal multiphase flow in porous and fractured media [Pruess, 1991]. However, iTOUGH2 provides FORTRAN interfaces for the estimation of user-specified parameters (see subroutine USERPAR) based on user-specified observations (see subroutine USEROBS). These user interfaces can be invoked to add new parameter or observation types to the standard set provided in iTOUGH2. They can also be linked to non-TOUGH2 models, i.e., iTOUGH2 can be used as a universal optimization code, similar to other model-independent, nonlinear parameter estimation packages such as PEST [Doherty, 2008] or UCODE [Poeter and Hill, 1998]. However, to make iTOUGH2's optimization capabilities available for use with an external code, the user is required to write some FORTRAN code that provides the link between the iTOUGH2 parameter vector and the input parameters of the external code, and between the output variables of the external code and the iTOUGH2 observation vector. While allowing for maximum flexibility, the coding requirement of this approach limits its applicability to those users with FORTRAN coding knowledge. To make iTOUGH2 capabilities accessible to many application models, the PEST protocol [Doherty, 2007] has been implemented into iTOUGH2. This protocol enables communication between the application (which can be a single 'black-box' executable or a script or batch file that calls multiple codes) and iTOUGH2. The concept requires that for the application model: (1) Input is provided on one or more ASCII text input files; (2) Output is returned to one or more ASCII text output files; (3) The model is run using a system command (executable or script/batch file); and (4) The model runs to completion without any user intervention. For each forward run invoked by iTOUGH2, select parameters cited within the application model input files are then overwritten with values provided by iTOUGH2, and select variables cited within the output files are extracted and returned to iTOUGH2. It should be noted that the core of iTOUGH2, i.e., its optimization routines and related analysis tools, remains unchanged; it is only the communication format between input parameters, the application model, and output variables that are borrowed from PEST. The interface routines have been provided by Doherty [2007]. The iTOUGH2-PEST architecture is shown in Figure 1. This manual contains installation instructions for the iTOUGH2-PEST module, and describes the PEST protocol as well as the input formats needed in iTOUGH2. Examples are provided that demonstrate the use of model-independent optimization and analysis using iTOUGH2.

  3. Constant communication complexity protocols for multiparty accumulative boolean functions

    E-Print Network [OSTI]

    Sudebkumar Prasant Pal; Sima Das; Somesh Kumar

    2006-06-13T23:59:59.000Z

    Generalizing a boolean function from Cleve and Buhrman \\cite{cb:sqec}, we consider the class of {\\it accumulative boolean functions} of the form $f_B(X_1,X_2,..., X_m)=\\bigoplus_{i=1}^n t_B(x_i^1x_i^2... x_i^m)$, where $X_j=(x^j_1,x^j_2,..., x^j_n), 1\\leq j\\leq m$ and $t_B(x_i^1x_i^2... x_i^m)=1$ for input $m$-tuples $x_i^1x_i^2...x_i^m\\in B\\subseteq A\\subseteq \\{0,1\\}^n$, and 0, if $x_i^1x_i^2...x_i^m\\in A\\setminus B$. Here the set $A$ is the input {\\it promise} set for function $f_B$. The input vectors $X_j, 1\\leq j\\leq m$ are given to the $m\\geq 3$ parties respectively, who communicate cbits in a distributed environment so that one of them (say Alice) comes up with the value of the function. We algebraically characterize entanglement assisted LOCC protocols requiring only $m-1$ cbits of communication for such multipartite boolean functions $f_B$, for certain sets $B\\subseteq \\{0,1\\}^n$, for $m\\geq 3$ parties under appropriate uniform parity promise restrictions on input $m$-tuples $x_i^1x_i^2...x_i^m, 1\\leq i\\leq n$. We also show that these functions can be computed using $2m-3$ cbits in a purely classical deterministic setup. In contrast, for certain $m$-party accumulative boolean functions ($m\\geq 2$), we characterize promise sets of mixed parity for input $m$-tuples so that $m-1$ cbits of communication suffice in computing the functions in the absence of any a priori quantum entanglement. We compactly represent all these protocols and the corresponding input promise restrictions using uniform group theoretic and hamming distance characterizations.

  4. JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 13, NO. 3, JUNE 2011 257 Soft-Decision-and-Forward Protocol for Cooperative

    E-Print Network [OSTI]

    No, Jong-Seon

    -decision-and-forward (SDF) with multiple antennas in each node is introduced. SDF protocol exploits the soft decision source be seen through simu- lations that SDF protocol outperforms AF protocol for both OT and NT. Index Terms-likelihood (ML) decoder, soft-decision-and-forward (SDF). I. INTRODUCTION Multiple-antenna transmission has been

  5. Power Control MAC Protocol Analysis and Improvement for Ad Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik

    E-Print Network [OSTI]

    Holliday, JoAnne

    Power Control MAC Protocol Analysis and Improvement for Ad Hoc Networks Ping Ding, JoAnne Holliday power control protocols have been proposed to address the limited power supplies in ad hoc networks in the same transmission. In this paper, we review different power control MAC protocols, and analyze

  6. 978-1-4244-5113-5/09/$25.00 c 2009 IEEE Performance Impact of and Protocol Interdependencies

    E-Print Network [OSTI]

    Breu, Ruth

    extend. Based on extensive simulations, we investigated the interdependency of protocol parameters of IEEE 802.15.4 Security Mechanisms Feng Chen, Xiaolong Yin, Reinhard German and Falko Dressler Dept. With the standardization of the IEEE 802.15.4 protocol, low-power sensor network protocols have been introduced

  7. Comparison of Digestion Protocols for Microgram Quantities of Enriched Protein Samples

    SciTech Connect (OSTI)

    Hervey, IV, William Judson [ORNL; Strader, Michael B [ORNL; Strader, Michael Brad [National Institutes of Health; Hurst, Gregory {Greg} B [ORNL

    2007-01-01T23:59:59.000Z

    Standard biochemical techniques that are used for protein enrichments, such as affinity isolation and density gradient centrifugation, frequently yield high nanogram to low microgram quantities at a significant expenditure of resources and time. The characterization of selected protein enrichments by the "shotgun" mass spectrometry approach is often compromised by the lack of effective and efficient in-solution proteolysis protocols specifically tailored for these small quantities of proteins. This study compares the results of five different digestion protocols that were applied to 2.5 g portions of protein isolates from two disparate sources: Rhodopseudomonas palustris 70S ribosomal proteins, and Bos taurus microtubule-associated proteins (MAPs). Proteolytic peptides produced according to each protocol in each type of protein isolate were analyzed by one-dimensional liquid chromatography-tandem mass spectrometry (LC-MS/MS). The effectiveness of each digestion protocol was assessed on the basis of three parameters: number of peptide identifications, number of protein identifications, and sequence coverage. The two protocols using a solvent containing 80% acetonitrile (CH3CN) for trypsin digestions performed as well as, and in some instances better than, protocols employing other solvents and chaotropes in both types of protein isolates. A primary advantage of the 80% CH3CN protocol is that it requires fewer sample manipulation steps.

  8. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01T23:59:59.000Z

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  9. Z-States Algebra for a Tunable Multi-Party Entanglement-Distillation Protocol

    E-Print Network [OSTI]

    Exman, Iaakov

    2011-01-01T23:59:59.000Z

    W-States have achieved the status of the standard fully symmetric entangled states, for many entanglement application purposes. Z-States are a generalization of W-States that display an elegant algebra, enabling short paths to desired results. This paper describes Z-States algebra starting from neat definitions and laying down explicitly some fundamental theorems on composition and distillation, needed for applications. These theorems are synthesized into a generic tunable Entanglement-Distillation Protocol. Applications are readily developed based upon the tunable protocol. A few examples are provided to illustrate the approach generality. A concomitant graphical representation allows fast comprehension of the protocol inputs, operations and outcomes.

  10. Non-Intrusive Load Monitoring Assessment: Literature Review and Laboratory Protocol

    SciTech Connect (OSTI)

    Butner, R. Scott; Reid, Douglas J.; Hoffman, Michael G.; Sullivan, Greg; Blanchard, Jeremy

    2013-07-01T23:59:59.000Z

    To evaluate the accuracy of NILM technologies, a literature review was conducted to identify any test protocols or standardized testing approaches currently in use. The literature review indicated that no consistent conventions were currently in place for measuring the accuracy of these technologies. Consequently, PNNL developed a testing protocol and metrics to provide the basis for quantifying and analyzing the accuracy of commercially available NILM technologies. This report discusses the results of the literature review and the proposed test protocol and metrics in more detail.

  11. Double blinding-attack on entanglement-based quantum key distribution protocols

    E-Print Network [OSTI]

    Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

    2011-06-14T23:59:59.000Z

    We propose a double blinding-attack on entangled-based quantum key distribution protocols. The principle of the attack is the same as in existing blinding attack except that instead of blinding the detectors on one side only, Eve is blinding the detectors of both Alice and Bob. In the BBM92 protocol, the attack allows Eve to get a full knowledge of the key and remain undetected even if Alice and Bob are using 100% efficient detectors. The attack can be easily extended to Ekert protocol, with an efficiency as high as 85.3%.

  12. Protocol for Maximizing Energy Savings and Indoor Environmental Quality Improvements when Retrofitting Apartments

    SciTech Connect (OSTI)

    Noris, Federico; Delp, William W.; Vermeer, Kimberly; Adamkiewicz, Gary; Singer, Brett C.; Fisk, William J.

    2012-06-18T23:59:59.000Z

    The current focus on building energy retrofit provides an opportunity to simultaneously improve indoor environmental quality (IEQ). Toward this end, we developed a protocol for selecting packages of retrofits that both save energy and improve IEQ in apartments. The protocol specifies the methodology for selecting retrofits from a candidate list while addressing expected energy savings, IEQ impacts, and costs in an integrated manner. Interviews, inspections and measurements are specified to collect the needed input information. The protocol was applied to 17 apartments in three buildings in two different climates within California. Diagnostic measurements and surveys conducted before and after retrofit implementation indicate enhanced apartment performance.

  13. The DYMO Routing Protocol in VANET Scenarios Christoph Sommer and Falko Dressler

    E-Print Network [OSTI]

    Breu, Ruth

    The DYMO Routing Protocol in VANET Scenarios Christoph Sommer and Falko Dressler Computer Networks and Communication Systems Dept. of Computer Sciences, University of Erlangen-Nuremberg, Germany {christoph.sommer

  14. Autonomous Undersea Systems Network (AUSNet) Protocols To Support Ad-Hoc AUV Communications

    E-Print Network [OSTI]

    semi-autonomous networked robots. Emerging flexible low bandwidth, energy efficient architectures opposed to network support) data transmissions. Current efforts are focused on transitionAutonomous Undersea Systems Network (AUSNet) ­ Protocols To Support Ad-Hoc AUV Communications

  15. Prediction Of Transport Protocol Performance Through Simulation K. Mills, M. Wheatley, and S. Heatley

    E-Print Network [OSTI]

    Mills, Kevin

    open systems interconnection (OSI) protocols as described in the tieneral Motor's manufacturing. If a point-to-point link is simulated, each direction is treated as a simplex chan- nel so that a variety

  16. Protocol for Maximizing Energy Savings and Indoor Environmental Quality Improvements when Retrofitting Apartments

    E-Print Network [OSTI]

    Noris, Federico

    2014-01-01T23:59:59.000Z

    from furnaces and water heaters.  Some protocols caution with pilot lights,  and water heaters; and installation of natural draft gas water heaters in an internal closet on 

  17. The role of social factors in a dyadic training protocol: implications for computer-based instruction

    E-Print Network [OSTI]

    Tubre, Travis Charles

    1997-01-01T23:59:59.000Z

    was unobtrusively recorded while participants performed the task. Within the dyadic protocol, extroverts and low-interaction-anxiety participants engaged in more communication than introverts and high-interaction-anxiety participants. Task-related communication...

  18. Writing on the Clean Slate: Implementing a Socially-Aware Protocol in Haggle

    E-Print Network [OSTI]

    Mascolo, Cecilia

    Writing on the Clean Slate: Implementing a Socially-Aware Protocol in Haggle Mirco Musolesi to a clean slate networking approach in the Haggle platform. The remainder of this paper is organised

  19. Ontario’s Protocols for Evaluating the Energy and Bill Savings from Industrial Energy Efficiency Programs

    E-Print Network [OSTI]

    Messenger, M.

    2007-01-01T23:59:59.000Z

    . This paper focuses on how the protocols will help provide more transparent information to building owners about the net savings achieved by a particular energy efficiency investment and reviews the best methods available to estimate both gross and net energy...

  20. Protocol for Maximizing Energy Savings and Indoor Environmental Quality Improvements when Retrofitting Apartments

    E-Print Network [OSTI]

    Noris, Federico

    2014-01-01T23:59:59.000Z

    with pilot lights,  and water heaters; and installation of spillage from furnaces and water heaters.  Some protocols natural draft gas water heaters in an internal closet on 

  1. On-chip COMA Cache-coherence protocol for Microgrids of Microthreaded Cores

    E-Print Network [OSTI]

    Jesshope, Chris

    On-chip COMA Cache-coherence protocol for Microgrids of Microthreaded Cores Li Zhang Chris Jesshope and the development of a co-simulator to the Microgrid CMP emulator. 1 Introduction It is now widely accepted

  2. The ICoN integrated communication and navigation protocol for underwater acoustic networks

    E-Print Network [OSTI]

    Kanthan, Rupesh R

    2005-01-01T23:59:59.000Z

    The deployment of autonomous underwater devices has increased dramatically in the last several years, presenting a strong and growing need for a network protocol to mediate acoustic communications between devices. This ...

  3. A protocol for the moderation of non-cooperative nodes in wireless local area networks

    E-Print Network [OSTI]

    ´opez and Fernando Paganini Universidad ORT Uruguay Abstract-- MAC protocols for wireless networks such as 802 Cuareim 1451, Montevideo, Uruguay. Email: {lopez ma,paganini}@ort.edu.uy. This work was supported by PDT-Uruguay

  4. GPU-based Parallel Computing Models and Implementations for Two-party Privacy-preserving Protocols

    E-Print Network [OSTI]

    Pu, Shi

    2013-11-25T23:59:59.000Z

    resources to handle the encryption-decryption operations. In this dissertation, we study optimal utilization of computing resources on the graphic processor unit (GPU) architecture for privacy-preserving protocols based on secure function evaluation (SFE...

  5. SUBMITTED TO IEEE TRANS. WIRELESS COMMNS., NOV. 2009 1 An Orthogonal Relay Protocol with Improved

    E-Print Network [OSTI]

    Adve, Raviraj

    the reliability of data transmission over wireless fading channels. In orthogonal relay protocols the source for the half-duplex relay channel is same as that of an equivalent multiple-input single-output (MISO) channel

  6. Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol

    E-Print Network [OSTI]

    Canetti, Ran

    2006-06-19T23:59:59.000Z

    We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automataframework of Lynch, Segala, and Vaandrager. This framework providestools for arguing rigorously ...

  7. Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol

    E-Print Network [OSTI]

    Canetti, Ran

    2007-02-16T23:59:59.000Z

    The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about their correctness using multiple levels of abstraction, based on implementation ...

  8. Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol

    E-Print Network [OSTI]

    Canetti, Ran

    2006-06-20T23:59:59.000Z

    The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about theircorrectness using multiple levels of abstraction, based on implementation ...

  9. The role of social factors in a dyadic training protocol: implications for computer-based instruction 

    E-Print Network [OSTI]

    Tubre, Travis Charles

    1997-01-01T23:59:59.000Z

    was unobtrusively recorded while participants performed the task. Within the dyadic protocol, extroverts and low-interaction-anxiety participants engaged in more communication than introverts and high-interaction-anxiety participants. Task-related communication...

  10. Validation of the new mixture design and testing protocol for lime stabilization 

    E-Print Network [OSTI]

    Yusuf, Fateh Ul Anam Muhammad Shafee

    2001-01-01T23:59:59.000Z

    and testing protocol is presented for lime stabilized subgrades. Comparison of field test data and laboratory test data shows that laboratory design test properties were achieved in the field. These properties are used in a mechanistic analysis to assess...

  11. Design and Performance Analysis of a Geographic Routing Protocol for Highly Dynamic MANETs

    E-Print Network [OSTI]

    Peters, Kevin James

    2010-06-14T23:59:59.000Z

    forwarding decisions based on neighbor and destination position. The AeroRP geographic routing protocol is detailed, which uses a heuristic metric for forwarding decisions that takes transmission range and a neighbor's location and velocity into consideration...

  12. Developments in Assisting Countries in Implementing the IAEA Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Hansen, Linda H.; Cain, Ronald A.; Kovacic, Don N.; Apt, Kenneth E.; VanSickle, Matthew

    2010-08-11T23:59:59.000Z

    In 2008, the U.S. Department of Energy (DOE) began assisting selected non-nuclear weapon states in planning and preparing for implementation of the International Atomic Energy Agency’s Additional Protocol (AP). Since then, the AP international implementation program has contributed to the substantial progress made by Vietnam, Thailand, Iraq, and Malaysia in preparing for entry-into-force of the AP. An overall engagement plan has been developed with components designed to train government AP implementing agencies, inform policy makers, conduct outreach to industry and universities, make AP reporting software available and useful, and plan a detailed approach for implementing the declaration and complementary access provisions of the AP. DOE recently began collaborating with Indonesia, which has already entered the AP into force, requiring a second method of engagement somewhat different from that taken with countries that have not entered the AP into force. The AP international implementation program, administered by the International Nuclear Safeguards and Engagement Program, is working more closely with DOE’s International Nonproliferation Export Control Program to ensure countries are aware of and prepared to implement the export/import provisions of the AP. As the AP implementation program matures and helps move countries closer to entry-into-force or improved AP implementation, it is identifying characteristics of a country’s “end-state” that indicate that DOE assistance is no longer required. The U.S. AP Implementation Act and Senate Resolution of Ratification require the Administration to report annually to Congress on measures taken to achieve the adoption of the AP in non-nuclear weapon states. DOE’s AP international implementation program is a significant part of these measures. This paper describes recent developments to increase the scope and effectiveness of the program.

  13. Takashi Negishi,"Kyoto School of Modern Economic Theory", Kyoto Economic Review, 73-1, 2004

    E-Print Network [OSTI]

    Takada, Shoji

    2011 33 8 41 2009 27 7 34 HoChiMinhCityUniversityof Technology 2010 2012 Studies International Finance Theory International Trade Theory Development Economics Economic Development in Asia ASEAN Economy and Sustainable Development Comparative Development Studies Environmental Economic

  14. TEEX tackles toxins: TEEX develops ECLOX protocols to detect toxins in drinking water

    E-Print Network [OSTI]

    Jordan, Leslie

    2010-01-01T23:59:59.000Z

    Specialist Keith McLeroy: The equipment came with minimal instructions and no protocols for establishing baseline data for comparing the ECLOX readings. TCEQ turned to the TEEX Water and Wastewater Program to establish baseline data for 24 public...,? said McLeroy of TEEX?s Infrastructure Training and Safety Institute. ?After many years of looking at every research paper with the word ?ECLOX? in it, we were the first to actually achieve this (developing the protocols) with drinking water...

  15. PSiL?LC: an architecture for logical link control protocol processing 

    E-Print Network [OSTI]

    Mak, Albert Ho Kee

    1992-01-01T23:59:59.000Z

    in relation to the MAC frame SAP & Link Station association Message transfer in a Connect in operation The PSi architecture The PSi LLC architecture LLC sub-layer implemented using Connection Processors Data path in PSi LLC, Simplified PSi LLC... in the protocol stack communicate by passing messages via specific Service Access Points (SAPs). Communications between two neighboring layers are transparent to the two layers above and below [2]. The aim of the OSI protocol is to provide an open environment...

  16. A dyadic protocol for training complex skills: a replication using female participants 

    E-Print Network [OSTI]

    Sanchez-Ku, Maria Luisa

    1999-01-01T23:59:59.000Z

    A DYADIC PROTOCOL FOR TRAINING COMPLEX SKILLS: A REPLICA11ON USING FEMALE PARTICIPANTS A Thesis by MARIA LUISA SANCHEZ-KU Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... ABSTRACT A Dyadic Protocol For Training Complex Skills: A Replication Using Female Participants. (August I 999) Maria Luisa Sanchez-Ku, B. A. , Ohio Wesleyan University Chair of Advisory Committee: Dr. Winfred Arthur, Jr. The effectiveness...

  17. Beamsplitting attack to the revised KKKP protocol and a possible solution

    E-Print Network [OSTI]

    Xiang-Bin Wang; Qiang Zhang; Yu-Ao Chen; Wong-Young Hwang; Myungshik Kim; Jian-Wei Pan

    2006-03-15T23:59:59.000Z

    We show that the revised KKKP protocol proposed by Kye and Kim [Phys. Rev. Lett. 95,040501(2005)] is still insecure with coherent states by a type of beamsplitting attack. We then further revise the KKKP protocol so that it is secure under such type of beamsplitting attack. The revised scheme can be used for not-so-weak coherent state quantum key distribution.

  18. A dyadic protocol for training complex skills: a replication using female participants

    E-Print Network [OSTI]

    Sanchez-Ku, Maria Luisa

    1999-01-01T23:59:59.000Z

    A DYADIC PROTOCOL FOR TRAINING COMPLEX SKILLS: A REPLICA11ON USING FEMALE PARTICIPANTS A Thesis by MARIA LUISA SANCHEZ-KU Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... ABSTRACT A Dyadic Protocol For Training Complex Skills: A Replication Using Female Participants. (August I 999) Maria Luisa Sanchez-Ku, B. A. , Ohio Wesleyan University Chair of Advisory Committee: Dr. Winfred Arthur, Jr. The effectiveness...

  19. Information-theoretic security proof for quantum-key-distribution protocols

    SciTech Connect (OSTI)

    Renner, Renato [Computer Science Department, ETH Zuerich, CH-8092 Zurich (Switzerland); Gisin, Nicolas; Kraus, Barbara [Group of Applied Physics, University of Geneva, CH-1211 Geneva 4 (Switzerland)

    2005-07-15T23:59:59.000Z

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  20. Case No. VWZ-0020

    Broader source: Energy.gov (indexed) [DOE]

    DECISION AND ORDER OF THE DEPARTMENT OF ENERGY Motion to Dismiss Name of Case: Lucy B. Smith Date of Filing: October 14, 1999 Case Number: VWZ-0020 This determination will...

  1. Simulation of the RPL Routing Protocol for IPv6 Sensor Networks: two cases studies Leila Ben Saad

    E-Print Network [OSTI]

    Boyer, Edmond

    , urban, home and buildings automation or smart grid. The ROLL working group charter stipulates CITI INSA-Lyon, ENS Lyon, INRIA Universit´e de Lyon Villeurbanne, France Leila.Ben.Saad@ens-lyon.fr Cedric Chauvenet Watteco Inc. CITI INSA-Lyon - INRIA La garde, France c.chauvenet@watteco.com Bernard

  2. Evaluation of flexible and rigid (class solution) radiation therapy conformal prostate planning protocols

    SciTech Connect (OSTI)

    Coburn, Natalie, E-mail: natalie.coburn@swahs.health.nsw.gov.au [Radiation Oncology Network, Nepean Cancer Care Centre, University of Sydney, Sydney, New South Wales (Australia); Beldham-Collins, Rachael [Radiation Oncology Network, Nepean Cancer Care Centre, University of Sydney, Sydney, New South Wales (Australia); Radiation Oncology Network, Westmead Cancer Care Centre, University of Sydney, Sydney, New South Wales (Australia); Westling, Jelene; Trovato, Jenny [Radiation Oncology Network, Nepean Cancer Care Centre, University of Sydney, Sydney, New South Wales (Australia); Gebski, Val [National Health and Medical Research Council Clinical Trials Centre, University of Sydney, Sydney, New South Wales (Australia)

    2012-04-01T23:59:59.000Z

    Protocols commonly implemented in radiotherapy work areas may be classified as being either rigid (class solution) or flexible. Because formal evaluation of these protocol types has not occurred within the literature, we evaluated the efficiency of a rigid compared with flexible prostate planning protocol by assessing a series of completed 3D conformal prostate plans. Twenty prostate cancer patients with an average age of 70 years (range, 52-77) and sizes comprising 8 small, 10 medium, and 2 large were planned on the Phillips Pinnacle treatment planning system 6 times by radiation therapists with <2 years, 2-5 years, and >5 years of experience using a rigid and flexible protocol. Plans were critiqued using critical organ doses, confirmation numbers, and conformity index. Plans were then classified as being acceptable or not. Plans produced with the flexible protocol were 53% less likely to require modification (OR 0.47, 95% CI: 0.26, 0.84, p = 0.01). Planners with >5 years of experience were 78% more likely to produce plans requiring modification (OR 1.78, 95% CI: 1.12, 2.83, P = 0.02). Plans according to the flexible protocol took longer (112 min) compared with the time taken using a rigid protocol (68 min) (p < 0.001). The results suggest that further studies are needed; however, we propose that all radiation therapy planners should start with the same limitations, and if an acceptable plan is not reached, then flexibility should be given to improve the plan to meet the desired results.

  3. A Case for Climate Neutrality: Case Studies on Moving Towards...

    Open Energy Info (EERE)

    for Climate Neutrality: Case Studies on Moving Towards a Low Carbon Economy Jump to: navigation, search Tool Summary LAUNCH TOOL Name: A Case for Climate Neutrality: Case Studies...

  4. Beyond the Goldenberg-Vaidman protocol: Secure and efficient quantum communication using arbitrary, orthogonal, multi-particle quantum states

    E-Print Network [OSTI]

    Chitra Shukla; Anirban Pathak; R. Srikanth

    2012-10-09T23:59:59.000Z

    It is shown that maximally efficient protocols for secure direct quantum communications can be constructed using any arbitrary orthogonal basis. This establishes that no set of quantum states (e.g. GHZ states, W states, Brown states or Cluster states) has an advantage over the others, barring the relative difficulty in physical implementation. The work provides a wide choice of states for experimental realization of direct secure quantum communication protocols. We have also shown that this protocol can be generalized to a completely orthogonal state based protocol of Goldenberg-Vaidman (GV) type. The security of these protocols essentially arises from duality and monogamy of entanglement. This stands in contrast to protocols that employ non-orthogonal states, like Bennett-Brassard 1984 (BB84), where the security essentially comes from non-commutativity in the observable algebra.

  5. Quantum Error Correcting Codes and the Security Proof of the BB84 Protocol

    E-Print Network [OSTI]

    Ramesh Bhandari

    2014-08-30T23:59:59.000Z

    We describe the popular BB84 protocol and critically examine its security proof as presented by Shor and Preskill. The proof requires the use of quantum error correcting codes called the Calderbank-Shor-Steanne (CSS) quantum codes. These quantum codes are constructed in the quantum domain from two suitable classical linear codes, one used to correct for bit-flip errors and the other for phase-flip errors. Consequently, as a prelude to the security proof, the report reviews the essential properties of linear codes, especially the concept of cosets, before building the quantum codes that are utilized in the proof. The proof considers a security entanglement-based protocol, which is subsequently reduced to a "Prepare and Measure" protocol similar in structure to the BB84 protocol, thus establishing the security of the BB84 protocol. The proof, however, is not without assumptions, which are also enumerated. The treatment throughout is pedagogical, and this report, therefore, serves a useful tutorial for researchers, practitioners, and students, new to the field of quantum information science, in particular, quantum cryptography, as it develops the proof in a systematic manner, starting from the properties of linear codes, and then advancing to the quantum error correcting codes, which are critical to the understanding of the security proof.

  6. Application of the NREL Test-to-Failure Protocol for PV Modules

    SciTech Connect (OSTI)

    Hacke, P.; Osterwald, C.; Trudell, D.; Terwilliger, K.; Bosco, N.; Oelak, E.; Kurtz, S.

    2011-02-01T23:59:59.000Z

    Initial results of application of the NREL Test-to-Failure Protocol are presented and discussed. Six commercially available multicrystalline Si-cell flat-plate modules were subjected to the protocol with controls. The samples were divided among three test sequences, (1) 1000 hours of 85C/85% relative humidity with positive or negative 600 V bias to the active layers with respect to the grounded frame, (2) -40/85C thermal cycling with electrical load at the rated module power, and (3) an alternating sequence between tests (1) and (2). Application of the protocol manifested in the acceleration of degradation mechanisms seen in the field including backsheet delamination, corrosion, bubble formation within the laminate, discoloration of the antireflective coating, and localized heating with degradation of the backsheet as a result of moisture ingress, corrosion, and concentrated current flow. Significant differences in performance after one round of the protocol are seen in damp heat depending on the polarity of the bias applied to the active layer (the short-circuited power leads of the module). The protocol is found to successfully accelerate module degradation mechanisms that have been observed in the field and will help to differentiate the performance and reliability of various module technologies.

  7. Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses

    E-Print Network [OSTI]

    Marcos Curty; Norbert Lütkenhaus

    2005-02-20T23:59:59.000Z

    Unconditional security proofs of the Bennett-Brassard protocol of quantum key distribution have been obtained recently. These proofs cover also practical implementations that utilize weak coherent pulses in the four signal polarizations. Proven secure rates leave open the possibility that new proofs or new public discussion protocols obtain larger rates over increased distance. In this paper we investigate limits to error rate and signal losses that can be tolerated by future protocols and proofs.

  8. Design, rationale, and baseline characteristics of a cluster randomized controlled trial of pay for performance for hypertension treatment: Study Protocol

    E-Print Network [OSTI]

    2011-01-01T23:59:59.000Z

    for performance for hypertension treatment: study protocol.for performance for hypertension treatment: study protocolguidelines for treatment, hypertension is controlled in less

  9. A Comprehensive study of a New Multipath Energy Aware Routing Protocol for Mobile Ad-hoc Networks

    E-Print Network [OSTI]

    Chettibi, Saloua

    2009-01-01T23:59:59.000Z

    Maximizing network lifetime is a very challenging issue in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since mobile nodes are powered by limited-capacity batteries. Furthermore, replacing or recharging batteries is often impossible in critical environments (e.g. battlefields, disaster areas, etc.) The proposed MEA-DSR (Multipath Energy-Aware on Demand Source Routing) protocol uses a load distribution policy in order to maximize network lifetime. The simulation results have shown the efficiency of the proposed protocol in comparison to DSR routing protocol in many difficult scenarios

  10. Project Finance Case Studies

    Broader source: Energy.gov [DOE]

    Presentation covers the Project Finance Case Studies and is given at the Spring 2010 Federal Utility Partnership Working Group (FUPWG) meeting in Rapid City, South Dakota.

  11. AGEM: Adaptive Greedy-Compass Energy-aware Multipath Routing Protocol for WMSNs

    E-Print Network [OSTI]

    Medjiah, Samir; Krief, Francine

    2012-01-01T23:59:59.000Z

    This paper presents an Adaptive Greedy-compass Energy-aware Multipath protocol (AGEM), a novel routing protocol for wireless multimedia sensors networks (WMSNs). AGEM uses sensors node positions to make packet forwarding decisions. These decisions are made online, at each forwarding node, in such a way that there is no need for global network topology knowledge and maintenance. AGEM routing protocol performs load-balancing to minimize energy consumption among nodes using twofold policy: (1) smart greedy forwarding, based on adaptive compass and (2) walking back forwarding to avoid holes. Performance evaluations of AGEM compared to GPSR (Greedy Perimeter Stateless Routing) show that AGEM can: (a) maximize the network lifetime, (b) guarantee quality of service for video stream transmission, and (c) scale better on densely deployed wireless sensors network.

  12. A Multipath Energy-Aware On demand Source Routing Protocol for Mobile Ad-Hoc Networks

    E-Print Network [OSTI]

    Chettibi, Saloua

    2009-01-01T23:59:59.000Z

    Energy consumption is the most challenging issue in routing protocol design for mobile ad-hoc networks (MANETs), since mobile nodes are battery powered. Furthermore, replacing or recharging batteries is often impossible in critical environments such as in military or rescue missions. In a MANET, the energy depletion of a node does not affect the node itself only, but the overall network lifetime. In this paper, we present multipath and energy-aware on demand source routing (MEA-DSR) protocol, which exploits route diversity and information about batteries-energy levels for balancing energy consumption between mobile nodes. Simulation results, have shown that MEA-DSR protocol is more energy efficient than DSR in almost mobility scenarios.

  13. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    SciTech Connect (OSTI)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong [Center for Quantum Information and Quantum Control (CQIQC), Department of Physics and Department of Electrical and Computing Engineering, University of Toronto, 60 Saint George Street, Toronto, Ontario, M5S 1A7 (Canada)

    2011-01-15T23:59:59.000Z

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  14. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    SciTech Connect (OSTI)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01T23:59:59.000Z

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  15. Quantum brachistochrone curves as geodesics: obtaining accurate control protocols for time-optimal quantum gates

    E-Print Network [OSTI]

    Xiaoting Wang; Michele Allegra; Kurt Jacobs; Seth Lloyd; Cosmo Lupo; Masoud Mohseni

    2014-08-11T23:59:59.000Z

    Most methods of optimal control cannot obtain accurate time-optimal protocols. The quantum brachistochrone equation is an exception, and has the potential to provide accurate time-optimal protocols for essentially any quantum control problem. So far this potential has not been realized, however, due to the inadequacy of conventional numerical methods to solve it. Here, using differential geometry, we reformulate the quantum brachistochrone curves as geodesics on the unitary group. With this identification we are able to obtain a numerical method that efficiently solves the brachistochrone problem. We apply it to two examples demonstrating its power.

  16. Whole Building Cost and Performance Measurement: Data Collection Protocol Revision 2

    SciTech Connect (OSTI)

    Fowler, Kimberly M.; Spees, Kathleen L.; Kora, Angela R.; Rauch, Emily M.; Hathaway, John E.; Solana, Amy E.

    2009-03-27T23:59:59.000Z

    This protocol was written for the Department of Energy’s Federal Energy Management Program (FEMP) to be used by the public as a tool for assessing building cost and performance measurement. The primary audiences are sustainable design professionals, asset owners, building managers, and research professionals within the Federal sector. The protocol was developed based on the need for measured performance and cost data on sustainable design projects. Historically there has not been a significant driver in the public or private sector to quantify whole building performance in comparable terms. The deployment of sustainable design into the building sector has initiated many questions on the performance and operational cost of these buildings.

  17. Confidential Continuous Variable Direct Communication Protocol by Using Fock-Coherent Entangled States

    E-Print Network [OSTI]

    Soudeh Jahanshahi; Soroosh Alighanbari; Alireza Bahrampour; Mohammad Hossein Zandi

    2015-02-02T23:59:59.000Z

    We propose a scheme for the secure direct communication based on the entangled phase-coherent states, which shows an elevated level of confidentiality. The protocol gives a simultaneous security control for every bit of transferred information. The security-check-per-bit is provided by sending an additional mode to prove the legitimate parties' authenticity. Other benefit include increased transfer rate, since a separate control sequences is unnecessary. We study the security of the scheme for both ideal and realistic quantum channel. The protocol shows a robust security and prepares 50% probability to detect the presence of the eavesdropper.

  18. A novel protocol for linearization of the Poisson-Boltzmann equation

    E-Print Network [OSTI]

    R. Tsekov

    2014-10-25T23:59:59.000Z

    A new protocol for linearization of the Poisson-Boltzmann equation is proposed and the resultant electrostatic equation coincides formally with the Debye-Huckel equation, the solution of which is well known for many electrostatic problems. The protocol is examined on the example of electrostatically stabilized nano-bubbles and it is shown that stable nano-bubbles could be present in aqueous solutions of anionic surfactants near the critical temperature, if the surface potential is constant. At constant surface charge non nano-bubble could exist.

  19. Tree Slotted Aloha: a New Protocol for Tag Identification in RFID Networks Maurizio A. Bonuccelli and Francesca Lonetti

    E-Print Network [OSTI]

    Scheuermann, Peter

    Tree Slotted Aloha: a New Protocol for Tag Identification in RFID Networks Maurizio A. Bonuccelli In this paper, we approach the problem of identifying a set of objects in an RFID network. We propose a modified version of Slotted Aloha protocol to reduce the number of transmission collisions. All tags select a slot

  20. 0-7803-7016-3/01/$10.00 2001 IEEE A Power Controlled Multiple Access Protocol for

    E-Print Network [OSTI]

    Chen, Yuanzhu Peter

    avoidance MAC protocols have typically used fixed transmission power, and have not considered power control of current protocols to a more flexible "variable bounded power" collision suppres- sion model. The algorithm. Keywords-- Multipel access, ad hoc wireless networks, power control I. Introduction A major issue