Powered by Deep Web Technologies
Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Kyoto Protocol | Open Energy Information  

Open Energy Info (EERE)

Kyoto Protocol Kyoto Protocol Jump to: navigation, search http://www.wired.com/thisdayintech/tag/climate-change/ Kyoto protocol negotiation The Kyoto Protocol, negotiated in 1997 and into force in 2005, is a binding agreement in which industrialized nations will seek emission-reducing strategies for the future years to come. "The Kyoto Protocol is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by 5.2% compared to the year 1990 (but note that, compared to the emissions levels that would be expected by 2010 without the Protocol, this target represents a 29% cut). The goal is to lower overall emissions from six greenhouse gases - carbon dioxide, methane, nitrous oxide, sulfur hexafluoride, HFCs, and PFCs - calculated as an average over

2

Carbon sinks and emissions trading under the Kyoto Protocol: a legal analysis  

Science Journals Connector (OSTI)

...Saunders Carbon sinks and emissions trading under the Kyoto Protocol: a...the issues of carbon sinks and emissions trading nearly aborted the Kyoto Protocol...third flexibility mechanism, emissions trading, compounded the complexity...

2002-01-01T23:59:59.000Z

3

Kyoto Protocol Response (Alabama) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) < Back Eligibility Commercial Developer Fed. Government Industrial Local Government Program Info State Alabama Program Type Climate Policies Environmental Regulations Effective immediately, the Director of the Alabama Department of Environmental Management shall refrain from proposing or promulgating any new regulations intended in whole or in part to reduce emissions of greenhouse gases, as such gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors unless such reductions are required under existing statutes. In the absence of a resolution or other act of the Legislature of the State of Alabama approving same, the Director of the Alabama Department of

4

The Kyoto Protocol and developing countries  

E-Print Network [OSTI]

Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

5

The Kyoto Protocol: A business perspective  

SciTech Connect (OSTI)

Governments have made a tentative start in responding to climate change. In marathon negotiating sessions that extended into an extra day Dec. 1--11 in Kyoto, Japan, representatives from more than 160 governments hammered out the Kyoto Protocol to the United Nations Framework Convention on Climate Change (FCCC). The protocol calls for developed countries to reduce emissions of greenhouse gases (GHGs) on averaged by 5.2% below 1990 levels by the years 2008--2012. Developing countries have no new obligations. The paper discusses the agreement, ratification, future questions, business role, and the challenge.

Malin, C.B. [International Chamber of Commerce, Paris (France)

1998-01-19T23:59:59.000Z

6

Russia's role in the Kyoto Protocol  

E-Print Network [OSTI]

As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

Bernard, Alain.

7

Kyoto Protocol: Enforcement Prohibitions (West Virginia) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Kyoto Protocol: Enforcement Prohibitions (West Virginia) Kyoto Protocol: Enforcement Prohibitions (West Virginia) Kyoto Protocol: Enforcement Prohibitions (West Virginia) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State West Virginia Program Type Climate Policies The West Virginia division of environmental protection shall refrain from proposing or promulgating any new rule intended, in whole or in part, to reduce emissions of greenhouse gases from the residential, commercial,

8

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network [OSTI]

renewable energy. Instead, the Kyoto Protocol CDM process encourages carbon reduction in developing countries,

Ferrey, Steven

2010-01-01T23:59:59.000Z

9

Kyoto Protocol Act of 1998 (Illinois) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Kyoto Protocol Act of 1998 (Illinois) Kyoto Protocol Act of 1998 (Illinois) Kyoto Protocol Act of 1998 (Illinois) < Back Eligibility State/Provincial Govt Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Program Info State Illinois Program Type Climate Policies Environmental Regulations Provider Illinois Pollution Control Board Effective immediately, the Illinois Environmental Protection Agency and the Pollution Control Board shall not propose or adopt any new rule for the intended purpose of addressing the adverse effects of climate change which in whole or in part reduces emissions of greenhouse gases, as those gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors. In the absence of

10

The effect of the Kyoto Protocol on carbon dioxide emissions  

Science Journals Connector (OSTI)

In this paper, we investigate the impact of the Kyoto Protocol on world emissions of a greenhouse gas, carbon dioxide. We use a large unbalanced panel data ... the effects of the international agreement. While carbon

Risa Kumazawa; Michael S. Callaghan

2012-01-01T23:59:59.000Z

11

UNFINISHED BUSINESS: The Economics of The Kyoto Protocol  

SciTech Connect (OSTI)

The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of carbon if a global system of emissions mitigation could be quickly and effectively implemented. But it could also exceed $250 per tonne of carbon if the US must meet its emissions limitations entirely through domestic actions, and if mitigation obligations are not adequately anticipated by decision-makers.

JA Edmonds; CN MacCracken; RD Sands; SH Kim

2000-07-06T23:59:59.000Z

12

Carbon Sequestration, Soil Conservation, and the Kyoto Protocol: Summary of Implications  

Science Journals Connector (OSTI)

This paper discusses relationships between soil conservation, carbon sequestration, and the Kyoto Protocol. The Kyoto ... particularly true for soil conservation, where the sequestration of carbon above and below...

Julian Dumanski

2004-08-01T23:59:59.000Z

13

Multi-Gas Assessment of the Kyoto Protocol John Reilly,*  

E-Print Network [OSTI]

Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

14

Global warming mitigation and renewable energy policy development from the Kyoto Protocol to the Copenhagen Accord—A comment  

Science Journals Connector (OSTI)

Global warming is a grave environmental issue that has caught the attention of the globe. Due to the consequences of global warming, UNFCCC has established the Kyoto Protocol and the Copenhagen Accord as measures of combating climate change due to the emission of greenhouse gases. It has been three years since the first commitment period of the Kyoto Protocol and the Copenhagen Accord was just newly established. Therefore, there is a necessity to evaluate the performance of the Kyoto Protocol and to comment upon the Copenhagen Accord in its contributions toward climate change mitigation. Major greenhouse gas (GHG) emitters who are among the Kyoto Protocol ratifying developed nations exhibit the potential to achieve the desired Kyoto pledges through the aid of Clean Development Mechanisms (mainly from using renewable energy), as proposed in the Kyoto Protocol. However, the nullifying effects from non-ratified major emitters like the US and ratified but still developing countries have difficulties in adhering to the Kyoto Protocol. The Copenhagen Accord, on the other hand, is considered to be less ambitious and provides limited financial aid through the Copenhagen Green Climate Fund. The formulation of such a document indicates that modern societies continues to waste time in negotiations that emphasize on individual economic and political advantages, rather than taking into account true global considerations. It raises questions regarding how much time is needed before we decide to fully commit to the effective and collective efforts of climate change mitigation.

Lee Chung Lau; Keat Teong Lee; Abdul Rahman Mohamed

2012-01-01T23:59:59.000Z

15

Impacts of the Kyoto Protocol on Energy Markets and Economic Activity  

Reports and Publications (EIA)

Analyzes the impacts on the Kyoto Protocol on U.S. energy markets and the economy in the 2008-2012 time frame.

1998-01-01T23:59:59.000Z

16

A game of climate chicken : can EPA regulate greenhouse gases before the U.S. Senate ratifies the Kyoto Protocol?  

E-Print Network [OSTI]

EPA's legal authority to regulate greenhouse gas emissions under the Clean Air Act is reviewed. While EPA clearly does not have the authority to implement the precise terms of the Kyoto Protocol, arguments could be put ...

Bugnion, Véronique.; Reiner, David M.

17

Impacts of the Kyoto protocol on U.S. energy markets and economic activity  

SciTech Connect (OSTI)

The Intergovernmental Panel on Climate Change (IPCC) was established by the World Meteorological Organization and the United Nations Environment Program in 1988 to assess the available scientific, technical, and socioeconomic information in the field of climate change. The most recent report of the IPCC concluded that ``Our ability to quantify the human influence on global climate is currently limited because the expected signal is still emerging from the noise of natural variability, and because there are uncertainties in key factors. These include the magnitudes and patterns of long-term variability and the time-evolving pattern of forcing by, and response to, changes in concentrations of greenhouse gases and aerosols, and land surface changes. Nevertheless the balance of evidence suggests that there is a discernible human influence on global climate. The first and second Conference of the Parties in 1995 and 1996 agreed to address the issue of greenhouse gas emissions for the period beyond 2000, and to negotiate quantified emission limitations and reductions for the third Conference of the Parties. On December 1 through 11, 1997, representatives from more than 160 countries met in Kyoto, Japan, to negotiate binding limits on greenhouse gas emissions for developed nations. The resulting Kyoto Protocol established emissions targets for each of the participating developed countries--the Annex 1 countries--relative to their 1990 emissions levels. 114 refs., 138 figs., 33 tabs.

NONE

1998-10-01T23:59:59.000Z

18

Analysis of the Impacts of an Early Start for Compliance with the Kyoto Protocol  

Gasoline and Diesel Fuel Update (EIA)

2 2 Analysis of the Impacts of an Early Start for Compliance with the Kyoto Protocol July 1999 Energy Information Administration Office of Integrated Analysis and Forecasting U.S. Department of Energy Washington, DC 20585 This report was prepared by the Energy Information Administration, the independent statistical and analytical agency within the Department of Energy. The information contained herein should be attributed to the Energy Information Administration and should not be construed as advocating or reflecting any policy position of the Department of Energy or of any other organization. Service Reports are prepared by the Energy Information Administration upon special request and are based on assumptions specified by the requester. Preface The analysis in this report was undertaken at the request of the Committee on Science of the U.S.

19

Kyoto's Unfinished Business  

E-Print Network [OSTI]

The authors offer a provisional assessment of where the Kyoto negotiations have left the climate change issue. They present a few widely divergent assesments of what the Kyoto Protocol on Climate Change will accomplish, ...

Jacoby, Henry D.; Prinn, Ronald G.; Schmalensee, Richard.

20

The cost efficiency of Kyoto flexible mechanisms: a top-down study with the GEM-E3 world model  

Science Journals Connector (OSTI)

Among Kyoto flexible mechanisms, emission trading (ET) shows more promise in cost efficiency but less flexibility in practice than Joint Implementation (JI) and the Clean Development Mechanism (CDM). The problem draws our attention to whether JI and ... Keywords: C68, Clean Development Mechanisms, Cost efficiency, Emission trading, Joint Implementation, Q43, Q48

Haoran Pan

2005-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Energy Policy 31 (2003) 459481 The costs of the Kyoto Protocol in the European Union  

E-Print Network [OSTI]

``flexible mechanisms'' (emission trading, clean development mechanism, and Joint Implementation) in order emissions trading within the European Union'' that proposes to introduce in 2005 an EU trading system be implemented at national level: e.g., emissions trading systems are in the process of being established

22

"The cream on the pudding..." : An analysis of the Clean Development Mechanism in the Indian wind power sector.  

E-Print Network [OSTI]

??The thesis examines the effects of the Clean Development Mechanism (CDM), a flexible mechanism under the Kyoto Protocol, on the Indian wind power sector. Indian… (more)

Turkanovic, Zlata

2010-01-01T23:59:59.000Z

23

kyoto1.htm  

Gasoline and Diesel Fuel Update (EIA)

THE COMMITTEE ON SCIENCE THE COMMITTEE ON SCIENCE U.S. HOUSE OF REPRESENTATIVES OCTOBER 9, 1998 At the request of the House of Representatives' Committee on Science, the Energy Information Administration has completed a detailed study of the potential, carbon-related impacts of the Kyoto Protocol on the price of energy in the United States and on the overall economy. The uncertainties involved in such an analysis are many, not the least of which is ambiguity about how much carbon emissions from energy use would actually have to be reduced in the United States versus how much of the Kyoto Protocol requirement could be met by other factors, such as reduced emissions from other greenhouse gases and international emissions trading. For this reason, further studies will clearly be needed.

24

Japanese nuclear power and the Kyoto agreement  

E-Print Network [OSTI]

We find that, on an economic basis, nuclear power could make a substantial contribution for meeting the emissions target Japan agreed to in the Kyoto Protocol. It is unlikely however that the contribution would be as large ...

Babiker, Mustafa H.M.; Reilly, John M.; Ellerman, A. Denny.

25

Post-Kyoto GHG-Offset Project Eligibility Criteria  

Science Journals Connector (OSTI)

A major question that was addressed in COP15 (Copenhagen) concerns which institutional changes are recommended for the Kyoto flexible mechanisms in the post-Kyoto regime. The Clean Development Mechanism (CDM) has...

Brian Robertson

2011-01-01T23:59:59.000Z

26

Cost saving in meeting the commitments of the Kyoto Protocol through the abatement of non-CO2 greenhouse gas emissions  

Science Journals Connector (OSTI)

Reduction of CO2 emissions has proved to he difficult in Finland and it is therefore essential to find the optimal allocation of reduction measures between different greenhouse gases mentioned in the Kyoto Protoc...

S. Tuhkanen; R. Pipatti

2000-01-01T23:59:59.000Z

27

The changing role of the project mechanisms in emissions trading  

Science Journals Connector (OSTI)

The perception of the project-based mechanisms has varied since their inception under the name of Activities Implemented Jointly (AIJ) to their form under the Kyoto Protocol of Joint Implementation (JI) and the C...

Katherine G. Begg

2006-01-01T23:59:59.000Z

28

Southeast Asia and Kyoto University  

E-Print Network [OSTI]

, Kyoto University opened its ASEAN Center in Bangkok, Thailand (p.11), the latest development in over

Takada, Shoji

29

Carbon Sequestered, Carbon Displaced and the Kyoto Context  

SciTech Connect (OSTI)

The integrated system that embraces forest management, forest products, and land-use change impacts the global carbon cycle - and hence the net emission of the greenhouse gas carbon dioxide - in four fundamental ways. Carbon is stored in living and dead biomass, carbon is stored in wood products and landfills, forest products substitute in the market place for products made from other materials, and forest harvests can be used wholly or partially to displace fossil fuels in the energy sector. Implementation of the Kyoto Protocol to the United Nations Framework Convention on Climate Change would result in the creation of international markets for carbon dioxide emissions credits, but the current Kyoto text does not treat all carbon identically. We have developed a carbon accounting model, GORCAM, to examine a variety of scenarios for land management and the production of forest products. In this paper we explore, for two simple scenarios of forest management, the carbon flows that occur and how these might be accounted for under the Kyoto text. The Kyoto protocol raises questions about what activities can result in emissions credits, which carbon reservoirs will be counted, who will receive the credits, and how much credit will be available? The Kyoto Protocol would sometimes give credits for carbon sequestered, but it would always give credits when fossil-fuel carbon dioxide emissions are displaced.

Marland, G.; Schlamadinger, B.

1999-04-18T23:59:59.000Z

30

A multipath routeless routing protocol with an efficient location update mechanism  

Science Journals Connector (OSTI)

In this paper, we introduce and evaluate an efficient multipath 'routeless' routing (MRR) protocol. MRR is a form of beaconless geographic routing protocol, and uses a simple location update mechanism to achieve high throughput with few retransmissions. Unlike the standard beaconless routing (BLR) protocol, our main point of comparison, our protocol constructs a single forwarding area to identify nodes between the source and destination. This forwarding area is a rectangular area shape with enough width to allow multiple routes. Promising simulation results show that our protocol outperforms the standard BLR approach with respect to energy consumption, packet delivery ratio, and the average number of hops.

Mohammad Al-Otaibi; Hamdy Soliman; Jun Zheng

2011-01-01T23:59:59.000Z

31

The Clean Development Mechanism and CER Price Formation in the Carbon Emission  

E-Print Network [OSTI]

The Clean Development Mechanism and CER Price Formation in the Carbon Emission Markets Ren such as the European Union Emissions Trading Scheme (EU ETS) and offset certificates such as CERs generated within historically. Keywords. Environmental risk, energy economics, cap-and-trade, carbon mar- kets, Kyoto protocol

Carmona, Rene

32

Automated Protocol for the Analysis of Dynamic Mechanical Analyzer Date from Fine Aggregate Asphalt Mixes  

E-Print Network [OSTI]

AUTOMATED PROTOCOL FOR ANALYSIS OF DYNAMIC MECHANICAL ANALYZER DATA FROM FINE AGGREGATE ASPHALT MIXES A Thesis by PEDRO CAVALCANTI DE SOUSA Submitted to the Office of Graduate Studies of Texas A&M University in partial... by PEDRO CAVALCANTI DE SOUSA Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved by: Co-Chairs of Committee, Dallas N. Little Eyad Masad...

Cavalcanti De Sousa, Pedro

2010-10-12T23:59:59.000Z

33

Special Features: Kyoto University with ASEAN and Beyond  

E-Print Network [OSTI]

Special Features: Kyoto University with ASEAN and Beyond Kyoto University Vol.4 No.2 September 2014 #12;Contents 1 Message from the President Kyoto University with ASEAN and Beyond 2 History Southeast in ASEAN Region 22 Fostering the Next Generation -- The Hakubi Project A Unique Opportunity

Takada, Shoji

34

An improved 45Ca protocol for investigating physiological mechanisms in coral calcification  

Science Journals Connector (OSTI)

A sensitive experimental protocol using cloned corals (hereafter “microcolonies”) of the branching scleractinian coral Stylophora pistillata and 45Ca has been developed to enable reproducible measurements of phys...

E. Tambutté; D. Allemand; I. Bourge; J. -P. Gattuso; J. Jaubert

1995-05-01T23:59:59.000Z

35

E-Print Network 3.0 - applications kyoto japan Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

kyoto japan Search Powered by Explorit Topic List Advanced Search Sample search results for: applications kyoto japan Page: << < 1 2 3 4 5 > >> 1 Japan-Taiwan Joint...

36

E-Print Network 3.0 - advanced applications kyoto Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

index.html Summary: Kyoto University of Foreign Studies (KUFS): http... that of Japan and other Asian countries. Exchange stu- dents studying at the Kyoto University of...

37

Greetings from Kyoto-U SPRING 2010 C O N T E N T S  

E-Print Network [OSTI]

signed with the ASEAN University Network (AUN) Foreign language Publication of "MANGA Kyoto University" 8

Takada, Shoji

38

Kyoto-Related Fossil-Fuel CO2 Emission Totals  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Kyoto-Related Emissions Kyoto-Related Emissions Kyoto-Related Fossil-Fuel CO2 Emission Totals DOI: 10.3334/CDIAC/ffe.007_V2012 world map Kyoto-Related Fossil-Fuel CO2 Emission Totals Year Annex B Countries Non Annex B Countries Fossil-Fuel CO2 Emissions (million metric tonnes C) Bunkers (million metric tonnes C) Fossil-Fuel CO2 Emissions (million metric tonnes C) Bunkers (million metric tonnes C) 1990 3894 90 2111 46 1991 3801 94 2299 38 1992 3750 109 2263 44 1993 3685 107 2339 48 1994 3656 107 2469 54 1995 3681 110 2570 59 1996 3704 111 2657 72 1997 3727 114 2737 74 1998 3746 118 2698 82 1999 3678 124 2718 90 2000 3725 130 2821 90 2001 3781 120 2936 92 2002 3764 128 3013 94 2003 3853 123 3347 98 2004 3888 135 3683 107 2005 3933 142 3926 106

39

Carbon emissions and the Kyoto commitment in the European Union  

E-Print Network [OSTI]

We estimate reference CO? emission projections in the European Union, and quantify the economic impacts of the Kyoto commitment on Member States. We consider the case where each EU member individually meets a CO? emissions ...

Viguier, Laurent L.; Babiker, Mustafa H.M.; Reilly, John M.

40

KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers  

E-Print Network [OSTI]

............................................. 16 Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market Other City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University Kyoto International Community House

Takada, Shoji

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

(mercury.yukawa.kyoto-u.ac.jp)ssh Permission denied (publickey).  

E-Print Network [OSTI]

SSH Q&A (mercury.yukawa.kyoto-u.ac.jp)ssh Permission denied (publickey). (1) ID ID ID (2) ssh -i () ssh -i $HOME/.ssh/id_yitp_rsa (UID)@mercury.yukawa.kyoto-u.ac.jp (3) (1)(2) Permission denied support@yukawa.kyoto-u.ac.jp (mercury

Shimizu, Akira

42

Kyoto University has launched a Japan-Thailand collaborative research  

E-Print Network [OSTI]

Kyoto University has launched a Japan-Thailand collaborative research project titled "Development of clean and efficient utilization of low rank coals and biomass by solvent treatment," supported biomass waste as well as low-rank coals into valuable products such as carbon fiber, biofuel, and high

Takada, Shoji

43

News Letter Institute of Advanced Energy, Kyoto University  

E-Print Network [OSTI]

;"Energy Research Issue" The IAE has many groups researching various fields of energy related issues. Abstract definition of energy consists of two parts: Energy = Exergy +Anergy Exergy is a part of energyNews Letter Institute of Advanced Energy, Kyoto University ISSN 1342-3193 IAE-NL-2014 No.54 http

Takada, Shoji

44

News Letter Institute of Advanced Energy, Kyoto University  

E-Print Network [OSTI]

Materials Science Workshop" Institute of Advanced Energy, Kyoto University #12; 25 1 22 ASEAN 5 ASEANNational University of SingaporeChulalongkorn UniversityASEAN University Network AUN Nantana Gajaseni Institut Teknologi Bandung Akhmaloka Gajaseni "Student Mobility and ASEAN Credit Transfer System" Agreement

Takada, Shoji

45

Fostering a triple response mechanism to combat global climate change: Emission abatement, carbon capture and water improvement  

Science Journals Connector (OSTI)

The Kyoto Protocol has established emission abatement and carbon sink increase to cope with climate change. However, in recent years, developed countries tend to focus more on the former. The simplifying of GH...

Ke Zhou; Xia Cao

2010-09-01T23:59:59.000Z

46

Greenhouse Gas Emissions Trading in a Private Company — BP Amoco’s Flexible Mechanisms for an Efficient Climate Policy  

Science Journals Connector (OSTI)

The previous contributions tackled some aspects of flexible instruments: what the Kyoto Protocol says about them, how to shape abatement strategies, and what experiences were made with emissions trading in the Un...

Peter Knoedel

2000-01-01T23:59:59.000Z

47

A Proposal for the Design of the Successor to the Kyoto Protocol  

E-Print Network [OSTI]

in managing climate change does require developing countryclimate change agreement, and that developing countries willby developing countries (through CDM). Third, climate change

Karp, Larry; Zhao, Jinhua

2008-01-01T23:59:59.000Z

48

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network [OSTI]

1, 34. 214. Three of the 10 RGGI states, regulating carbonof dollars each from the RGGI revenue raised from auc-allowances. See States Raid RGGI Funds to Fill Budget Gap,

Ferrey, Steven

2010-01-01T23:59:59.000Z

49

Compliance and Emissions Trading under the Kyoto Protocol: Rules for Uncertain Inventories  

Science Journals Connector (OSTI)

A solution is proposed for proving compliance with emission targets and for emissions trading in the event of uncertainties in reported...? and calculating effective emissions for trading are derived. Based on th...

Zbigniew Nahorski; Joanna Horabik; Matthias Jonas

2007-09-01T23:59:59.000Z

50

Flexibility and Legitimacy — The Emissions Trading System under the Kyoto Protocol  

Science Journals Connector (OSTI)

In the field of environmental law, be it on the domestic or the international level, it is especially difficult to develop effective regulatory systems and systems for sanctions to enforce obligations. The leg...

Petra Lea Láncos

2010-01-01T23:59:59.000Z

51

Energy efficient service delivery in clouds in compliance with the kyoto protocol  

Science Journals Connector (OSTI)

Cloud computing is revolutionizing the ICT landscape by providing scalable and efficient computing resources on demand. The ICT industry --- especially data centers, are responsible for considerable amounts of CO2 emissions and will ...

Drazen Lucanin; Michael Maurer; Toni Mastelic; Ivona Brandic

2012-05-01T23:59:59.000Z

52

Kyoto: Think Global, Act Local (K:TGAL) | Open Energy Information  

Open Energy Info (EERE)

Kyoto: Think Global, Act Local (K:TGAL) Kyoto: Think Global, Act Local (K:TGAL) Jump to: navigation, search Name Kyoto: Think Global, Act Local (K:TGAL) Agency/Company /Organization Netherlands Development Cooperation Sector Land, Climate Topics GHG inventory Website http://www.communitycarbonfore Program Start 2003 Program End 2009 References K:TGAL[1] Kyoto: Think Global, Act Local (K:TGAL) Screenshot "Kyoto: Think Global, Act Local (K:TGAL) is a research and capacity building program, financed by the Netherlands Development Cooperation, it is investigating the possibilities and potential for Community Based Forest Management of existing natural forest to be included as an eligible carbon mitigation activity under international climate change agreements in the future, particularly under REDD policy. The program involves research teams

53

Possibility and potential of clean development mechanisms inChina  

SciTech Connect (OSTI)

China has become the world's second largest greenhouse gas(GHG) emitter behind the United States. It emits approximately threebillion tons of CO2 equivalents every year. Its growing economy and largepopulation are making a wealthier, more consumption-oriented country.Energy demand is expected to grow 5?10 percent per year through 2030.Therefore, a large potential of GHG emission reduction in Chinacan beexpected. The clean development mechanism (CDM) put forward in the KyotoProtocol for reductions of GHGs can support the sustainable developmentof developing countries and help developed countries to achieve theiremission reduction targets at low cost. However, there are still manydisagreements to be resolved between developing and developed countries.In this letter, we try to introduce the current development of CDMprojects in China and discuss its potential and opportunities in thefuture decades.

Gao, Weijun; Zhou, Nan; Li, Haifeng; Kammen, Daniel

2007-10-30T23:59:59.000Z

54

KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers  

E-Print Network [OSTI]

Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market Interpretation ....................................... 35 Access to Kyoto Station from Kansai International Airport Access to Katsura Station from Kansai

Takada, Shoji

55

KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers  

E-Print Network [OSTI]

............................................. 16 Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market ....................................... 35 Access to Kyoto Station from Kansai International Airport Access to Katsura Station from Kansai

Takada, Shoji

56

Composting projects under the Clean Development Mechanism: Sustainable contribution to mitigate climate change  

SciTech Connect (OSTI)

The Clean Development Mechanism (CDM) of the Kyoto Protocol aims to reduce greenhouse gas emissions in developing countries and at the same time to assist these countries in sustainable development. While composting as a suitable mitigation option in the waste sector can clearly contribute to the former goal there are indications that high rents can also be achieved regarding the latter. In this article composting is compared with other CDM project types inside and outside the waste sector with regards to both project numbers and contribution to sustainable development. It is found that, despite the high number of waste projects, composting is underrepresented and a major reason for this fact is identified. Based on a multi-criteria analysis it is shown that composting has a higher potential for contribution to sustainable development than most other best in class projects. As these contributions can only be assured if certain requirements are followed, eight key obligations are presented.

Rogger, Cyrill [Department for Management, Technology, and Economics, ETH Zurich, Kreuzplatz 5, 8032 Zurich (Switzerland); Beaurain, Francois [South Pole Carbon Asset Management Ltd., Switzerland, Technoparkstr. 1, 8005 Zurich (Switzerland); Schmidt, Tobias S., E-mail: tobiasschmidt@ethz.ch [Department for Management, Technology, and Economics, ETH Zurich, Kreuzplatz 5, 8032 Zurich (Switzerland)

2011-01-15T23:59:59.000Z

57

http://www.ms.u-tokyo.ac.jp/~yasuyuki/rims2011.htm April 1, 2011 March 31, 2012 RIMS, Kyoto University, Japan  

E-Print Network [OSTI]

University, Japan M. Izumi (Kyoto University),Y. Kawahigashi (University of Tokyo), H. Matui (Chiba) Organized by: September 5 - 9, 2011 (RIMS, Kyoto University, Japan) Invited Speakers: N. Brown, M. Dadarlat and Mathematical Physics December 7 - 16, 2011 (RIMS, Kyoto University, Japan) Invited Speakers: J. Cuntz, D

Kawahigashi, Yasuyuki

58

It's too late to seal a global climate deal. But we need action, not Kyoto II  

E-Print Network [OSTI]

to economic development, with development based on cleaner, sustainable technologies for power, transport, buildings and industry. The rich world will benefit as the poor world goes green, and will have to pay much wait It's too late to seal a global climate deal. But we need action, not Kyoto II |... http://www.guardian.co.uk/commentisfree/cif-green

59

On June 21, 2013, Kyoto University and Daikin Industries, Ltd. concluded a collaboration agreement  

E-Print Network [OSTI]

, and the pursuit of innovation. Under the agreement, the Daikin-Kyoto University Innovation Program (DK Program the following goals in three years. 1. Create new themes focusing on social values (drawing on the knowledge's partner universities) 3. Develop technology management methods (to continuously foster innovation

Takada, Shoji

60

Global Network Kyoto University has opened a new center in Bangkok, Thailand, dedicated to supporting research,  

E-Print Network [OSTI]

to supporting research, education, and international collaborations across the ASEAN region. To mark the launch of these activities, an official opening ceremony and a symposium titled "Kyoto University in ASEAN -- Past, Present, government, and industry from ASEAN member states and Japan convened at the opening ceremony

Takada, Shoji

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Response Protocol Distressed Students  

E-Print Network [OSTI]

Response Protocol Distressed Students REFERRAL IDENTIFIERS: Student distress may manifest, the Distressed Student Protocol will assist you in responding to the student and providing appropriate referrals

California at Santa Barbara, University of

62

http://www.kyoto-u.ac.jp/ja 22 22  

E-Print Network [OSTI]

Engineering, Mechanical Engineering and Science, Micro Engineering, Aeronautics and Astronautics, Nuclear; 22 22 2011 (Faculty of Engineering) 2011 (Faculty of Engineering) . 20 Pharmaceutical Sciences Pharmaceutical Sciences Pharmacy (6) Engineering Global Engineering, Architecture

Takada, Shoji

63

L'INITIATIVE EUROPEENNE "SUIVI GLOBAL POUR L'ENVIRONNEMENT ET LA SECURITE" (GMES) ET LE PROTOCOLE DE KYOTO1  

E-Print Network [OSTI]

, Belgique H. LE TREUT, UPMC, France A. MOREL, LPCM, France E. RASCHKE, GKSS Forschungszentrum Geesthacht

64

Changes in the use and management of forests for abating carbon emissions: issues and challenges under the Kyoto Protocol  

Science Journals Connector (OSTI)

...establishing plantations on non-forested...sustainably grown wood for energy intensive...quantities of biomass, which converts...Establishment of fuel-wood plantations can reduce impacts...outlook for future wood supply from forest plantations. Working paper...

2002-01-01T23:59:59.000Z

65

Kyoto & Kyoto University Kyoto: A Heartland  

E-Print Network [OSTI]

. It was also where the first hydroelectric power plant and tram system were developed, and the location

Takada, Shoji

66

Webinar: Hydrogen Refueling Protocols  

Broader source: Energy.gov [DOE]

Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

67

Application Protocol Reference Architecture Application Protocol Reference Architecture  

E-Print Network [OSTI]

Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

van Sinderen, Marten

68

Stream Control Transmission Protocol  

Science Journals Connector (OSTI)

This document describes the Stream Control Transmission Protocol (SCTP). SCTP is designed to transport PSTN signaling messages over IP networks, but is capable of broader applications.

R. Stewart; Q. Xie; K. Morneault; C. Sharp; H. Schwarzbauer; T. Taylor; I. Rytina; M. Kalla; L. Zhang; V. Paxson

2000-10-01T23:59:59.000Z

69

Kyoto Workshop  

Broader source: Energy.gov (indexed) [DOE]

Center for Reliable Electric Power Transmission Center for Reliable Electric Power Transmission Alan Mantooth, University of Arkansas 1 1 National Center for Reliable Electric Power Transmission A Center for Advanced Power Electronics Dr. H. Alan Mantooth, Director Dr. Simon Ang, Associate Director Dr. Juan Carlos Balda, Associate Director Dr. Roy McCann, Associate Director University of Arkansas - Fayetteville http://ncrept.eleg.uark.edu Silicon Carbide Research for Reliable Electric Power: Design and Test National Center for Reliable Electric Power Transmission Alan Mantooth, University of Arkansas 2 Research advanced power electronic solutions for grid- connected applications Fault currents continue to rise in urban centers and the use of FCLs provides an attractive way to extend the useful life of

70

Kyoto Workshop  

Broader source: Energy.gov (indexed) [DOE]

of Arkansas 15 15 UA Proposed Solution Multiport converter topology uses common transformer, reducing part count for total system. High frequency transformer link results...

71

The road from Kyoto: The evolution of carbon dioxide emissions from energy use in IEA countries  

SciTech Connect (OSTI)

Building on earlier analysis of energy use and CO{sub 2} emissions in 13 member countries of the International Energy Agency (IEA), the authors quantify energy use and carbon emissions for nearly three dozen activities and economic branches from the early 1970s to the mid 1990s. They show how lifestyles, economic structure, and overall economic growth affect the structure and rate of CO{sub 2} emissions. Similarly they show how energy intensities, final fuel mixes, and utility fuel mixes shape emissions. Using Laspeyres indices, they calculate the relative importance of each of these factors in affecting sectoral and total emissions over time. They focus on consumer sectors, homes and personal travel, but extend the analysis to all sectors of the economies studied. The authors find that emissions reductions in all sectors after 1990 have been slower than in the previous fifteen years, a period that saw emissions reductions in spite of economic growth. Manufacturing and households led the reductions in most cases, but progress has slowed markedly. In almost all cases, emissions from the transportation sector showed the least reduction and indeed some increases. Findings do not give an optimistic view of the recently concluded accords at the Third Conference of Parties (COP-3) in Kyoto, Japan. The authors conclude that the current rate of energy saving and fuel switching must be greatly accelerated if the IEA countries studied here are to affect reductions in CO{sub 2} emissions to meet their Kyoto targets.

Schipper, L.; Unander, F.; Marie, C.; Gorham, R.; Justus, D.; Ting, M.; Khrushch, M.; Krackeler, T.

1998-07-01T23:59:59.000Z

72

Chapter 14: Chiller Evaluation Protocol  

SciTech Connect (OSTI)

This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

Tiessen, A.

2014-09-01T23:59:59.000Z

73

Office Protocols | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Services » Oversight » Safety & Emergency Management Evaluations Services » Oversight » Safety & Emergency Management Evaluations » Office Protocols Office Protocols July 22, 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents December 4, 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 Protocol for High Hazard Nuclear Facility Project Oversight June 26, 2012 Protocol, Required Reading - June 2012 Protocol for Required Reading June 26, 2012 Protocol, Small Team Oversight Activities - June 2012 Protocol for Small Team Oversight Activities (Rev. 1) May 13, 2011 Protocol, Site Leads - May 2011 Protocol for Site Leads May 13, 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011

74

Response Protocol Distressed Students  

E-Print Network [OSTI]

Response Protocol Distressed Students REFERRAL IDENTIFIERS: Student distress may manifest, the Distressed Student Protocol will assist you in responding to the student and providing appropriate referrals not know which office to contact.The coordinators will consult about a student, provide referrals to campus

California at Santa Barbara, University of

75

POST-KYOTO POLICY IMPLICATIONS ON THE ENERGY SYSTEM: A TIAM-FR LONG-TERM PLANNING EXERCISE  

E-Print Network [OSTI]

marginal costs, the primary energy consumption and the energy mix. This paper compares global efforts of CO. Keywords CO2 mitigation targets, global energy system, long-term modelling Acknowledgement This researchPOST-KYOTO POLICY IMPLICATIONS ON THE ENERGY SYSTEM: A TIAM-FR LONG-TERM PLANNING EXERCISE Sandrine

Paris-Sud XI, Université de

76

International Energy Conference, 19 -21 May 2003 Energy Technologies for post-Kyoto targets in the medium term  

E-Print Network [OSTI]

Aquifers and Hydrocarbon Structures Power & Heat Air Air O2 N2 & O2 CO2 CO2 CO2 Compression & DehydrationInternational Energy Conference, 19 - 21 May 2003 Energy Technologies for post-Kyoto targets in the medium term CO2 Capture & Geological Storage Niels Peter Christensen International Ventures Director

77

Entrepreneurship and the carbon market: opportunities and challenges for South African entrepreneurs  

Science Journals Connector (OSTI)

The Kyoto Protocol and its implementation brought forward issues of climate change and its mitigation strategy by national measures through the creation of market mechanisms in carbon trading. The trading of emission certificates has become an important ... Keywords: Carbon market, Carbon trading, Clean Development Mechanism, Entrepreneurship, Kyoto Protocol, South Africa

Inga Jessica Nkusi; Semhar Habtezghi; Harald Dolles

2014-08-01T23:59:59.000Z

78

Office Protocols | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Protocol for the Development and Maintenance of Criteria and Review Approach Documents December 4, 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012...

79

SCADA protocol vulnerabilities  

Science Journals Connector (OSTI)

The majority of network traffic in process control networks is generated by industrial communication protocols, whose implementation represents a considerable part of the code that runs in process control systems. Consequently a large number of attack ...

Julian L. Rrushi

2012-01-01T23:59:59.000Z

80

Protocol design contests  

E-Print Network [OSTI]

In fields like data mining and natural language processing, design contests have been successfully used to advance the state of the art. Such contests offer an opportunity to bring the excitement and challenges of protocol ...

Winstein, Keith

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Internet Protocol Adoption: Learning from Bitcoin Position Paper  

E-Print Network [OSTI]

This position paper discusses two related questions: 1. Using the framework of network economics, what are success factors behind the adoption of Bitcoin (a cryptographic curreny), and can we copy them for other protocols? 2. Can we design more successful protocols if we have inband payment mechanisms to internalize the externalities that emerge during adoption and in steady state? 1.

Rainer Böhme; Westfälische Wilhelms-universität Münster

82

Optimal protocols for nonlocality distillation  

SciTech Connect (OSTI)

Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

Hoeyer, Peter; Rashid, Jibran [Department of Computer Science, University of Calgary, 2500 University Drive N.W., Calgary, Alberta, 2N 1N4 (Canada)

2010-10-15T23:59:59.000Z

83

Efficient Data Transfer Protocols  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Efficient Efficient Data Transfer Protocols for Big Data Brian Tierney ∗ , Ezra Kissel † , Martin Swany † , Eric Pouyoul ∗ ∗ Lawrence Berkeley National Laboratory, Berkeley, CA 94270 † School of Informatics and Computing, Indiana University, Bloomington, IN 47405 Abstract-Data set sizes are growing exponentially, so it is important to use data movement protocols that are the most efficient available. Most data movement tools today rely on TCP over sockets, which limits flows to around 20Gbps on today's hardware. RDMA over Converged Ethernet (RoCE) is a promising new technology for high-performance network data movement with minimal CPU impact over circuit-based infrastructures. We compare the performance of TCP, UDP, UDT, and RoCE over high latency 10Gbps and 40Gbps network paths, and show that RoCE-based data transfers can fill a 40Gbps path using much less CPU than other protocols.

84

APS Protocol for  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Protocol for Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material regulated by the U.S. Department of Transportation as a hazardous material. This procedure governs APS Beamline acceptance of all packages known or suspected to contain hazardous materials. It applies not only to shipments delivered to Argonne National Laboratory by common carriers, but also to materials brought to the laboratory by researchers in personal, rental, or institutionally owned vehicles. There is no threshold quantity below which the procedure need not be followed. Purpose This procedure is intended to minimize the negative consequences that could result from

85

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi of an on-demand minimum energy routing protocol and suggests mechanisms for their imple- mentation. We of an on-demand minimum energy routing protocol in terms of energy savings with an existing on-demand ad

86

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi the necessary features of an on-demand minimum energy routing protocol and suggests mechanisms the performance of an on-demand minimum energy routing protocol in terms of energy savings with an existing on

Brown, Timothy X.

87

A concrete roadmap toward a low-carbon society in case of Kyoto City  

Science Journals Connector (OSTI)

Although several central and local governments around the world have set long term low-carbon targets they do not always have concrete plans toward the goals. In order to reduce greenhouse gas(GHG) emission significantly various kinds of measures in various sectors will be required. Some measures reduce GHG emissions directly and are called “direct measures” in this study. To implement those direct measures by the target year indirect measures are also required such as economic incentives regulations and urban planning. This study proposes a method to develop a concrete long-term schedule of direct and indirect measures a “roadmap ” based on the idea of backcasting. To formulate the implementation of and relations between measures and to estimate the concrete schedule to achieve the targets we developed a model called “backcasting tool” (BCT). Given the information of measures including GHG emission reduction by measures required resource input and maximum total resource input and so on BCT estimates the progress of the measures from the current to the target year. The method was applied in Kyoto City with a low-carbon target 40% reduction in CO 2 emission from fossil fuel by 2030 compared with 1990. Using BCT we showed that a detailed schedule consists of about 100 measures classified into six fields. The result shows it is possible to achieve the target if all the measures both direct and indirect are implemented in time.

Kei Gomi; Yuki Ochi; Yuzuru Matsuoka

2010-01-01T23:59:59.000Z

88

MAPS MANUAL 2010 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2010 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

89

MAPS MANUAL 2014 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2014 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

90

MAPS MANUAL 2008 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2008 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Jim Saracco

DeSante, David F.

91

MAPS MANUAL 2013 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2013 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

92

MAPS MANUAL 2011 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2011 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

93

MAPS MANUAL 2012 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2012 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

94

The Cisco SRP MAC Layer Protocol  

Science Journals Connector (OSTI)

This document specifies the MAC layer protocol, "Spatial Reuse Protocol" (SRP) for use with ring based media. This is a second version of the protocol (V2).

D. Tsiang; G. Suwala

2000-08-01T23:59:59.000Z

95

Supplement No. 2 to the FUSRAP Summary Protocol – Verification and Certification Protocol  

Broader source: Energy.gov [DOE]

Supplement No. 2 to the FUSRAP Summary Protocol – Verification and Certification Protocol (November 1985, Rev. 1)

96

Extremal quantum protocols  

E-Print Network [OSTI]

Generalized quantum instruments correspond to measurements where the input and output are either states or more generally quantum circuits. These measurements describe any quantum protocol including games, communications, and algorithms. The set of generalized quantum instruments with a given input and output structure is a convex set. Here we investigate the extremal points of this set for the case of finite dimensional quantum systems and generalized instruments with finitely many outcomes. We derive algebraic necessary and sufficient conditions for extremality.

Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

2011-01-25T23:59:59.000Z

97

Communication complexity protocols for qutrits  

SciTech Connect (OSTI)

Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

Tamir, Boaz [Department of History and Philosophy of Science, Bar-Ilan University, Ramat-Gan (Israel)

2007-03-15T23:59:59.000Z

98

Energy Efficiency Savings Protocols | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols In April 2013 the U.S. Department of Energy published the first set of protocols for determining energy savings from energy efficiency measures and programs. You can read individual protocols below or all of them combined into a single report titled The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures. Acknowledgements Introduction Commercial and Industrial Lighting Evaluation Protocol Commercial and Industrial Lighting Controls Evaluation Protocol Small Commercial and Residential Unitary and Split System HVAC Cooling Equipment-Efficiency Upgrade Evaluation Protocol Residential Furnaces and Boilers Evaluation Protocol Residential Lighting Evaluation Protocol

99

Energy-Efficient Reliable Paths for On-Demand Routing Protocols Tamer Nadeem, Suman Banerjee, Archan Misra, Ashok Agrawala  

E-Print Network [OSTI]

1 Energy-Efficient Reliable Paths for On-Demand Routing Protocols Tamer Nadeem, Suman Banerjee within the framework of on-demand routing protocols. Computation of minimum energy reli- able paths does not work for on-demand protocols and some additional mechanisms are needed to compute energy

Banerjee, Suman

100

How to Implement a Protocol for Babel RMI  

SciTech Connect (OSTI)

RMI support in Babel has two main goals: transparency & flexibility. Transparency meaning that the new RMI features are entirely transparent to existing Babelized code; flexibility meaning the RMI capability should also be flexible enough to support a variety of RMI transport implementations. Babel RMI is a big success in both areas. Babel RMI is completely transparent to already Babelized implementation code, allowing painless upgrade, and only very minor setup changes are required in client code to take advantage of RMI. The Babel RMI transport mechanism is also extremely flexible. Any protocol that implements Babel's minimal, but complete, interface may be used as a Babel RMI protocol. The Babel RMI API allows users to select the best protocol and connection model for their application, whether that means a WebServices-like client-server model for use over a WAP, or a faster binary peer-to-peer protocol for use on different nodes in a leadership-class supercomputer. Users can even change protocols without recompiling their code. The goal of this paper is to give network researchers and protocol implementors the information they need to develop new protocols for Babel RMI. This paper will cover both the high-level interfaces in the Babel RMI API, and the low level details about how Babel RMI handles RMI objects.

Kumfert, G; Leek, J

2006-03-30T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Reovirus ?2 Protein Inhibits Interferon Signaling through a Novel Mechanism Involving Nuclear Accumulation of Interferon Regulatory Factor 9  

Science Journals Connector (OSTI)

...Novel Mechanism Involving Nuclear Accumulation of Interferon...University, Kyoto, Japan. 2 3 Geoffrey H. Holm...interfere with STAT1 or STAT2 nuclear translocation as has...M. Gadina, U. F. Power, and J. A. Johnston...function by sequestering nuclear import factors on the...

Jennifer Zurney; Takeshi Kobayashi; Geoffrey H. Holm; Terence S. Dermody; Barbara Sherry

2008-12-24T23:59:59.000Z

102

Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair'  

SciTech Connect (OSTI)

Three protocols of quantum cryptography with a nonmaximally entangled qubit pair [Phys. Rev. A 80, 022323 (2009)] were recently proposed by Shimizu, Tamaki, and Fukasaka. The security of these protocols is based on the quantum-mechanical constraint for a state transformation between nonmaximally entangled states. However, we find that the second protocol is vulnerable under the correlation-elicitation attack. An eavesdropper can obtain the encoded bit M although she has no knowledge about the random bit R.

Qin Sujuan; Gao Fei; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); Guo Fenzhuo [School of Science, Beijing University of Posts and Telecommunications, Beijing, 100876 (China)

2010-09-15T23:59:59.000Z

103

Life Validation Testing Protocol Development | Department of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Validation Testing Protocol Development Life Validation Testing Protocol Development Presentation from the U.S. DOE Office of Vehicle Technologies "Mega" Merit Review 2008 on...

104

Former Worker Program Medical Protocol  

Broader source: Energy.gov [DOE]

The medical protocol is intended to identify work-related health outcomes of relevance to DOE workers for which there are screening tests that are reasonably likely to be effective and beneficial to program participants.

105

Superior Energy Performance Certification Protocol  

Broader source: Energy.gov [DOE]

The Superior Energy Performance® (SEP™) Certification Protocol describes the purpose of the SEP program and defines the steps required for participation—from initial application through certification by an ANSI-ANAB accredited Verification Body.

106

SRP: a Scalable Resource Reservation Protocol for the Internet  

E-Print Network [OSTI]

SRP: a Scalable Resource Reservation Protocol for the Internet Werner Almesberger 1 , Tiziana (SRP) provides a light-weight reser- vation mechanism for adaptive multimedia applications. Our main these applications need in order to operate prop- erly. SRP aims to allow such applications to make a dependable

Almesberger, Werner

107

Summary Protocol: Identification, Characterization, Designation, Remedial  

Broader source: Energy.gov (indexed) [DOE]

Summary Protocol: Identification, Characterization, Designation, Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) More Documents & Publications Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol Pre-MARSSIM Surveys in a MARSSIM World: Demonstrating How Pre-MARSSIM Radiological Data Demonstrate Protectiveness at Formerly Utilized Sites Remedial Action Program Sites U.S. Department of Energy Guidelines for Residual Radioactive Material at

108

Building Technologies Office: House Simulation Protocols Report  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

House Simulation House Simulation Protocols Report to someone by E-mail Share Building Technologies Office: House Simulation Protocols Report on Facebook Tweet about Building Technologies Office: House Simulation Protocols Report on Twitter Bookmark Building Technologies Office: House Simulation Protocols Report on Google Bookmark Building Technologies Office: House Simulation Protocols Report on Delicious Rank Building Technologies Office: House Simulation Protocols Report on Digg Find More places to share Building Technologies Office: House Simulation Protocols Report on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America Research Innovations Research Tools Building Science Education Climate-Specific Guidance Solution Center

109

Shear Transformation Zones: State Determined or Protocol Dependent?  

E-Print Network [OSTI]

The concept of a Shear Transformation Zone (STZ) refers to a region in an amorphous solid that undergoes a plastic event when the material is put under an external mechanical load. An important question that had accompanied the development of the theory of plasticity in amorphous solids for many years now is whether an STZ is a {\\em region} existing in the material (which can be predicted by analyzing the unloaded material), or is it an {\\em event} that depends on the loading protocol (i.e., the event cannot be predicted without following the protocol itself). In this Letter we present strong evidence that the latter is the case. Infinitesimal changes of protocol result in macroscopically big jumps in the positions of plastic events, meaning that these can never be predicted from considering the unloaded material.

Oleg Gendelman; Prabhat K. Jaiswal; Itamar Procaccia; Bhaskar Sen Gupta; Jacques Zylberg

2014-08-18T23:59:59.000Z

110

Experimental study on the thorium-loaded accelerator-driven system at the Kyoto Univ. critical assembly  

SciTech Connect (OSTI)

The experimental study on the thorium-loaded accelerator-driven system (ADS) is conducted in the Kyoto Univ. Critical Assembly (KUCA). The experiments are carried out in both the critical and subcritical states for attaining the reaction rates of the thorium capture and fission reactions. In the critical system, the thorium plate irradiation experiment is carried out for the thorium capture and fission reactions. From the results of the measurements, the thorium fission reactions are obtained apparently in the critical system, and the C/E values of reaction rates show the accuracy of relative difference of about 30%. In the ADS experiments with 14 MeV neutrons and 100 MeV protons, the subcritical experiments are carried out in the thorium-loaded cores to obtain the capture reaction rates through the measurements of {sup 115}In(n, {gamma}){sup 116m}In reactions. The results of the experiments reveal the difference between the reaction rate distributions for the change in not only the neutron spectrum but also the external neutron source. The comparison between the measured and calculated reaction rate distributions demonstrates a discrepancy of the accuracy of reaction rate analyses of thorium capture reactions through the thorium-loaded ADS experiments with 14 MeV neutrons. Hereafter, kinetic experiments are planned to be carried out to deduce the delayed neutron decay constants and subcriticality using the pulsed neutron method. (authors)

Pyeon, C. H.; Yagi, T.; Lim, J. Y.; Misawa, T. [Nuclear Science Engineering Div., Research Reactor Inst., Kyoto Univ., Asashiro-nishi, Kumatori-cho, Sennan-gun, Osaka 590-0494 (Japan)

2012-07-01T23:59:59.000Z

111

UCSB Distressed Students Response Protocol  

E-Print Network [OSTI]

about a student, provide referrals to campus departments, develop action plans, and follow up academic or personal issues REFERRAL IDENTIFIERS: Student distress may manifest in behavior Student Protocol will assist you in responding to the student and providing appropriate referrals. Student

California at Santa Barbara, University of

112

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

113

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Broader source: Energy.gov (indexed) [DOE]

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Accelerated Stress Test Protocols for PEM...

114

Membrane and MEA Accelerated Stress Test Protocols | Department...  

Broader source: Energy.gov (indexed) [DOE]

Membrane and MEA Accelerated Stress Test Protocols Membrane and MEA Accelerated Stress Test Protocols This presentation on fuel cell membrane and MEA stress test protocols was...

115

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Broader source: Energy.gov (indexed) [DOE]

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells This document describes test protocols...

116

Knowledge Flow Analysis for Security Protocols  

E-Print Network [OSTI]

Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this ...

Torlak, Emina

2005-10-19T23:59:59.000Z

117

Computer Networking : Principles, Protocols and Practice  

E-Print Network [OSTI]

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure December 24 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 3.8 The Transmission Control Protocol

Bonaventure, Olivier

118

Computer Networking : Principles, Protocols and Practice  

E-Print Network [OSTI]

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure September 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 3.8 The Transmission Control Protocol

Bonaventure, Olivier

119

TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM  

E-Print Network [OSTI]

RFC: 793 TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 Admiralty Way Marina del Rey, California 90291 #12;#12;September 1981 Transmission Control Protocol TABLE ........................................... 12 2.9 Precedence and Security ...................................... 13 2.10 Robustness Principle

McBrien, Peter

120

Independent Oversight Appraisal Process Protocols  

Broader source: Energy.gov (indexed) [DOE]

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Independent Oversight Appraisal Process Protocols  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

122

Memory cost of quantum protocols  

E-Print Network [OSTI]

In this paper we consider the problem of minimizing the ancillary systems required to realize an arbitrary strategy of a quantum protocol, with the assistance of classical memory. For this purpose we introduce the notion of memory cost of a strategy, which measures the resources required in terms of ancillary dimension. We provide a condition for the cost to be equal to a given value, and we use this result to evaluate the cost in some special cases. As an example we show that any covariant protocol for the cloning of a unitary transformation requires at most one ancillary qubit. We also prove that the memory cost has to be determined globally, and cannot be calculated by optimizing the resources independently at each step of the strategy.

Alessandro Bisio; Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

2011-12-16T23:59:59.000Z

123

Multiple protocol fluorometer and method  

DOE Patents [OSTI]

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

124

Evaluation of a Swiss carbon tax with the Computable General Equilibrium Model  

E-Print Network [OSTI]

of the Kyoto protocol in Switzerland with and without international emissions trading [7], or assess

Lausanne, Ecole Polytechnique Fédérale de

125

Kyoto University International Center  

E-Print Network [OSTI]

and Astronautics, Nuclear Engineering, (6-year program) Faculty of Engineering Bachelor of Engineering Global Engineering, Architecture, Engineering Science, Electrical and Electronic Engineering, Informatics and Mathematical Science, Industrial

Takada, Shoji

126

Transportation Protocols Working Group First Conference Call...  

Broader source: Energy.gov (indexed) [DOE]

Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

127

SSF Experimental Protocols -- Lignocellulosic Biomass Hydrolysis...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SSF Experimental Protocols - Lignocellulosic Biomass Hydrolysis and Fermentation Laboratory Analytical Procedure (LAP) Issue Date: 10302001 N. Dowe and J. McMillan Technical...

128

ESPC ENABLE Measurement and Verification Protocol  

Broader source: Energy.gov [DOE]

Document provides an overview of the Measurement and Verification (M&V) Protocol utilized within ENABLE energy savings performance contract projects.

129

Superior Energy Performance Measurement and Verification Protocol...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

and Verification Protocol for Industry (November 2012) More Documents & Publications Energy Intensity Baselining and Tracking Guidance EnPI V4.0 Tool Algorithm Superior Energy...

130

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol  

E-Print Network [OSTI]

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol Xi in this paper. The proposed protocol is not only fair and optimistic, but also efficient and abuse the Internet. In such scenario, fairness is critical, because they may be potentially mistrusted. That is

131

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

132

Adaptive best effort protocols for video delivery  

E-Print Network [OSTI]

This thesis describes the design and implementation of ics. transport level protocols running on top of the IP layer to transmit video data over packet switched networks. These protocols address the issues of meeting real-time deadlines of the video...

Madhwaraj, Ashwin Raj

2012-06-07T23:59:59.000Z

133

Advantages of a Leveled Commitment Contracting Protocol  

E-Print Network [OSTI]

Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R. Lesser 7, 1995 #12; Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R, contracts have traditionally been binding. Such contracts do not al­ low agents to efficiently accommodate

Massachusetts at Amherst, University of

134

The Bitcoin Backbone Protocol: Analysis and Applications  

E-Print Network [OSTI]

The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay.leonardos@gmail.com November 16, 2014 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone

135

House Simulation Protocols Report | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Residential Buildings » Building America » House Simulation Residential Buildings » Building America » House Simulation Protocols Report House Simulation Protocols Report This image shows a cover of a report titled Building America House Simulation Protocols. The Building America logo is shown in the lower left corner of the report cover. Building America's House Simulation Protocols report is designed to assist researchers in tracking the progress of multiyear, whole-building energy reduction against research goals for new and existing homes. These protocols are preloaded into BEopt and use a consistent approach for defining a reference building, so that all projects can be compared to each other. The steps involved in conducting performance analysis include: Defining the appropriate reference building Various climate regions, house sizes, and house ages require slightly

136

Cryptanalysis of the arbitrated quantum signature protocols  

SciTech Connect (OSTI)

As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

2011-08-15T23:59:59.000Z

137

Physical process Mechanical mechanisms  

E-Print Network [OSTI]

1 Physical process Generation · Mechanical mechanisms F = m·a · Electric/Magnetic mechanisms F ­ Quadrupoles......shear stress fluctuations ­ High order poles...... phys. interpretation difficult Governing

Berlin,Technische Universität

138

Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product  

SciTech Connect (OSTI)

An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

O`Connell, L.J. [ed.

1994-12-01T23:59:59.000Z

139

DAD-MPR Flooding Protocol, Convergence Evaluation Through Simulation  

Science Journals Connector (OSTI)

In this paper, we present the convergence evaluation of DAD-MPR flooding protocol through simulation. DAD-MPR flooding protocol is the autoconfiguration protocol we proposed ... OLSR nodes with multiple interface...

Saadi Boudjit; Cédric Adjih; Paul Muhlethaler

2007-01-01T23:59:59.000Z

140

Protective Force Protocols for ESS Supported Performance Tests...  

Broader source: Energy.gov (indexed) [DOE]

Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12,...

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Ash Loading Protocol Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on Diesel Aftertreatment (Agreement 13415) Neutron Imaging of Advanced Engine Technologies...

142

International performance measurement and verification protocol for new construction  

E-Print Network [OSTI]

Performance Measurement and Verification Protocol for New1. INTRODUCTION Measurement and Verification (M&V) of energyPerformance Measurement & Verification Protocol.

2002-01-01T23:59:59.000Z

143

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol...

144

A Discussion of Testing Protocols and LANL's Contribution to...  

Broader source: Energy.gov (indexed) [DOE]

A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes...

145

Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx | Department...  

Office of Environmental Management (EM)

Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx More Documents & Publications Slide 1 LPP Risk Management Plan...

146

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Download the webinar slides from the U.S. Department...

147

STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING  

SciTech Connect (OSTI)

Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

2002-02-25T23:59:59.000Z

148

PEP Classroom Observation Protocol Project # _______ District __________________________ School ________________________________________  

E-Print Network [OSTI]

PEP Classroom Observation Protocol Project # _______ District __________________________ School (mark all that apply) Demonstrate or confirm known concepts/procedures Demonstrate or confirm known concepts/procedures Explore ideas, test conjectures, look for patterns Explore ideas, test conjectures

Lee, Carl

149

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

150

Entanglement Distillation Protocols and Number Theory  

E-Print Network [OSTI]

We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension $D$ benefits from applying basic concepts from number theory, since the set $\\zdn$ associated to Bell diagonal states is a module rather than a vector space. We find that a partition of $\\zdn$ into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analitically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension $D$. When $D$ is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

H. Bombin; M. A. Martin-Delgado

2005-03-01T23:59:59.000Z

151

Entanglement distillation protocols and number theory  

SciTech Connect (OSTI)

We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z{sub D}{sup n} associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z{sub D}{sup n} into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

Bombin, H.; Martin-Delgado, M.A. [Departamento de Fisica Teorica I, Universidad Complutense, 28040 Madrid (Spain)

2005-09-15T23:59:59.000Z

152

Adaptive protocols for the quantum depolarizing channel  

E-Print Network [OSTI]

In the first part, we present a family of entanglement purification protocols that generalize four previous methods, namely the recurrence method, the modified recurrence method, and the two methods proposed by Maneva-Smolin ...

Leung, Alan W

2007-01-01T23:59:59.000Z

153

NREL Test-to-Failure Protocol (Presentation)  

SciTech Connect (OSTI)

The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

Hacke, P.

2012-03-01T23:59:59.000Z

154

Membrane and MEA Accelerated Stress Test Protocols  

Broader source: Energy.gov (indexed) [DOE]

and MEA Accelerated Stress Test Protocols Presented at High Temperature Membrane Working Group Meeting Washington, DC May 14, 2007 T.G. Benjamin Argonne National Laboratory 2 0 10...

155

BPA's Proposed Oversupply Management Protocol Presentation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

M I N I S T R A T I O N BPA's Proposed Oversupply Management Protocol February 14, 2012 BPA Rates Hearing Room To participate by phone please call (888) 296-1938 and enter 563088...

156

Sensornet Protocol Tuning Using Principled Engineering Methods  

Science Journals Connector (OSTI)

......equally applicable to both energy-ignorant and energy-aware protocols...reasons including high cost, risk of low solution...3. 2. RELATED WORK Energy awareness and energy...typically small and non- renewable. Energy consumption......

Jonathan Tate; Iain Bate

2010-09-01T23:59:59.000Z

157

Energy-Conservation Clustering Protocol based on Heat Conductivity for Wireless Sensor Networks  

E-Print Network [OSTI]

-sensors based on MEMS (Micro-Electro-Mechanical Systems) technology. A wireless sensor network is composedEnergy-Conservation Clustering Protocol based on Heat Conductivity for Wireless Sensor Networks critical issues in wireless sensor networks is energy efficiency because of the limited energy network

Landfeldt, Bjorn

158

Application of the NREL Test-to-Failure Protocol for PV Modules  

SciTech Connect (OSTI)

Initial results of application of the NREL Test-to-Failure Protocol are presented and discussed. Six commercially available multicrystalline Si-cell flat-plate modules were subjected to the protocol with controls. The samples were divided among three test sequences, (1) 1000 hours of 85C/85% relative humidity with positive or negative 600 V bias to the active layers with respect to the grounded frame, (2) -40/85C thermal cycling with electrical load at the rated module power, and (3) an alternating sequence between tests (1) and (2). Application of the protocol manifested in the acceleration of degradation mechanisms seen in the field including backsheet delamination, corrosion, bubble formation within the laminate, discoloration of the antireflective coating, and localized heating with degradation of the backsheet as a result of moisture ingress, corrosion, and concentrated current flow. Significant differences in performance after one round of the protocol are seen in damp heat depending on the polarity of the bias applied to the active layer (the short-circuited power leads of the module). The protocol is found to successfully accelerate module degradation mechanisms that have been observed in the field and will help to differentiate the performance and reliability of various module technologies.

Hacke, P.; Osterwald, C.; Trudell, D.; Terwilliger, K.; Bosco, N.; Oelak, E.; Kurtz, S.

2011-02-01T23:59:59.000Z

159

Verifying multicast-based security protocols using the inductive method  

Science Journals Connector (OSTI)

Multicast, originally designed as an efficient way of broadcasting content, is being used in security protocols. Multicast security protocols are difficult to verify using model checking because they typically involve a large number of participants. ... Keywords: formal verification, multicast protocols, security protocols

Jean E. Martina; Lawrence C. Paulson

2013-03-01T23:59:59.000Z

160

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan Vaidyanathan-point of proposing a new transport protocol called ATP #12;Outline Problems with TCP ATP design elements ATP Protocol to the characteristics of the reverse path in wireline networks #12;ATP: Ad-hoc Transport Protocol TCP's components

Sivakumar, Raghupathy

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software  

E-Print Network [OSTI]

time.   Savings   measurement   and   verification   (M&V)  Performance   Measurement   and   Verification   Protocol:  

Jump, David

2014-01-01T23:59:59.000Z

162

FLIP: an Internetwork Protocol for Supporting Distributed Systems  

E-Print Network [OSTI]

are not well supported by protocols such as TCP/IP, X.25, and OSI TP4. As part of our ongoing research protocol, called FLIP (Fast Local Internet Protocol), is the subject of this paper. Although the ISO OSI a byte�stream protocol like TCP or OSI TP4

163

FLIP: an Internetwork Protocol for Supporting Distributed Systems  

E-Print Network [OSTI]

of communication are not well supported by protocols such as TCP/IP, X.25, and OSI TP4. As part of our ongoing. Although the ISO OSI protocols are not widely used, the OSI model is con- venient for describing where-performance RPC protocol rather than a byte-stream protocol like TCP or OSI TP4

Tanenbaum, Andrew S.

164

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells  

Broader source: Energy.gov [DOE]

Accelerated Stress Test Protocols for PEM Fuel Cells, Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies

165

Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Hydrogen Refueling Hydrogen Refueling Protocols Webinar (Text Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications

166

Carbon Nanotube DNA Sensor and Sensing Mechanism  

E-Print Network [OSTI]

Carbon Nanotube DNA Sensor and Sensing Mechanism Xiaowu Tang,*,, Sarunya Bansaruntip, Nozomi; Revised Manuscript Received June 7, 2006 ABSTRACT We report the fabrication of single-walled carbon nanotube (SWNT) DNA sensors and the sensing mechanism. The simple and generic protocol for label

Le Roy, Robert J.

167

Presentation 2.8: Program for the conversion of Russian municipal boilers with 20MW maximum capacity to biofuel due to funds from the emissions reduction units sell, under the Kyoto Protocol  

E-Print Network [OSTI]

economy in XXI century · High consumption of basic and service equipment · Low efficiency of equipment. roubles. Reconstruction period: 3 months Basic results: · Increased boiler's efficiency factor from 50Presentation 2.8: Program for the conversion of Russian municipal boilers with 20MW maximum

168

A calculus for cryptographic protocols: The spi calculus  

E-Print Network [OSTI]

We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as processes in the spi calculus and state their security properties in terms of coarsegrained notions of protocol equivalence.

Martin Abadi; Andrew D. Gordon

1999-01-01T23:59:59.000Z

169

Hybrid protocol of remote implementations of quantum operations  

E-Print Network [OSTI]

We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum state teleportation's (BQST) and Wang's one. The protocol is available for remote implemetations of quantum operations in the restricted sets specified in Sec. III. We also give the proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to BQST and Wang protocols.

Ning Bo Zhao; An Min Wang

2007-08-04T23:59:59.000Z

170

Interpolation of recurrence and hashing entanglement distillation protocols  

SciTech Connect (OSTI)

We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

Vollbrecht, Karl Gerd H.; Verstraete, Frank [Max-Planck-Institut fuer Quantenoptik, Hans-Kopfermann-Str. 1, D-85748 Garching (Germany)

2005-06-15T23:59:59.000Z

171

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS  

E-Print Network [OSTI]

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS #12 ASSESSMENT IN THE NETHERLANDS Published VSNU, KNAW and NWO 2009 This document is available through internet: Royal Netherlands Academy of Arts and Sciences (KNAW) The Academy's mission: As the forum, conscience

Franssen, Michael

172

Transport level multicast protocols providing reliability and scalability properties are certainly essential building blocks for several distributed group applications. We consider the effect of reliable multicast transport  

E-Print Network [OSTI]

1 Abstract Transport level multicast protocols providing reliability and scalability properties are certainly essential building blocks for several distributed group applications. We consider the effect of reliable multicast transport mechanisms on traffic characteristics and hence network performance. Although

Caglar, Mine

173

Chapter 15: Commercial New Construction Protocol  

SciTech Connect (OSTI)

This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

Keates, S.

2014-09-01T23:59:59.000Z

174

Chapter 22: Compressed Air Evaluation Protocol  

SciTech Connect (OSTI)

Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

Benton, N.

2014-11-01T23:59:59.000Z

175

Protocol, Small Team Oversight Activities - June 2012 | Department of  

Broader source: Energy.gov (indexed) [DOE]

Small Team Oversight Activities - June 2012 Small Team Oversight Activities - June 2012 Protocol, Small Team Oversight Activities - June 2012 June 2012 Protocol for Small Team Oversight Activities The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing an Office of Health, Safety and Security (HSS) small team oversight activity. These activities are the primary means of gathering independent performance data to support the independent oversight function. This protocol further discusses and categorizes these activities as oversight and operational awareness activities. Protocol, Small Team Oversight Activities - June 2012 More Documents & Publications Protocol, Site Leads - May 2011 Independent Oversight Assessment, Waste Treatment and Immobilization Plant

176

Secure SCADA Communication ProtocolPerformance Test Results | Department of  

Broader source: Energy.gov (indexed) [DOE]

SCADA Communication ProtocolPerformance Test Results SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication Protocol Performance Test Results More Documents & Publications AGA-12, Part 2 Performance Test Results AGA 12, Part 2 Performance Test Plan Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device

177

Optimal Decentralized Protocols for Electric Vehicle Charging  

E-Print Network [OSTI]

1 Optimal Decentralized Protocols for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low Abstract--We propose decentralized algorithms for optimally scheduling electric vehicle (EV) charging. The algorithms exploit the elasticity and controllability of electric vehicle loads in order to fill the valleys

Low, Steven H.

178

Measuring Transport Protocol Potential for Energy Efficiency  

E-Print Network [OSTI]

Measuring Transport Protocol Potential for Energy Efficiency S. Kontogiannis, L. Mamatas, I. Psaras, Greece {skontog, emamatas, ipsaras, vtsaousi}@ee.duth.gr Abstract. We investigate the energy-saving potential of transport pro- tocols. We focus on the system-related aspect of energy. Do we have to damage

Tsaoussidis, Vassilis

179

Utility, informativity and protocols Robert van Rooy  

E-Print Network [OSTI]

Utility, informativity and protocols Robert van Rooy ILLC/University of Amsterdam R particular natural assumptions the utility of questions and answers reduces to their informativity, and that the ordering relation induced by utility sometimes even reduces to the logical relation of entailment

van Rooij, Robert

180

Transport Control Protocol (TCP) In Heterogeneous Networks  

E-Print Network [OSTI]

Sprint Transport Control Protocol (TCP) In Heterogeneous Networks Objectives · Principles of TCP functional modules: slow start, congestion avoidance, fast transmission and fast recovery. ­ Maintain · Packet dropping is the only indication signal for network congestion (Maybe?) · Different transmission

Shihada, Basem

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Routing protocols in ad hoc networks  

Science Journals Connector (OSTI)

Ad hoc networking involves computers, typically wireless mobile nodes (MNs), that cooperatively form a network without specific user administration or configuration. In other words, ad hoc networking allows an arbitrary collection of MNs to create a ... Keywords: associativity-based routing (ABR), distributed bellman-ford (DBF), dynamic source routing (DSR), on-demand routing protocols

Dan Galatchi; Roxana Zoican

2005-03-01T23:59:59.000Z

182

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

DOE Webinar Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol U.S. DOE WEBINAR ON H2 FUELING PROTOCOLS: PARTICIPANTS Rob Burgess Moderator Jesse Schneider TIR J2601,...

183

A New Protocol for Evaluating Concrete Curing Effectiveness  

E-Print Network [OSTI]

and qualify the curing compound, a new evaluation protocol is introduced in this study. The new protocol consists of using measured relative humidity and temperature to calculate an effectiveness index (EI) which serves as an indicator of the effectiveness...

Sun, Peizhi

2013-07-22T23:59:59.000Z

184

Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley  

E-Print Network [OSTI]

and relies on the skill of the protocol designer. Saidi [32] proposes a semi-automatic design tool based

Foley, Simon

185

AMEAerospace & Mechanical  

E-Print Network [OSTI]

AMEAerospace & Mechanical Engineering #12;Aerospace and Mechanical Engineers design complex mechanical, thermal, fluidic, acousti- cal, optical, and electronic systems, with char- acteristic sizes space. Aerospace and Mechanical Engineering (AME) students conduct basic and applied research within

Wang, Hai

186

Using CSP for protocol analysis: the Needham-Schroeder  

E-Print Network [OSTI]

Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

Doran, Simon J.

187

ESTR -Energy Saving Token Ring Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

ESTR - Energy Saving Token Ring Protocol for Wireless Sensor Networks Faruk Bagci, Theo Ungerer a long lifetime of the sensor network and the application it is important to save energy. A sensor node control (MAC) protocol for wireless sensor networks, called Energy Saving Token Ring Protocol (ESTR). ESTR

Ungerer, Theo

188

A semantic translation method for data communication protocols  

Science Journals Connector (OSTI)

Protocol translation is a method for transforming pieces of information from a source protocol into relevant target protocol formats in order to communicate between heterogeneous legacy systems in interoperability environments. There are some existing ... Keywords: Gateway system, Heterogeneous system, Interoperability, Message translation, Semantic translation, Semantic-centric communication

Jingyu Kim; Sungwon Kang; Jihyun Lee; Bong Wan Choi

2012-12-01T23:59:59.000Z

189

A Program Logic for Verifying Secure Routing Protocols  

E-Print Network [OSTI]

reasoning. Existing protocol analysis tools [7, 12, 14] are rarely used in analyzing rout- ing protocolsA Program Logic for Verifying Secure Routing Protocols Chen Chen1 , Limin Jia2 , Hao Xu1 , Cheng done to understand and verify the formal security guarantees of proposed secure inter-domain routing

Pennsylvania, University of

190

A Program Logic for Verifying Secure Routing Protocols  

E-Print Network [OSTI]

protocol analysis tools [7, 11, 13] are rarely used in analyzing routing protocols becauseA Program Logic for Verifying Secure Routing Protocols (Technical Report) Chen Chen1 , Limin Jia2 done to understand and verify the formal security guarantees of proposed secure inter-domain routing

Sandholm, Tuomas W.

191

A Formal Framework for Secure Routing Protocols Wenchao Zhou3  

E-Print Network [OSTI]

verifies its security claims. Existing model-checking-based protocol analysis tools cannot be directlyA Formal Framework for Secure Routing Protocols Chen Chen1 Limin Jia2 Hao Xu1 Cheng Luo1 Wenchao routing protocol, is vulner- able to various attacks. Redesigns of Internet routing infrastructure (e.g. S

Sandholm, Tuomas W.

192

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan, Vaidyanathan protocol for ad-hoc net- works called ATP (ad-hoc transport protocol). We show through ns2 based simulations that ATP outperforms both default TCP and TCP-ELFN. Categories and Subject Descriptors C.2

Sivakumar, Raghupathy

193

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

194

Utilisation des Protocoles HARQ pour la Radio Cognitive  

E-Print Network [OSTI]

Utilisation des Protocoles HARQ pour la Radio Cognitive Romain Tajan encadré/01/2012 #12;Plan 1 Introduction 2 La Radio Cognitive Techniques de la Radio Cognitive Méthodes d'accès 3 performances du protocole IR-HARQ 4 Utilisation des protocoles HARQ pour la Radio Cognitive Utilisation de l

Dobigeon, Nicolas

195

Simplified VO M&V Protocol Simplified Voltage Optimization (VO)  

E-Print Network [OSTI]

Simplified VO M&V Protocol 1 Simplified Voltage Optimization (VO) Measurement and Verification Protocol 1.0 Introduction 1.1 Purpose The Simplified Voltage Optimization (VO) Measurement and Verification requirements, and measurement and verification formulations are included as part of this Protocol. 1

196

A Multi-Sender Asynchronous Extension to the AER Protocol  

E-Print Network [OSTI]

A Multi-Sender Asynchronous Extension to the AER Protocol John Lazzaro and John Wawrzynek Computer-event representation (AER) is an asynchronous point-to-point communi- cations protocol for silicon neural systems. This paper describes an extension of the AER protocol that allows multiple AER senders to share a common bus

Lazzaro, John

197

Lab protocols A. Preparation of competent Cells  

E-Print Network [OSTI]

for 30- 60 min. #12;Lab protocols C. Solutions RF1 Compound RbCl MnCl2 4H2O Potassium acetate CaCl2.2H2O-rinsed 0.22 u membrane. RF2 Compound MOPS RbCl CaCl2.2H2O Glycerol Amount/liter 20 ml of 0.5 M (pH6.8) 1

Oliver, Douglas L.

198

Building America 2014 House Simulation Protocols  

Broader source: Energy.gov [DOE]

The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

199

Nuclear Energy Governance and the Politics of Social Justice: Technology, Public Goods, and Redistribution in Russia and France  

E-Print Network [OSTI]

Energy Agency. "Nuclear Energy and the Kyoto Protocol" OECD/Energy Agency. "Nuclear Energy and the Kyoto Protocol" OECD/et al. "Perception of Nuclear Energy and Coal in France and

Grigoriadis, Theocharis N

2009-01-01T23:59:59.000Z

200

Protocol, Site Leads - May 2011 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 May 2011 Protocol for Site Leads The purpose of this protocol is to establish the requirements and responsibilities for the Office of Safety and Emergency Management Evaluations Site Leads. The Site Lead's primary responsibility is to perform independent safety oversight at their assigned site(s). Site Leads are assigned to Department of Energy (DOE) sites with nuclear facilities to maintain operational awareness, establish and implement a prioritized set of oversight activities focused on high hazard nuclear facilities and tailored to site conditions, activities and issues. Protocol, Site Leads - May 2011 More Documents & Publications Appraisal Process Protocols, Independent Oversight - November 2012

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Building Technologies Office: Open-Protocol Platform for Commercial  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Open-Protocol Platform Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project to someone by E-mail Share Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Facebook Tweet about Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Twitter Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Google Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Delicious Rank Building Technologies Office: Open-Protocol Platform for

202

KYOTO UNIVERSITYKYOTO UNIVERSITY Kyoto University Financial Report 2013 09  

E-Print Network [OSTI]

Report 201312 #12; 30 11 13AUN 2ASEAN+3 Educational Forum and Young Speakers Contest3 AUNASEAN University Network21 ASEAN+3 4 ASEAN+3 24 ...... 3,027 ...... 3,447 2451 ......13,403 ...... 9 Century Collections Online 1 KULINE 13AUN2 ASEAN+3 Educational Forum and Young Speakers Contest 6

Takada, Shoji

203

2014 Building America House Simulation Protocols  

SciTech Connect (OSTI)

As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

2014-03-01T23:59:59.000Z

204

Robust video authentication system over internet protocol  

Science Journals Connector (OSTI)

This paper presents a video authentication system over internet protocol that is insusceptible to illumination and expression variations. The illumination and expression invariant features are extracted using multi-band feature extraction. These features are classified by a radial basis function neural network. A new adaptive decision fusion method is proposed to combine the scores from different modalities and the different frames during the authentication process. Three levels of decision fusion are carried out in the proposed adaptive decision fusion. Depending on the level of decision fusion, the level of illumination influence is taken into account during the decision making.

Sue Inn Ch'ng; Kah Phooi Seng; Li-Minn Ang; Fong Tien Ong; Yee Wan Wong

2011-01-01T23:59:59.000Z

205

Kyoto University 1 Year Contents  

E-Print Network [OSTI]

and Plasma Physics Laboratory merged into the Institute of Advance Energy. Student Counseling Center in Humanities established. 1941 Chest Disease Research Institute and Institute of Atomic Energy established Laboratory established. 1996 Graduate School of Energy Science established. Institute of Atomic Energy

Takada, Shoji

206

Kyoto University 1 Year Contents  

E-Print Network [OSTI]

and Plasma Physics Laboratory merged into the Institute of Advance Energy. Student Counseling Center Chest Disease Research Institute and Institute of Atomic Energy established. 1944 Wood Research Laboratory established. 1996 Graduate School of Energy Science established. Institute of Atomic Energy

Takada, Shoji

207

KYOTO UNIVERSITYKYOTO UNIVERSITY Financial Report  

E-Print Network [OSTI]

Report 201312 #12; 30 11 13AUN 2ASEAN+3 Educational Forum and Young Speakers Contest3 AUNASEAN University Network21 ASEAN+3 4 ASEAN+3 24 ...... 3,027 ...... 3,447 2451 ......13,403 ...... 9 Century Collections Online 1 KULINE 13AUN2 ASEAN+3 Educational Forum and Young Speakers Contest 6

Takada, Shoji

208

GGREENHOUSE JJUSTICE MOVING BEYOND KYOTO  

E-Print Network [OSTI]

and forestry MtC Million tons carbon MtCO2-e Million tons carbon dioxide equivalent OECD Organization equivalent UNFCCC United Nations Framework Convention on Climate Change WTO World Trade Organization #12 or constructive engagement. Essentially, actions of many in civil society now con- stitute resistance to the COP

Delaware, University of

209

PROCEEDINGS OF RIKEN BNL RESEARCH CENTER WORKSHOP ON RHIC SPIN PHYSICS III AND IV, POLARIZED PARTONS AT HIGH Q2 REGION, AUGUST 3, 2000 AT BNL, OCTOBER 14, 2000 AT KYOTO UNIVERSITY.  

SciTech Connect (OSTI)

International workshop on II Polarized Partons at High Q2 region 11 was held at the Yukawa Institute for Theoretical Physics, Kyoto University, Kyoto, Japan on October 13-14, 2000, as a satellite of the international conference ''SPIN 2000'' (Osaka, Japan, October 16-21,2000). This workshop was supported by RIKEN (The Institute of Physical and Chemical Research) and by Yukawa Institute. The scientific program was focused on the upcoming polarized collider RHIC. The workshop was also an annual meeting of RHIC Spin Collaboration (RSC). The number of participants was 55, including 28 foreign visitors and 8 foreign-resident Japanese participants, reflecting the international nature of the RHIC spin program. At the workshop there were 25 oral presentations in four sessions, (1) RHIC Spin Commissioning, (2) Polarized Partons, Present and Future, (3) New Ideas on Polarization Phenomena, (4) Strategy for the Coming Spin Running. In (1) the successful polarized proton commissioning and the readiness of the accelerator for the physics program impressed us. In (2) and (3) active discussions were made on the new structure function to be firstly measured at RHIC, and several new theoretical ideas were presented. In session (4) we have established a plan for the beam time requirement toward the first collision of polarized protons. These proceedings include the transparencies presented at the workshop. The discussion on ''Strategy for the Coming Spin Running'' was summarized by the chairman of the session, S. Vigdor and G. Bunce.

BUNCE, G.; VIGDOR, S.

2001-03-15T23:59:59.000Z

210

Security Proof of a Semi-Quantum Key Distribution Protocol  

E-Print Network [OSTI]

Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their security analysis is difficult and little is known concerning how secure they are compared to their fully quantum counterparts. In this paper we prove the unconditional security of a particular semi-quantum protocol. We derive an expression for the key rate of this protocol, in the asymptotic scenario, as a function of the quantum channel's noise. Finally, we will show that this semi-quantum protocol can tolerate a maximal noise level comparable to certain fully quantum protocols.

Walter O. Krawec

2014-11-30T23:59:59.000Z

211

The Greenhouse Gas Protocol Initiative: Sector Specific Tools | Open Energy  

Open Energy Info (EERE)

Gas Protocol Initiative: Sector Specific Tools Gas Protocol Initiative: Sector Specific Tools Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Sector Specific Tools Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Industry, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity[1] The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion[2] The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources[3]

212

Separable states improve protocols with restricted randomness  

E-Print Network [OSTI]

It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterise the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models and separable, i.e. disentangled, states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that in particular, separable states may improve the so-called random access codes, which is a class of communication problems where one party tries to read a portion of the data held by another distant party in presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord.

T. K. Chuan; T. Paterek

2014-10-07T23:59:59.000Z

213

Fibred Coalgebraic Logic and Quantum Protocols  

E-Print Network [OSTI]

Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

Daniel Marsden

2014-12-30T23:59:59.000Z

214

Chapter 18: Variable Frequency Drive Evaluation Protocol  

SciTech Connect (OSTI)

An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

Romberger, J.

2014-11-01T23:59:59.000Z

215

ASHRAE's New Performance Measurement Protocols for Commercial Buildings  

E-Print Network [OSTI]

Services Administration. 10 IEA is the International Energy Agency. ESL-IC-08-10-11 Proceedings of the Eighth International Conference for Enhanced Building Operations, Berlin, Germany, October 20-22, 2008 2 The resultant protocols are intended to provide... Building Operations, Berlin, Germany, October 20-22, 2008 3 Chapter 1: Energy (Authors: MacDonald, Haberl). In Chapter 1 the protocols for measuring the building?s energy useare presented. These protocols begin with acollection of facility information...

Haberl, J.; Davies, H.; Owens, B.; Hunn, B.

216

XML-based security for JXTA core protocols  

Science Journals Connector (OSTI)

JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form autonomous peer groups. This paper presents a satisfactory ... Keywords: JXTA, P2P computing, PRP, XML, XMLdsig, XMLenc, ad hoc computing, authenticity, integrity, multi-hop computing, non-repudiation, peer, peer group, peer resolver protocol, peer-to-, pervasive computing, privacy, security

Joan Arnedo-Moreno; Jordi Herrera-Joancomarti

2010-12-01T23:59:59.000Z

217

Engineering Nonclassicality in a Mechanical System through Photon Subtraction  

Science Journals Connector (OSTI)

Nonclassical states of a mechanical mode at nonzero temperature are achieved in a scheme that combines radiation-pressure coupling to a light field and photon subtraction. The scheme embodies an original and experimentally realistic way to obtain mesoscopic quantumness by putting together two mature technologies for quantum control. The protocol is quasi-insensitive to mechanical damping.

Mauro Paternostro

2011-05-02T23:59:59.000Z

218

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Stationary Combustion Guidance[1] The Greenhouse Gas Protocol tool for stationary combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

219

Formal Modelling and Analysis of the NORM Multicast Protocol  

E-Print Network [OSTI]

Formal Modelling and Analysis of the NORM Multicast Protocol Using Real-Time Maude Elisabeth Lien . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 iii #12;2.3.2 Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Ã?lveczky, Peter Csaba

220

Security Communications Protocol Ad Hoc Working Group | Department...  

Office of Environmental Management (EM)

Protocol Ad Hoc Working Group More Documents & Publications Overview for Newcomers Isotope Program Transportation Shipping Radioactive Waste by Rail from Brookhaven National...

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Protocol, Appraisal Process Guide - April 2008 | Department of...  

Broader source: Energy.gov (indexed) [DOE]

of Independent Oversight Appraisal Process Protocols, which describe the overall philosophy, scope, and general procedures applicable to all Independent Oversight appraisal...

222

DOE Transportation Protocols Topic Group Summary of Second Conference  

Broader source: Energy.gov (indexed) [DOE]

Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

223

DOE Transportation Protocols Topic Group Conference Call Summary...  

Broader source: Energy.gov (indexed) [DOE]

Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TECWG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the...

224

The Greenhouse Gas Protocol Initiative: Measurement and Estimation...  

Open Energy Info (EERE)

Estimation of Uncertainty of GHG Emissions Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Measurement and Estimation of...

225

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary...  

Open Energy Info (EERE)

search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion AgencyCompany Organization: World Resources...

226

The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport...  

Open Energy Info (EERE)

search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources AgencyCompany Organization: World Resources...

227

TEC Working Group Topic Groups Archives Protocols Conference...  

Office of Environmental Management (EM)

Conference Call Summaries TEC Working Group Topic Groups Archives Protocols Conference Call Summaries Conference Call Summaries May 13, 1999 April 8, 1999 March 1, 1999 More...

228

The Greenhouse Gas Protocol Initiative: Allocation of Emissions...  

Open Energy Info (EERE)

Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Allocation of...

229

Chapter 5, Residential Furnaces and Boilers Evaluation Protocol...  

Office of Environmental Management (EM)

primarily in single-family homes and multifamily buildings with individual heating systems for each dwelling unit. This protocol does not cover integrated heating and water...

230

A search for quantum coin-flipping protocols using optimization ...  

E-Print Network [OSTI]

Mar 3, 2014 ... We conduct two kinds of search: one for protocols. ?Department of ..... This operation maps a probability vector to a quantum state, see Sub-.

2014-03-02T23:59:59.000Z

231

NEMVP: North American energy measurement and verification protocol  

SciTech Connect (OSTI)

This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

NONE

1996-03-01T23:59:59.000Z

232

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Broader source: Energy.gov (indexed) [DOE]

CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) March 2007 Fuel cells, especially for...

233

Protocol, Test Inspectors Guide - March 2008 | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Test Inspectors Guide - March 2008 Protocol, Test Inspectors Guide - March 2008 March 2008 Emergency Management Limited Scope Performance Test Inspectors Guide This Emergency...

234

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Broader source: Energy.gov (indexed) [DOE]

USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May...

235

Office of Environment, Safety and Health Assessments Protocol...  

Broader source: Energy.gov (indexed) [DOE]

Office of Environment, Safety and Health Assessments Protocol, Development and Maintenance of Criteria Review and Approach Documents, June 2014 Office of Environment, Safety and...

236

BPA's proposed oversupply management protocol, Attachment P Narrative...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

O N 1 Oversupply Management Protocol A. Background The Bonneville Power Administration ("BPA") operates the Federal Columbia River Power System ("FCRPS") as an integrated...

237

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased...  

Open Energy Info (EERE)

Purchased Electricity Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity AgencyCompany...

238

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Broader source: Energy.gov (indexed) [DOE]

Accelerated Ash-Loading Protocol for Diesel Particulate Filters Bruce G. Bunting and Todd J. Toops Oak Ridge National Laboratory Adam Youngquist and Ke Nguyen University of...

239

U-268: Oracle Database Authentication Protocol Discloses Session...  

Broader source: Energy.gov (indexed) [DOE]

the authentication protocol at the time of this entry. Please visit the Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin for additional information when it...

240

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol  

Broader source: Energy.gov [DOE]

Webinar slides from the U.S. Department of Energy Fuel Cell Technologies Office webinar, "Hydrogen Refueling Protocols," held February 22, 2013.

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

APS Protocol for Reporting Construction Vibration Issues for...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

in the online version. Advanced Photon Source APS Protocol for Reporting Construction Vibration Issues for Beamlines Section where used: This procedure describes the process for...

242

Carbon Trading Protocols for Geologic Sequestration  

E-Print Network [OSTI]

H. , 2005, IPCC: Carbon Capture and Storage: Technical05CH11231. INTRODUCTION Carbon capture and storage (CCS)Development Mechanism CCS: Carbon Capture and Storage C02e:

Hoversten, Shanna

2009-01-01T23:59:59.000Z

243

Policy strategies to address sustainability of Alaskan boreal forests in response to a directionally changing climate  

Science Journals Connector (OSTI)

...e.g., globalization of markets and finance institutions...are valued and traded in the market place. Other ecosystem...g., Kyoto Protocol) and market mechanisms (e.g., carbon...interior Alaska that depend on diesel fuel for power and heat. This...

F. Stuart Chapin III; Amy L. Lovecraft; Erika S. Zavaleta; Joanna Nelson; Martin D. Robards; Gary P. Kofinas; Sarah F. Trainor; Garry D. Peterson; Henry P. Huntington; Rosamond L. Naylor

2006-01-01T23:59:59.000Z

244

A differential game of joint implementation of environmental projects  

Science Journals Connector (OSTI)

This paper proposes a two-player, finite-horizon differential game model to analyze joint implementation in environmental projects, one of the flexible mechanisms considered in the Kyoto Protocol. Our results show that allowing for foreign investments ... Keywords: Differential games, Environment, Joint implementation

MichèLe Breton; Georges Zaccour; Mehdi Zahaf

2005-10-01T23:59:59.000Z

245

Analysis of emission right prices in greenhouse gas emission trading via agent-based model  

Science Journals Connector (OSTI)

This paper proposes a participant nation model for international emission trading; adaptive agents are used to explore the conditions under which an emission trading market is successful. In this study, the participation nation models with and without ... Keywords: Agent-Based Modeling, Compliance Mechanism, Emissions Trading, Kyoto Protocol, Reinforcement Learning

Tomohiro Nakada; Keiki Takadama; Shigeyoshi Watanabe

2013-05-01T23:59:59.000Z

246

AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS  

Broader source: Energy.gov (indexed) [DOE]

AVIATION BOARD OF DIRECTORS AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS The Department of Energy strives to manage its Aviation Program toward the highest standards of safety, efficiency, fairness in contracting, preservation of competition in the private sector, open communication, prudent property management, and the best examples of resource management. Toward these ends, the Department has established a management structure led by a Board of Directors comprising active Federal employee aviation managers from the Department. AUTHORITY: The following authorities serve as basis for this structure and system: Office of Management and Budget Circular A-126, FMR 102.33, DEAR 109, DOE Order 440.2B, Aviation Management Review Team Report, March 1999, and Secretary of Energy Appointment and Delegation of Authority, April 15, 1999.

247

High Performance Computing Data Center Metering Protocol  

Broader source: Energy.gov (indexed) [DOE]

High Performance High Performance Computing Data Center Metering Protocol Prepared for: U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Federal Energy Management Program Prepared by: Thomas Wenning Michael MacDonald Oak Ridge National Laboratory September 2010 ii Introduction Data centers in general are continually using more compact and energy intensive central processing units, but the total number and size of data centers continues to increase to meet progressive computing requirements. In addition, efforts are underway to consolidate smaller data centers across the country. This consolidation is resulting in a growth of high-performance computing facilities (i.e. - supercomputers) which consume large amounts of energy to support the numerically intensive

248

Neonatal euthanasia: Lessons from the Groningen Protocol  

Science Journals Connector (OSTI)

Summary Decisions about neonatal end-of-life care have been studied intensely over the last 20 years in The Netherlands. Nationwide surveys were done to quantify these decisions, provide details and monitor the effect of guidelines, new regulations and other interventions. One of those interventions was the Groningen Protocol for newborn euthanasia in severely ill newborns, published in 2005. Before publication, an estimated 20 cases of euthanasia per year were performed. After publication, only two cases in five years were reported. Studies suggested that this might be partly caused by the lack of consensus about the dividing line between euthanasia and palliative care. New recommendations about paralytic medication use in dying newborns were issued to increase transparency and to improve reporting of euthanasia. New surveys will be needed to measure the effects of these interventions. This cycle of interventions and measurements seems useful for continuous improvement of end-of-life care in newborns.

A.A. Eduard Verhagen

2014-01-01T23:59:59.000Z

249

Building America House Simulation Protocols (Revised)  

Broader source: Energy.gov (indexed) [DOE]

House House Simulation Protocols Robert Hendron and Cheryn Engebrecht National Renewable Energy Laboratory Revised October 2010 Prepared by the National Renewable Energy Laboratory For the U.S. Department of Energy Building Technologies Program ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process,

250

Analysis of the Impact of Hello Protocol Parameters over a Wireless Network Self-Organization  

E-Print Network [OSTI]

Analysis of the Impact of Hello Protocol Parameters over a Wireless Network Self of the HELLO protocol. This makes this HELLO protocol very important for wireless networks especially for self- organizing the network. Most of layer-3 protocols assume an ideal MAC layer. In such a case, HELLO protocol

Paris-Sud XI, Université de

251

Adapting a delay-based protocol to heterogeneous environments  

E-Print Network [OSTI]

with different mixes of PERT and SACK protocols. Delay-based protocols, being less aggressive, have problems in fully utilizing a highspeed link while operating alone. We show that a single PERT flow can fully utilize a high-speed, high-delay link. We performed...

Kotla, Kiran

2008-10-10T23:59:59.000Z

252

Design of a PSi header processor for the internet protocol  

E-Print Network [OSTI]

bottleneck is the network transport component, i.e. the network I/O at the end system. To overcome this performance bottleneck, a standard data communication protocol, such as TCP/IP, could be implemented by using hardware to speedup the protocol throughput...

Bai, Jinxia

2012-06-07T23:59:59.000Z

253

Evaluation des performances des protocoles de routage Ad hoc  

E-Print Network [OSTI]

Evaluation des performances des protocoles de routage Ad hoc Abdelali Boushaba1 , Mohammed Oumsis2 quatre protocoles de routage Ad hoc: DSR, AODV, OLSR et DSDV et d'autre part, d'examiner l'impact de la'activité. Mots-clés--Réseaux mobiles Ad hoc; DSR; AODV; DSDV; OLSR; évaluation des performances; simulation, NS-2

Paris-Sud XI, Université de

254

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks Yu Chen Google, UK chenyu in ad hoc networks. In our protocol, each node that has been assigned an address manages a disjoint of node's degree, regardless of the network size. I. INTRODUCTION A wireless mobile ad hoc network

Paris-Sud XI, Université de

255

Energy Aware Implementation of an Ad Hoc Routing Protocol  

E-Print Network [OSTI]

estimates of the potential for energy savings. We show potential savings of fifty six percent in energy functions of an energy aware ad hoc routing protocol are · Energy based link cost with transmit powerEnergy Aware Implementation of an Ad Hoc Routing Protocol by Shweta Bhandare Scriptor B

Brown, Timothy X.

256

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

257

MP-DSM: A Distributed Cross Layer Network Control Protocol  

E-Print Network [OSTI]

MP-DSM: A Distributed Cross Layer Network Control Protocol Daniel C. O'Neill, Yan Li, and Stephen, transmitter powers and delay. The Direct Step Method, DSM, which captures this interaction and con- trols system performance under TCP or other protocols has been described in [1]. DSM finds optimal routes

258

Implementing a Low Power TDMA Protocol Over 802.11  

E-Print Network [OSTI]

, or wind energy to power themselves and their wireless network interface. The availability of low- powerImplementing a Low Power TDMA Protocol Over 802.11 Jim Snow, Wu-chi Feng, Wu-chang Feng (jsnow and implementation of our protocol and its performance compared to standard 802.11 in terms of throughput, power

259

Practical quantum oblivious transfer and bit commitment protocols  

E-Print Network [OSTI]

We propose a practical quantum oblivious transfer and a bit commitment protocols which replace the single-photon source with weak coherent pulses and allow error and loss in channel and detectors. These protocols can be realized with available optoelectronic apparatus.

Ya-Qi Song; Li Yang

2015-02-09T23:59:59.000Z

260

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #  

E-Print Network [OSTI]

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

Kulkarni, Sandeep

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks  

E-Print Network [OSTI]

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

Kulkarni, Sandeep

262

Uniform Leader Election Protocols for Radio Networks Koji Nakano  

E-Print Network [OSTI]

Uniform Leader Election Protocols for Radio Networks #3; Koji Nakano School of Information Science be distinguished by serial or manufacturing number. The leader election problem asks to designate one of the station as leader. A leader election protocol is said to be uniform if in each time slot every station

Nakano, Koji

263

Hello Again: Stabilization of the Hello Protocol in OSPF  

E-Print Network [OSTI]

Hello Again: Stabilization of the Hello Protocol in OSPF Jorge A. Cobb Mohamed G. Gouda Deepinder Sidhu § Abstract The Hello protocol in OSPF allows each router in a network to check whether it can periodi- cally send hello messages to every neighboring router in the network. Associated with the Hello

Cobb, Jorge Arturo

264

MRML: A Communication Protocol for Content-Based Image Retrieval  

Science Journals Connector (OSTI)

In this paper we introduce and describe the Multimedia Retrieval Markup Language (MRML). This XML-based markup language is the basis for an open communication protocol for content-based image retrieval systems (CBIRSs). MRML was initially designed as ... Keywords: communication protocol, evaluation framework, multimedia retrieval, reusable software components

Wolfgang Müller; Henning Müller; Stéphane Marchand-Maillet; Thierry Pun; David Squire; Zoran Pecenovic; Christoph Giess; Arjen P. de Vries

2000-11-01T23:59:59.000Z

265

Protocol, Site Leads - May 2011 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Site Leads - May 2011 Site Leads - May 2011 Protocol, Site Leads - May 2011 May 2011 Protocol for Site Leads The purpose of this protocol is to establish the requirements and responsibilities for the Office of Safety and Emergency Management Evaluations Site Leads. The Site Lead's primary responsibility is to perform independent safety oversight at their assigned site(s). Site Leads are assigned to Department of Energy (DOE) sites with nuclear facilities to maintain operational awareness, establish and implement a prioritized set of oversight activities focused on high hazard nuclear facilities and tailored to site conditions, activities and issues. Protocol, Site Leads - May 2011 More Documents & Publications Appraisal Process Protocols, Independent Oversight - November 2012

266

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Broader source: Energy.gov (indexed) [DOE]

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

267

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Broader source: Energy.gov (indexed) [DOE]

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

268

Protective Force Protocols for ESS Supported Performance Tests and  

Broader source: Energy.gov (indexed) [DOE]

Protective Force Protocols for ESS Supported Performance Tests and Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 This document presents the protocols and ROE to be followed for both limited-scope and large-scale FOF performance tests. It sets forth basic procedures and responsibilities for planning, conducting, and evaluating such tests. The intent is to provide a standard framework to govern the conduct of such tests in connection with Independent Oversight inspections at NNSA and ESE sites and to ensure consistent approaches for all other FOF applications, approaches designed to enable program management to compare results from site to site. Protective Force Protocols for ESS Supported Performance Tests and

269

ANSP Protocols for Analysis of NAWQA Algae Samples Protocol P-13-57 Patrick Center for Environmental Research 117  

E-Print Network [OSTI]

of associated pressure gauges, and monitor the volume of gas left in the tank. Replace cylinders as needed. Any hoods. 3.1.4. Gas suspension tables. 3.1.5. Slide warmers/hot plates. 3.2. Chemistry Laboratory. 3 recommended. Periodically clean oil #12;ANSP Protocols for Analysis of NAWQA Algae Samples Protocol P-13

Charles, Donald

270

Layered Electrical Product Application Protocol (AP). Draft: Initial Graphics Exchange Specification (IGES)  

SciTech Connect (OSTI)

An application protocol is an information systems engineering view of a specific product. The view represents an agreement on the generic activities needed to design and fabricate the product, the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transfering some or all of the information required. This applications protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format. The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

Not Available

1994-09-01T23:59:59.000Z

271

EMS-MAC: Energy Efficient Contention-Based Medium Access Control Protocol for Mobile Sensor Networks  

Science Journals Connector (OSTI)

......Towards a classification of energy aware MAC protocols for...Estrin, D. (2002) An Energy- Efficient MAC Protocol...Proc. INFOCOM'02, New York, USA, June 2327, pp...2003) An Adaptive Energy- Efficient MAC Protocol......

Mahdi Zareei; Alireza Taghizadeh; Rahmat Budiarto; Tat-Chee Wan

2011-11-01T23:59:59.000Z

272

The influence of purification protocol and pH on tomato spotted wilt virions  

E-Print Network [OSTI]

Two purification protocols were tested for their influence on yield of tomato spotted wilt virions. Protocol "A" was developed by Black et al (2), modified by Mohammed et al (34), and described by Gonsalves and Trujillo (16). Protocol "B...

Shimek, Christina Marie

1993-01-01T23:59:59.000Z

273

Protocol for maximizing energy savings and indoor environmental quality  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Protocol for maximizing energy savings and indoor environmental quality Protocol for maximizing energy savings and indoor environmental quality improvements when retrofitting apartments Title Protocol for maximizing energy savings and indoor environmental quality improvements when retrofitting apartments Publication Type Journal Article LBNL Report Number LBNL-6147E Year of Publication 2013 Authors Noris, Federico, William W. Delp, Kimberly Vermeer, Gary Adamkiewicz, Brett C. Singer, and William J. Fisk Journal Energy and Buildings Volume 61 Pagination 378-386 Date Published 06/2013 Keywords apartments, buildings, costs, energy, indoor environmental quality, Protocol, retrofits, Selection Abstract The current focus on building energy retrofit provides an opportunity to simultaneously improve indoor environmental quality (IEQ). Toward this end, we developed a protocol for selecting packages of retrofits that both save energy and improve IEQ in apartments. The protocol specifies the methodology for selecting retrofits from a candidate list while addressing expected energy savings, IEQ impacts, and costs in an integrated manner. Interviews, inspections and measurements are specified to collect the needed input information. The protocol was applied to 17 apartments in three buildings in two different climates within California. Diagnostic measurements and surveys conducted before and after retrofit implementation indicate enhanced apartment performance.

274

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Office of Environmental Management (EM)

727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

275

E-Print Network 3.0 - applicable protocol fails Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

identical protocol is used for different purposes ... Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 2 Protocol Interactions and...

276

E-Print Network 3.0 - aided routing protocol Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for: aided routing protocol Page: << < 1 2 3 4 5 > >> 1 Routing Protocols for Mobile Ad-hoc Networks: Current Development and Evaluation Summary: network. LAR: Location Aided...

277

Nonlinear seismic ground response analysis: code usage protocols and verification against vertical array data  

E-Print Network [OSTI]

Response Analysis: Code Usage Protocols and Verificationparameter selection and code usage protocols as well aslinear modeling. Regarding code usage/parameter selection

Stewart, Jonathan P; Kwok, Annie O.L.

2008-01-01T23:59:59.000Z

278

Protocol, Security Assistance - January 2007 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 January 2007 Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security. The Assistance Program is comprised of technologists and subject matter experts from all the S&S disciplines and technical areas including Program Planning Management and Support, Advanced Security Technologies, Protective Force, Physical Security, Information Protection, Safeguards and Security Construction Projects, Vulnerability Assessments, and Nuclear Materials Control and Accountability. Our commitment is to continue to build an assistance program dedicated to serving the interests of the Department and our customers' S&S programs. Our emphasis remains

279

Open-Protocol Platform for Commercial Building Operations and Energy  

Broader source: Energy.gov (indexed) [DOE]

Open-Protocol Platform for Commercial Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm The U.S. Department of Energy (DOE) is currently conducting research into an open-protocol platform for commercial buildings and an algorithm to manage energy use. Project Description This project seeks to develop a situational analysis algorithm that characterizes the classes and capabilities of existing building automation and energy information systems, as well as the types of commercial buildings that typically use each class of equipment. Project Partners Research is being undertaken by DOE and Navigant Consulting. Project Goals The goal is to use the situational analysis algorithm to determine whether

280

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Refrigerant Guide[1] The Greenhouse Gas Protocol tool for refrigeration is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Climate Focus Area: - Central Plant, Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: CHP Guidance v1.0[1] The Greenhouse Gas Protocol tool for allocation of GHG emissions from a combined heat and power (CHP) plant is a free Excel spreadsheet calculator

282

Nuclear Energy Protocol for Research Isotopes Owen Lowe  

Broader source: Energy.gov (indexed) [DOE]

Protocol for Protocol for Research Isotopes Owen Lowe Office of Isotopes for Medicine and Science Office of Nuclear Energy, Science and Technology April 16, 2002 Isotopes for Life Isotopes for Life Isotopes for Life Office of Nuclear Energy, Science and Technology Lowe/April16_02 NEPRI to NERAC.ppt (2) Nuclear Energy Protocol For Research Isotopes Nuclear Energy Protocol For Research Isotopes Why NEPRI? 6 NEPRI implements DOE funding priorities for fiscal year 2003 6 NEPRI will * Bring order to DOE's responses to requests for research isotopes * Introduce a high-quality peer review to the selection of research isotopes * Enable DOE to concentrate on operating its unique isotope production facilities Isotopes for Life Isotopes for Life Isotopes for Life Office of Nuclear Energy, Science and Technology

283

The Greenhouse Gas Protocol Initiative: Measurement and Estimation of  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: Measurement and Estimation of The Greenhouse Gas Protocol Initiative: Measurement and Estimation of Uncertainty of GHG Emissions Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Measurement and Estimation of Uncertainty of GHG Emissions Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: GHG Uncertainty Guide[1] The Greenhouse Gas Protocol Uncertainty Tool is designed to facilitate a quantitative and qualitative estimation of uncertainty associated with a

284

A design protocol for tailoring ice-templated scaffold structure  

Science Journals Connector (OSTI)

...fact that this relationship is based on fundamental principles of ice templating should...freezing protocol. The robust, and fundamental, link between time at equilibrium and...crystal growth and nucleation. In Handbook of industrial crystallization (ed...

2014-01-01T23:59:59.000Z

285

House Simulation Protocols (Building America Benchmark)- Building America Top Innovation  

Broader source: Energy.gov [DOE]

This Building America Innovations profile describes the DOE-sponsored House Simulation Protocols, which have helped ensure consistent and accurate energy-efficiency assessments for tens of thousands of new and retrofit homes supported by the Building America program.

286

Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol  

SciTech Connect (OSTI)

This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

Osterwald, C. R.

2008-03-01T23:59:59.000Z

287

Minimal computational-space implementation of multiround quantum protocols  

SciTech Connect (OSTI)

A single-party strategy in a multiround quantum protocol can be implemented by sequential networks of quantum operations connected by internal memories. Here, we provide an efficient realization in terms of computational-space resources.

Bisio, Alessandro; D'Ariano, Giacomo Mauro; Perinotti, Paolo; Chiribella, Giulio [QUIT group, Dipartimento di Fisica ''A. Volta'', and INFN Sezione di Pavia, via Bassi 6, IT-27100 Pavia (Italy); Perimeter Institute for Theoretical Physics, 31 Caroline Street North, Waterloo, Ontario N2L 2Y5 (Canada)

2011-02-15T23:59:59.000Z

288

Test Protocol Document, Hydrogen Safety Sensor Testing; Phase...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Test Protocol Document, Hydrogen Safety Sensor Testing Phase I: Non-Flammable Mixtures R. Burgess, C. Blake, and C.E. Tracy Technical Report NRELTP-560-42666 September 2008 NREL...

289

Standard Hydrogen Test Protocols for the NREL Sensor Testing...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Hydrogen Test Protocols for the NREL Sensor Testing Laboratory December 2011 NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency and...

290

Signature schemes and applications to cryptographic protocol design  

E-Print Network [OSTI]

Signature schemes are fundamental cryptographic primitives, useful as a stand-alone application, and as a building block in the design of secure protocols and other cryptographic objects. In this thesis, we study both the ...

Lysyanskaya, Anna

2002-01-01T23:59:59.000Z

291

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard  

E-Print Network [OSTI]

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard Department of Computer Science (AA- MAS 2013), Ito, Jonker, Gini, and Shehory (eds.), May, 6­10, 2013, Saint Paul, Minnesota, USA

292

Comparing wireless flooding protocols using trace-based simulations  

Science Journals Connector (OSTI)

Most wireless multi-hop networks, such as ad hoc...networks and wireless sensor networks, need network-wide broadcasting, which is best done with a flooding protocol. In this article, we use ... test-bed network ...

Martin Jacobsson; Christian Rohner

2013-06-01T23:59:59.000Z

293

User-Friendly Grid Security Architecture and Protocols  

Science Journals Connector (OSTI)

My talk which includes some background information about grid computing, grid security, security infrastructure, and also some of the limitations, our proposal on some security protocols, what are the improvement...

Hoon Wei Lim

2007-01-01T23:59:59.000Z

294

Proposals for Non-PGM Catalyst Target and Test Protocols  

Broader source: Energy.gov (indexed) [DOE]

Fuel Cell Tech Team Proposals for Non-PGM catalyst target and test protocols FCTT (USCAR) Shinichi Hirano (co-chair), Tarek Abdel-Baset, Balsu Lakshmanan, David Masten, Mark...

295

System-Level Modeling and Evaluation of Network Protocols  

E-Print Network [OSTI]

of computation including CSP, FSM, and DE for specifying protocols as well as to enable mixing them with other) [21], finite state machine (FSM) [40] and communicating sequential processes (CSP) [18]. Ptolemy

296

SystemLevel Modeling and Evaluation of Network Protocols  

E-Print Network [OSTI]

of computation including CSP, FSM, and DE for specifying protocols as well as to enable mixing them with other) [21], finite state machine (FSM) [40] and communicating sequential processes (CSP) [18]. Ptolemy

297

Evaluation of Laboratory Conditioning Protocols for Warm-Mix Asphalt  

E-Print Network [OSTI]

used to select a conditioning protocol to simulate pavement stiffness in its early life. The number of Superpave Gyratory Compactor (SGC) gyrations to get 7±0.5% air voids (AV) was the alternative parameter. Extracted binder stiffness and aggregate...

Yin, Fan 1990-

2012-10-26T23:59:59.000Z

298

Application-Layer Communication Protocol for Home Automation.  

E-Print Network [OSTI]

??Chipcon, a Norwegian company that designs, produces and markets high performance and cost-effective radio frequency integrated circuits (RF-ICs), wanted to develop a new communication protocol… (more)

Hadzic, Dinko

2004-01-01T23:59:59.000Z

299

Petri Net Based Research of Home Automation Communication Protocol  

Science Journals Connector (OSTI)

The popularity of home automation has been increasing greatly in recent years. ... distributed, uncertain or randomized protocol model) of home automation, many questions concerned. For instance, is ... net to de...

Guangxuan Chen; Yanhui Du; Panke Qin; Jin Du…

2013-01-01T23:59:59.000Z

300

Verifying Team Formation Protocols with Probabilistic Model Checking  

Science Journals Connector (OSTI)

Multi-agent systems are an increasingly important software paradigm and in many of its applications agents cooperate to achieve a particular goal. This requires the design of efficient collaboration protocols,...

Taolue Chen; Marta Kwiatkowska; David Parker…

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Verifying team formation protocols with probabilistic model checking  

Science Journals Connector (OSTI)

Multi-agent systems are an increasingly important software paradigm and in many of its applications agents cooperate to achieve a particular goal. This requires the design of efficient collaboration protocols, a typical example of which is team formation. ...

Taolue Chen; Marta Kwiatkowska; David Parker; Aistis Simaitis

2011-07-01T23:59:59.000Z

302

New cryptographic protocols With side-channel attack security  

E-Print Network [OSTI]

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

303

Dynamic address allocation protocols for Mobile ad hoc networks  

E-Print Network [OSTI]

Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

Patchipulusu, Praveena

2001-01-01T23:59:59.000Z

304

Wind – Solar Hybrid Systems in Tunisia: An Optimization Protocol  

Science Journals Connector (OSTI)

In this work, potentials, state-of-the-art and development of hybrid wind-solar plants in the eastern-North Africa zone ... adopted: the protocol exploits data -such as solar radiation and cumulative mean wind sp...

Karemt Boubaker; Andrea Colantoni…

2013-01-01T23:59:59.000Z

305

Modelling energy efficiency of OR protocols in wireless networks  

Science Journals Connector (OSTI)

Although opportunistic routing (OR) for ad hoc networks have been shown to improve network throughput, energy audit of these protocols have not been done. In this paper, an analytical model to characterise the energy consumption of OR protocols is presented. Total energy consumption is computed taking into account the energy consumed in exchanging control packets, data packet transmission including retransmission and reception. The model considers packet retransmissions that can occur due to network conditions and protocol inaccuracies. The proposed analytical model is used to compute the energy consumption of some well known OR protocols available in literature. The result of the mathematical model is compared with simulation results. The theoretical and experimental results are found to be in conformance.

Arka Prokash Mazumdar; Anandghan Waghmare; Ashok Singh Sairam

2014-01-01T23:59:59.000Z

306

Multicenter Comparison of Two Norovirus ORF2-Based Genotyping Protocols  

Science Journals Connector (OSTI)

...conclusions of this study. Several electronic surveillance systems for NoV outbreaks...genotyping protocols for NoV are fundamental for accurate genotyping as well...outbreak and sequence data through electronic norovirus surveillance networks...

Kirsten Mattison; Elsie Grudeski; Brian Auk; Hugues Charest; Steven J. Drews; Angela Fritzinger; Nicole Gregoricus; Stephen Hayward; Alain Houde; Bonita E. Lee; Xiaoli L. Pang; Julie Wong; Tim F. Booth; Jan Vinjé

2009-10-21T23:59:59.000Z

307

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity Jump to: navigation, search Tool Summary Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Electricity Heat, and Steam Purchase Guidance v1.2[1] The Greenhouse Gas Protocol tool for purchased electricity is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

308

Mechanical memory  

DOE Patents [OSTI]

A first-in-first-out (FIFO) microelectromechanical memory apparatus (also termed a mechanical memory) is disclosed. The mechanical memory utilizes a plurality of memory cells, with each memory cell having a beam which can be bowed in either of two directions of curvature to indicate two different logic states for that memory cell. The memory cells can be arranged around a wheel which operates as a clocking actuator to serially shift data from one memory cell to the next. The mechanical memory can be formed using conventional surface micromachining, and can be formed as either a nonvolatile memory or as a volatile memory.

Gilkey, Jeffrey C. (Albuquerque, NM); Duesterhaus, Michelle A. (Albuquerque, NM); Peter, Frank J. (Albuquerque, NM); Renn, Rosemarie A. (Albuquerque, NM); Baker, Michael S. (Albuquerque, NM)

2006-05-16T23:59:59.000Z

309

Mechanical memory  

DOE Patents [OSTI]

A first-in-first-out (FIFO) microelectromechanical memory apparatus (also termed a mechanical memory) is disclosed. The mechanical memory utilizes a plurality of memory cells, with each memory cell having a beam which can be bowed in either of two directions of curvature to indicate two different logic states for that memory cell. The memory cells can be arranged around a wheel which operates as a clocking actuator to serially shift data from one memory cell to the next. The mechanical memory can be formed using conventional surface micromachining, and can be formed as either a nonvolatile memory or as a volatile memory.

Gilkey, Jeffrey C. (Albuquerque, NM); Duesterhaus, Michelle A. (Albuquerque, NM); Peter, Frank J. (Albuquerque, NM); Renn, Rosemarie A. (Alburquerque, NM); Baker, Michael S. (Albuquerque, NM)

2006-08-15T23:59:59.000Z

310

New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless  

E-Print Network [OSTI]

New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

Jain, Raj

311

Comparison of two wireless ad hoc routing protocols on a hardware test-bed  

E-Print Network [OSTI]

. These protocols are tested predominately using software simulation. Very few implementations have demonstratedComparison of two wireless ad hoc routing protocols on a hardware test-bed Shweta Bhandare (DSR) protocol and our Energy Aware Dynamic Source Routing protocol (EADSR). The implementation

Brown, Timothy X.

312

An Efficient Query Tree Protocol for RFID Tag Anti-Collision  

E-Print Network [OSTI]

An Efficient Query Tree Protocol for RFID Tag Anti-Collision Ming-Kuei Yeh National Taipei Query Tree (EQT) protocol to improve both the Query Tree (QT) protocol and the Collision Tree (CT and the energy consumption is lessened. In the EQT protocol, the timeslots structure, the query and responses

Jiang, Jehn-Ruey

313

Modelling Ad hoc On-demand Distance Vector (AODV) Protocol with Timed Automata  

E-Print Network [OSTI]

protocols using Ad hoc On-demand Distance Vector AODV [DPR02] as our test protocol. AODV is one of mobile adModelling Ad hoc On-demand Distance Vector (AODV) Protocol with Timed Automata Sibusisiwe Chiyangwa On-demand Distance Vector protocol (AODV). Keywords: automatic veri#12;cation, model checking, real

Oxford, University of

314

Principles of Climate Policy after 2012  

Science Journals Connector (OSTI)

The UN conference on climate change in Montreal ended with an agreement to negotiate the extension of the Kyoto Protocol beyond 2012 and the launch of “open and non-binding” talks with non-Kyoto ...

2006-03-01T23:59:59.000Z

315

A Simplified Hierarchical Dynamic Quantum Secret Sharing Protocol with Added Features  

E-Print Network [OSTI]

Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.

Sandeep Mishra; Chitra Shukla; Anirban Pathak; R. Srikanth; Anu Venugopalan

2014-09-06T23:59:59.000Z

316

authors here 1 Computational Mechanism Design page 4  

E-Print Network [OSTI]

to implement good system-wide solutions to prob- lems that involve multiple self-interested agents, each optimization problems [dVV03, CSS06]. MD is becoming increasingly rele- vant in distributed systems for commerce, computation, and information. Mechanisms are protocols for decision making in multi-agent systems

Gordon, Geoffrey J.

317

A low-latency resilient protocol for e-business transactions  

Science Journals Connector (OSTI)

This paper proposes a novel protocol for e-business transaction management, called the low latency resilient (LLR) protocol. LLR applies new correctness criteria based upon enforcing semantic atomicity with increased resilience to failure, ... Keywords: CCS, SACReD transactions, calculus of communicating systems, e-business, electronic business, evaluation of commit protocols, formal specification, latency of transaction commit protocols, low latency resilient protocol, performance, resiliency, resource blocking, transaction management

Muhammad Younas; Barry Eaglestone; Kuo-Ming Chao

2004-09-01T23:59:59.000Z

318

Computational mechanics  

SciTech Connect (OSTI)

The Computational Mechanics thrust area sponsors research into the underlying solid, structural and fluid mechanics and heat transfer necessary for the development of state-of-the-art general purpose computational software. The scale of computational capability spans office workstations, departmental computer servers, and Cray-class supercomputers. The DYNA, NIKE, and TOPAZ codes have achieved world fame through our broad collaborators program, in addition to their strong support of on-going Lawrence Livermore National Laboratory (LLNL) programs. Several technology transfer initiatives have been based on these established codes, teaming LLNL analysts and researchers with counterparts in industry, extending code capability to specific industrial interests of casting, metalforming, and automobile crash dynamics. The next-generation solid/structural mechanics code, ParaDyn, is targeted toward massively parallel computers, which will extend performance from gigaflop to teraflop power. Our work for FY-92 is described in the following eight articles: (1) Solution Strategies: New Approaches for Strongly Nonlinear Quasistatic Problems Using DYNA3D; (2) Enhanced Enforcement of Mechanical Contact: The Method of Augmented Lagrangians; (3) ParaDyn: New Generation Solid/Structural Mechanics Codes for Massively Parallel Processors; (4) Composite Damage Modeling; (5) HYDRA: A Parallel/Vector Flow Solver for Three-Dimensional, Transient, Incompressible Viscous How; (6) Development and Testing of the TRIM3D Radiation Heat Transfer Code; (7) A Methodology for Calculating the Seismic Response of Critical Structures; and (8) Reinforced Concrete Damage Modeling.

Goudreau, G.L.

1993-03-01T23:59:59.000Z

319

The quantum bit commitment: a complete classification of protocols  

E-Print Network [OSTI]

This paper addresses the controversy between Mayers, Lo and Chau on one side, and Yuen on the opposite side, on whether there exist or not unconditionally secure protocols. For such purpose, a complete classification of all possible bit commitment protocols is given, including all possible cheating attacks. For the simplest class of protocols (non-aborting and with complete and perfect verification), it is shown how naturally a game-theoretical situation arises. For these protocols, bounds for the cheating probabilities are derived, which turn out to be different from those given in the impossibility proof. The whole classification and analysis has been carried out using a "finite open system" approach. The discrepancy with the impossibility proof is explained on the basis of the implicit adoption of a "closed system approach"--equivalent to modeling the commitment as performed by two fixed machines interacting unitarily in a overall "closed system". However, it is shown that the closed system approach for the classification of commitment protocols unavoidably leads to infinite dimensions, which then invalidate the continuity argument at the basis of the impossibility proof.

Giacomo Mauro D'Ariano

2002-09-26T23:59:59.000Z

320

Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols  

SciTech Connect (OSTI)

Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

2013-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

RadNet: Open network protocol for radiation data  

SciTech Connect (OSTI)

Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet`s flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems.

Rees, B.; Olson, K. [Los Alamos National Lab., NM (United States); Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W. [Aquila Technologies Group, Inc., Albuquerque, NM (United States); Koskelo, M. [Canberra Industries, Meriden, CT (United States)

1998-12-31T23:59:59.000Z

322

An Adaptive Mechanism For Pre-recorded Multimedia Streaming  

E-Print Network [OSTI]

Protocol (CIP) CIP [3] is an application level protocol with two components that work in conjunction

323

Mechanical Vibration  

Science Journals Connector (OSTI)

... THE suppression and control of mechanical vibration have assumed great importance in engineering. One consequence of this is that the number ... degree of emphasis is placed on transient oscillation (in addition to steady-State and free vibration). The treatment of this topic is based mainly on phase-plane constructions and it ...

R. E. D. BISHOP

1958-12-06T23:59:59.000Z

324

Greenhouse Gas Regional Inventory Protocol (GRIP) Website | Open Energy  

Open Energy Info (EERE)

Greenhouse Gas Regional Inventory Protocol (GRIP) Website Greenhouse Gas Regional Inventory Protocol (GRIP) Website Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Greenhouse Gas Regional Inventory Protocol (GRIP) Website Focus Area: Other Crosscutting Topics: Potentials & Scenarios Website: www.getagriponemissions.com/index-cycle.html Equivalent URI: cleanenergysolutions.org/content/greenhouse-gas-regional-inventory-pro Language: English Policies: Deployment Programs DeploymentPrograms: "Lead by Example" is not in the list of possible values (Audit Programs, Demonstration & Implementation, Green Power/Voluntary RE Purchase, High Performance Buildings, Industry Codes & Standards, Project Development, Public Tenders, Procurement, & Lead Examples, Public-Private Partnerships, Retrofits, Ride Share, Bike Share, etc., Technical Assistance, Training & Education, Voluntary Appliance & Equipment Labeling, Voluntary Industry Agreements) for this property.

325

Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 |  

Broader source: Energy.gov (indexed) [DOE]

High Hazard Nuclear Facility Project Oversight - November High Hazard Nuclear Facility Project Oversight - November 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 November 2012 Protocol for High Hazard Nuclear Facility Project Oversight The purpose of this protocol is to establish the requirements and responsibilities for managing and conducting Office of Health, Safety and Security (HSS) independent oversight of high-hazard nuclear facility projects. As part of the Department of Energy's (DOE) self regulatory framework for safety and security, DOE Order 227.1, Independent Oversight Program, assigns HSS the responsibility for implementing an independent oversight program. It also requires the HSS Office of Enforcement and Oversight to conduct independent evaluations of safety and security. This

326

Transportation Protocols Working Group First Conference Call March 1, 1999  

Broader source: Energy.gov (indexed) [DOE]

Protocols Working Group First Conference Call March 1, 1999 Protocols Working Group First Conference Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TEC/WG) DOE Transportation Protocols Working Group was held at 3:00 p.m. Eastern time on Monday March 1, 1999. The session was led by Mona Williams, DOE/NTP-Albuquerque. Other participants included Bill Lemeshewsky, DOE/RW; Ellen Ott, DOE/GC; Elizabeth Helvey, JK Research Associates; Chris Wells, SSEB; Lisa Sattler, CSG-MW, Elissa Turner, DOE/RW; Chris Wentz, New Mexico; Carl Guidice, DOE/EM; Jim Cruickshank, DOE/EM, Elmer Naples, DOE/NR; Fred Butterfield, DOE/EM; and Alex Thrower, UETC. Ms. Williams first indicated that notes from the Jacksonville meeting had been prepared and circulated for comment. She asked if there were

327

Protocol, Required Reading - June 2012 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Required Reading - June 2012 Required Reading - June 2012 Protocol, Required Reading - June 2012 June 2012 Protocol for Required Reading The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing the Office of Safety and Emergency Management Evaluations (HS-45) required reading program. The required reading program provides a methodology to ensure that the HS-45 staff members are informed and up-to-date with Department of Energy (DOE), the Office of Health, Safety and Security (HSS), and office-specific requirements, processes, and guidance as well as to support continuous improvement. The required reading program will also be used to supplement staff training. This required reading program is based on DOE 0 422.1 Conduct of Operations Attachment 2, Appendix A and DOE-STD-1033-92 Guide to

328

Protocol, Development and Maintenance of Criteria and Review Approach  

Broader source: Energy.gov (indexed) [DOE]

Development and Maintenance of Criteria and Review Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents The purpose of this protocol is to establish the requirements and responsibilities for the development and maintenance of Criteria and Review Approach Documents (CRADs) used by the Office of Safety and Emergency Management Evaluations (HS-45). The HS-45 CRADS are carefully selected, modified (if required), and referenced in HS-45 appraisal plans. These plans are used to provide an outline of the activities planned to assess the effectiveness of safety and emergency management processes and

329

Routing Protocols for Cognitive Radio Networks: A Survey  

E-Print Network [OSTI]

with the cognitive radio (CR) technology, a wireless system can exploit opportunistically the radio spectrum licensed to other systems. Thus, CR is regarded as a solution to the problems resulting from the limited available spectrum and the inefficiency in the spectrum usage. The multi-hop CR networks need some novel routing algorithms taking the open spectrum phenomenon into account. The main approach in designing the routing algorithm for the CR networks is the joint design of routing and spectrum management. Works on such issues have just started and are still in a rudimentary stage. In this paper, we survey comprehensively the existing research on the routing protocols for CR networks, especially with reference to CR ad hoc networks. We classify the routing protocols, discuss the essential features of the different protocols, and provide the future research directions.

Kamruzzaman, S M

2010-01-01T23:59:59.000Z

330

Protocol, Test Inspectors Guide - March 2008 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Test Inspectors Guide - March 2008 Test Inspectors Guide - March 2008 Protocol, Test Inspectors Guide - March 2008 March 2008 Emergency Management Limited Scope Performance Test Inspectors Guide Emergency Management Limited Scope Performance Tests Inspectors Guide provides detailed information and tools to assist inspectors assigned to evaluate the capabilities and performance of emergency responders in DOE/NNSA. Although this guide is designed specifically for the HS-63 inspector, it is made available to the field and may be useful to field element and facility contractor personnel who conduct surveys or self-assessments of emergency management programs. Protocol, Test Inspectors Guide - March 2008 More Documents & Publications Protocol, Appraisal Process Guide - April 2008 Independent Oversight Review, Los Alamos National Laboratory - April 2012

331

Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security  

Science Journals Connector (OSTI)

Security is a vital part of an integrated grid application in which heterogeneous services and resources ... dynamically. Authentication and authorization are the major security concerns in grid environment. Most...

V. Ruckmani; G. Sudha Sadasivam

2010-01-01T23:59:59.000Z

332

DOE Transportation Protocols Topic Group Jacksonville, Florida January 20,  

Broader source: Energy.gov (indexed) [DOE]

Jacksonville, Florida January 20, Jacksonville, Florida January 20, 1999 Meeting Notes and Action Items: The first meeting of the Transportation External Coordination Working Group (TEC/WG) Department of Energy (DOE) Transportation Protocols Topic Group was held at the Radisson Riverwalk Hotel in Jacksonville, FL on January 20, 1999. Mona Williams, Director of DOE's National Transportation Program, Albuquerque Office, welcomed the participants and asked them to introduce themselves (a list of participants with affiliations and addresses is attached). Following the roundtable introductions, Ms. Williams briefly stated the meeting's purpose, which was to discuss the process of protocols development and how review and input from TEC/WG participants could enhance

333

The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or  

Open Energy Info (EERE)

Transport or Transport or Mobil Sources Jump to: navigation, search Tool Summary Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Transportation, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free The Greenhouse Gas Protocol tool for mobile combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically from mobile combustion sources, including vehicles under the direct control

334

Protocol, Inspection Criteria - April 23, 2008 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Inspection Criteria - April 23, 2008 Inspection Criteria - April 23, 2008 Protocol, Inspection Criteria - April 23, 2008 April 23, 2008 Inspection Criteria, Activities, and Lines of Inquiry, April 23, 2008 Emergency planning includes the identification of hazards and threats. A hazards survey is the qualitative portion of the hazards identification process. It briefly describes the potential impacts of emergency events or conditions and summarizes the planning and preparedness requirements that apply. If determined to be required, an EPHA includes the identification and characterization of hazardous materials specific to a facility/site, analyses of potential accidents or events, and evaluation of potential consequences. Protocol, Inspection Criteria - April 23, 2008 More Documents & Publications

335

DOE Transportation Protocols Topic Group Conference Call Summary May 13,  

Broader source: Energy.gov (indexed) [DOE]

Conference Call Summary May 13, Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TEC/WG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the status of U.S. Department of Energy (DOE) transportation protocols currently under development, and related issues. Participants on the call included: Mona Williams, DOE National Transportation Program-Albuquerque; Ken Niles, Oregon representative, Western Interstate Energy Board; Phillip Paull, Council of State Governments-Northeastern Conference; Ron Ross, Western Governors' Association; Lisa Sattler, Council of State Governments-Midwestern Office; Alex Thrower, Urban Energy & Transportation Corporation (UETC); and Elissa Turner, DOE-Office of Civilian Radioactive Waste Management.

336

A Hybrid Long-Distance Entanglement Distribution Protocol  

E-Print Network [OSTI]

We propose a hybrid (continuous-discrete variable) quantum repeater protocol for distribution of entanglement over long distances. Starting from entangled states created by means of single-photon detection, we show how entangled coherent state superpositions, also known as `Schr\\"odinger cat states', can be generated by means of homodyne detection of light. We show that near-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements.

Jonatan B. Brask; Ioannes Rigas; Eugene S. Polzik; Ulrik L. Andersen; Anders S. Sorensen

2010-04-01T23:59:59.000Z

337

A Fast Delivery Protocol for Total Order Broadcasting  

SciTech Connect (OSTI)

The conclusions of this report are: (1) Fast delivery protocol reduces the latency of message ordering for idle systems and keep comparable performances with communication history algorithms for busy systems; (2) The protocol optimizes the total ordering process by waiting for messages only from a subset of the machines in the group; and (3) The fast acknowledgment aggressively acknowledges total order messages to reduce the latency for idle system, and it is smart enough to hold the acknowledgments when the network communication is heavy.

Ou, Li [Tennessee Technological University; He, X. [Tennessee Technological University; Engelmann, Christian [ORNL; Scott, Stephen L [ORNL

2007-01-01T23:59:59.000Z

338

The Groningen Protocol — Euthanasia in Severely Ill Newborns  

Science Journals Connector (OSTI)

...prosecutors. To provide all the information needed for assessment and to prevent interrogations by police officers, we developed a protocol, known as the Groningen protocol, for cases in which a decision is made to actively end the life of a newborn. During the past few months, the international press has been... Drs. Eduard Verhagen and Pieter Sauer state that of the 200,000 children born in the Netherlands every year, about 1000 die during the first year of life. For 600 of these infants, death is preceded by a medical decision regarding the end of life. The ...

Verhagen E.; Sauer P.J.J.

2005-03-10T23:59:59.000Z

339

Distributed Algorithmic Mechanism Design for Scheduling on Unrelated Thomas E. Carroll  

E-Print Network [OSTI]

on unrelated machines. This mechanism, called Distributed MinWork (DMW) is a distributed implementation of the MinWork mechanism proposed by Nisan and Ronen [12]. DMW is resilient to agents deviating from the protocol since the cheaters are detected and eliminated from further participation. We show that DMW

Grosu, Daniel

340

A model of multimedia components interconnection with support to communication mechanisms dynamic selection and reconfiguration  

Science Journals Connector (OSTI)

Distributed multimedia systems must provide support for interaction between its components, and this can be done by using different strategies and mechanisms of communication. A possible way to define efficient communication mechanisms is to consider ... Keywords: adaptation, communication, components, distributed multimedia systems, protocol of communication

Felipe A. P. Pinto; Adilson Barboza Lopes; André G. P. Silva; Daniel Cunha da Silva

2009-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Microsoft Word - Protocol for HSS Site Leads.docx  

Broader source: Energy.gov (indexed) [DOE]

Safety and Safety and Emergency Management Evaluations Protocol for Site Leads May 2011 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose .....................................................................................................................1 2.0 Applicability ............................................................................................................1 3.0 Requirements ...........................................................................................................1 4.0 Responsibilities ........................................................................................................2 5.0 References ................................................................................................................4

342

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

343

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

344

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

345

The WICKPro protocol with the Packet Delivery Ratio metric  

Science Journals Connector (OSTI)

Wireless mesh networks (WMNs) with chain topologies are very useful in road and railroad transportation or in tunnel and mine applications. The proposed protocols for WMNs usually support best-effort traffic or some kind of Quality of Service (QoS). ... Keywords: 802.11, Cyclic executive, Hard real-time, Token-passing, Wireless mesh networks

Jesús Aísa; José Luis Villarroel

2011-11-01T23:59:59.000Z

346

WSN-inspired Sleep Protocols for Heterogeneous LTE Networks  

E-Print Network [OSTI]

architecture becomes heterogenous, in particular 4G networks where LTE micro eNodeBs are deployed to strengthen algorithm to dynamically switch off and on the micro eNodeBs of an LTE heterogeneous network followingWSN-inspired Sleep Protocols for Heterogeneous LTE Networks Iulia Tunaru CEA CEA-Leti, Minatec

Paris-Sud XI, Université de

347

On Runtime Adaptation of Application-Layer Multicast Protocol  

E-Print Network [OSTI]

¨ubsch, Christoph P. Mayer, and Oliver P. Waldhorst Institute of Telematics, Karlsruhe Institute of Technology (KIT), Germany {huebsch,mayer,waldhorst}@kit.edu Reasonable choice of protocol parameters is crucial., a clean implementation of multicast communication within the Internet architecture has been proposed

Paris-Sud XI, Université de

348

GUV formation protocol: -Ethanol, DI water and Kimwipes for cleaning  

E-Print Network [OSTI]

GUV formation protocol: Materials: - Ethanol, DI water and Kimwipes for cleaning - 5-10 µl glass with ethanol and DI water using Kimwipes alternating the solvents at least twice to make sure any grease-ring using a Kimwipe and ethanol. Use Que-tip or grease slide to apply a thin layer of vacuum grease to one

Movileanu, Liviu

349

Addendum to the Building America House Simulation Protocols  

Broader source: Energy.gov [DOE]

The House Simulation Protocols (HSP) provide guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

350

A Hierarchical Checkpointing Protocol for Parallel Applications in Cluster Federations  

E-Print Network [OSTI]

A Hierarchical Checkpointing Protocol for Parallel Applications in Cluster Federations S federation. As a cluster federation comprises of a large number of nodes, there is a high probability fits to the characteristics of a cluster federation (large number of nodes, high latency and low

Paris-Sud XI, Université de

351

CARD-FISH and Microautoradiography Protocol for Bacteria and Archaea  

E-Print Network [OSTI]

1 CARD-FISH and Microautoradiography Protocol for Bacteria and Archaea by Gerhard Herndl Lab @ www FISH Hybridization www.microbial-oceanography.eu 2007 2 Sample Fixation 1. Fix samples in Ethanol 95% 7. Dry and mount in DAPI mix #12;CARD FISH Buffers and Chemicals www

Herndl, Gerhard

352

Reduction-based Security Analysis of Internet Routing Protocols  

E-Print Network [OSTI]

Reduction-based Security Analysis of Internet Routing Protocols Chen Chen, Limin Jia, Boon Thau Loo. These properties require routes announced by honest nodes in the network not to be tampered with by the adversary proofs with automated analysis. We define several reduction steps to reduce proving route authenticity

Pennsylvania, University of

353

Reliable and Energy-Efficient Routing Protocol in Dense  

E-Print Network [OSTI]

Reliable and Energy-Efficient Routing Protocol in Dense Wireless Sensor Networks Min Chen, Taekyoung Kwon, Shiwen Mao, + Yong Yuan, Victor C.M. Leung* Department of Electrical and Computer@snu.ac.kr Department of Electrical and Computer Engineering Auburn University, 200 Broun Hall, Auburn, AL 36849

Chen, Min

354

Localized radio frequency communication using asynchronous transfer mode protocol  

DOE Patents [OSTI]

A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

Witzke, Edward L. (Edgewood, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM)

2007-08-14T23:59:59.000Z

355

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks Yongjun Dai, Changhee Joo prevalent, TCP performance over mobile ad hoc networks attracts more attention. The earlier studies on TCP in wireless networks have shown that it performs poorly in ad hoc networks. They tackled the problem

Bahk, Saewoong

356

Rice University Distributed Protocols for Signal-Scale Cooperation  

E-Print Network [OSTI]

devices to alter their cooperative behavior based on measured changes to their own energy efficiency energy efficiency can be addressed by a self-aware device monitoring its own performance, inter- device Science Houston, Texas May 2012 #12;Abstract Distributed Protocols for Signal-Scale Cooperation

357

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony executed corresponding other actions (e.g., a payment gateway approves a charge to customer C's account

Stoller, Scott

358

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony- ously executed corresponding other actions (e.g., a payment gateway approves a charge to customer C

Stoller, Scott

359

Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas  

E-Print Network [OSTI]

Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas Abdel Ilah Alshbatat and Liang Dong, Senior Member, IEEE Abstract-- Unmanned aerial vehicle (UAV) has been used inspection and range extension. Moreover, UAVs are suited for situations that are too dangerous for direct

Dong, Liang

360

Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol  

SciTech Connect (OSTI)

The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

Romberger, J.

2014-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

362

Probing and Fault Injection of Dependable Distributed Protocols  

Science Journals Connector (OSTI)

......network proto- cols, or device layer protocols. As shown in...such that each layer, from the device-level to the application-level...inserted on top of link-level device drivers and below the listening applications. Another closely......

Scott Dawson; Farnam Jahanian

1995-01-01T23:59:59.000Z

363

A survey on secure multipath routing protocols in WSNs  

Science Journals Connector (OSTI)

Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN and classifying them based on ... Keywords: Multipath routing, Secure multipath routing, Security, Wireless sensor networks

Eliana Stavrou; Andreas Pitsillides

2010-09-01T23:59:59.000Z

364

STOCKER FLY BRAIN IMMUNOFLUORESCENCE PROTOCOL January 8, 2001  

E-Print Network [OSTI]

1 STOCKER FLY BRAIN IMMUNOFLUORESCENCE PROTOCOL January 8, 2001 Vosshall Lab 1. Anesthetize flies the brain, starting with the removal of the proboscis. Gently peel away the cuticle at the back of the fly the esophagus (hole in brain). Once all the cuticle has been removed, gently remove the fat body and trachea

365

ITB: intrusion-tolerant broadcast protocol in wireless sensor networks  

Science Journals Connector (OSTI)

A large-scale wireless sensor network relies on broadcast protocol for data communication. This paper presents an idea for a base station to reliably and securely broadcast announcing messages to the network in an intrusion-tolerant way. Our Intrusion-Tolerant ...

Jin Wook Lee; Yann-Hang Lee

2006-09-01T23:59:59.000Z

366

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

367

How to Use Bitcoin to Design Fair Protocols Iddo Bentov  

E-Print Network [OSTI]

How to Use Bitcoin to Design Fair Protocols Iddo Bentov idddo@cs.technion.ac.il Ranjit Kumaresan then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-or-refund"), that formalizes and abstracts the exact properties we require from the Bitcoin network to achieve our goals

368

RPL Routing Protocol a Case Study: Precision Agriculture  

E-Print Network [OSTI]

released, this protocol algorithms and its four application scenario, such as home automation, industrial.g., industrial, urban, home and buildings automation or smart grid [3]. ROLL's charter ensures that the designed control, urban environment and building automation, have been nearly grounded. However, it is still very

Paris-Sud XI, Université de

369

A Self-Healing Load Balancing Protocol and Implementation  

E-Print Network [OSTI]

in the opposite direction exhibits a rate of r2 = c2x2. It can be shown that the overall reaction system spanned Comparison In order to illustrate the principle of the two protocols, we carried out OMNeT++ [2] simulations this unbounded growth, we apply a "non-selective dilution flow" to the reactor which randomly destroys a molecule

Vetter, Thomas

370

Superior Energy Performance Measurement and Verification Protocol for Industry  

Broader source: Energy.gov [DOE]

This Measurement and Verification Protocol for Industry defines the procedures that will be used to confirm conformance with the energy performance level requirements of the Superior Energy Performance Program. The Program has two paths. This document is structured to reflect those different paths.

371

A comparison of the Internet multicast routing protocols  

Science Journals Connector (OSTI)

The exploding Internet has brought many novel network applications. These include teleconferencing, interactive games, the voice/video phone, real-time multimedia playing, distributed computing, web casting, and so on. One of the specific characteristics ... Keywords: Datagrams, Delivery tree, Multicasting routing protocols

Jhyda Lin; Ruay-Shiung Chang

1999-01-01T23:59:59.000Z

372

An adaptive protocol for distributed beamforming Stephan Sigg1  

E-Print Network [OSTI]

settings and propose a protocol that utilises organic computing principles to find optimum parameters is the approach to combine transmission signals from distinct transmit antennas simultaneously in order to create transmission [7, 8, 2]. Several open-loop and closed-loop carrier synchronisation approaches have been proposed

Beigl, Michael

373

US - Voice Over Internet Protocol Phone Service Providers Market Analysis  

E-Print Network [OSTI]

This report explains the overview of Voice over internet protocol (VoIP) and the challenges the VoIP Phone Service providers face to become market leaders. The report provides an overview of new services offering, both residential and business...

Srinivasan, Vijaybabu

2006-05-19T23:59:59.000Z

374

Safeguards Agreement and Protocol with the International Atomic Energy Agency  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

2004-01-07T23:59:59.000Z

375

Stabilization of Flood Sequencing Protocols in Sensor Networks  

E-Print Network [OSTI]

Stabilization of Flood Sequencing Protocols in Sensor Networks Young-ri Choi, Chin-Tser Huang, Member, IEEE, and Mohamed G. Gouda, Member, IEEE Abstract--Flood is a communication primitive that can. When a sensor receives a flood message, the sensor needs to check whether it has received this message

Gouda, Mohamed G.

376

Stabilization of Flood Sequencing Protocols in Sensor Networks  

E-Print Network [OSTI]

Stabilization of Flood Sequencing Protocols in Sensor Networks Young-ri Choi and Mohamed G. Gouda 78712-0233, U.S.A. {yrchoi, gouda}@cs.utexas.edu Abstract. Flood is a communication primitive that can. When a sensor receives a flood message, the sensor needs to check whether it has received the message

Gouda, Mohamed G.

377

An Energy-Aware Simulation Model and Transaction Protocol  

E-Print Network [OSTI]

1 An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution of Southern California Oct. 15, 2003 Outline ! Introduction ! MANET Simulation Model ! Energy-aware Network of analytical approaches ! We presents a simulation model to evaluating power management policies for a MANET

Pedram, Massoud

378

Hack-proof synchronization protocol for multi-player online games  

Science Journals Connector (OSTI)

Synchronization protocols based on “dead-reckoning” are vulnerable to a popular type of cheat called speed-hack. A speed-hack helps a cheater to gain unfair advantages ... dead-reckoning protocol that is invulner...

Yeung Siu Fung; John C. S. Lui

2009-01-01T23:59:59.000Z

379

An enhanced algorithm for protocol conformance test sequence generation based on the UIO method  

E-Print Network [OSTI]

An Enhanced Algorithm for Protocol Conformance Test Sequence Generation Based on the UIO Method. (December 1993) Ravindra Allada, B.E., Osmania University, Hyderabad, India Chair of Advisory Committee: Dr. Hosame Abu-Amara A computer protocol is a...

Allada, Ravindra

2012-06-07T23:59:59.000Z

380

An object-oriented implementation of a Low Level Reader Protocol (LLRP) library  

E-Print Network [OSTI]

This Master of Engineering Thesis describes the design and implementation of an object-oriented Low Level Reader Protocol (LLRP) library. LLRP is a recently released protocol which standardizes the formats and methods of ...

Constantinou, Fivos

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

DSM-PM2: A Portable Implementation Platform for Multithreaded DSM Consistency Protocols  

Science Journals Connector (OSTI)

DSM-PM2 is a platform for designing, implementing and experimenting with multithreaded DSM consistency protocols. It provides a generic toolbox ... alternative protocols for a given consistency model. DSM-PM2 is ...

Gabriel Antoniu; Luc Bougé

2001-01-01T23:59:59.000Z

382

Performance analysis of distributed time division multiple access protocols in mobile ad hoc environments  

E-Print Network [OSTI]

Tactical wireless mobile ad hoc networks rely upon distributed medium access control (MAC) protocols for coordination and assignment of channel resources among dispersed and mobile users. One such protocol is the distributed ...

Dastangoo, Siamak

383

A Resource assessment protocol for GEO-ELEC | Open Energy Information  

Open Energy Info (EERE)

protocol for GEO-ELEC Jump to: navigation, search OpenEI Reference LibraryAdd to library Report: A Resource assessment protocol for GEO-ELEC Authors Jan-Diederik van Wees, Thijs...

384

Multicast Protocols for Scalable On-Demand Download Niklas Carlsson Derek L. Eager  

E-Print Network [OSTI]

not model packet loss recovery, although our analyses and protocols are compatible with erasure coded data bandwidth and maximum client delay for this batching with constant batch delay (bcd) protocol, as follows

Vernon, Mary K.

385

On Predictable Operating System Protocol Processing Clifford W. Mercer, Jim Zelenka, and Ragunathan Rajkumar  

E-Print Network [OSTI]

On Predictable Operating System Protocol Processing Clifford W. Mercer, Jim Zelenka, and Ragunathan, protocol processing, resource reservation, operating systems, predictability, reservation, admission that incorporate digital audio and video require predictable response from the operating system and the network

386

Ad-hoc and Hybrid Networks Performance Comparison of MANET Routing Protocols in Ad-hoc  

E-Print Network [OSTI]

Sequenced Distance Vector Protocol . . . . . . . . . . . . . . . . . . . . 9 2.2.1 Routing Table Management-hoc On Demand Distance Vector Routing Protocol . . . . . . . . . . . . . . . . 10 2.3.1 Route Discovery and Multipoint Relays . . . . . . . . . . . . . . . . . . . 11 2.4.3 Spreading Topology Informations

Braun, Torsten

387

PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS  

SciTech Connect (OSTI)

The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

Mickalonis, J.

2014-09-16T23:59:59.000Z

388

DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells  

Broader source: Energy.gov [DOE]

This document describes test protocols to assess the performance and durability of fuel cell components intended for automotive applications.

389

Mechanical & Aerospace Engineering  

E-Print Network [OSTI]

Mechanical & Aerospace Engineering An experimental methodology is presented for mechanism verification of physics-based prognosis of mechanical damage, such as fatigue. The proposed experimental methodology includes multi-resolution in-situ mechanical testing, advanced imaging analysis, and mechanism

390

A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments  

SciTech Connect (OSTI)

A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

Top, P; Kohlhepp, V; Dowla, F

2005-09-30T23:59:59.000Z

391

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2  

E-Print Network [OSTI]

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2 , Panu H¨am¨al¨ainen2 , Ben employed is the Secure Remote Password (SRP) authenti- cation protocol [15]. It makes extensive use of hash that can be called from soft- ware routines in the SRP protocol. This paper is structured as follows

Kuzmanov, Georgi

392

4. The Bounded Re-transmission Protocol Jean-Raymond Abrial  

E-Print Network [OSTI]

1 - The Bounded Re-transmission Protocol is a file transfer protocol - This is a problem dealing to handle that problem: timers. - We would like to see how we can formalize such timers #12;The Bounded. #12;Abortion of Protocol at the Sender Site 6 - The Sender can re-transmit the same data at most M

Southampton, University of

393

6. The Bounded Re-transmission Protocol Jean-Raymond Abrial  

E-Print Network [OSTI]

- The Bounded Re-transmission Protocol is a file transfer protocol - This is a problem dealing with fault that problem: timers. - We would like to see how we can formalize such timers #12;The Bounded Retransmission that the Receiver does not confuse (?) a new data with a retransmitted one. #12;Abortion of Protocol at the Sender

Southampton, University of

394

ProChat: Dynamic Formal Collaboration Protocols in a Chat Tool for Handheld Collaboration  

E-Print Network [OSTI]

ProChat: Dynamic Formal Collaboration Protocols in a Chat Tool for Handheld Collaboration Randal K, or collaboration protocols, can be developed outside the application, analyzed for errors, shared among users protocols are used to modify the user interface to control the collaboration. We conclude with some open

North Carolina at Chapel Hill, University of

395

Ni-NTA Magnetic Agarose Beads Handbook 12/200120 Detailed Protocols  

E-Print Network [OSTI]

Protocol Ni-NTA Magnetic Agarose Beads Handbook 12/200120 Detailed Protocols Protocol 1. Cell lysis appropriately. Adding 10 mM imidazole, inhibits binding of nontagged proteins. If the tagged protein does-NTA Magnetic Agarose Beads Handbook 12/2001 21 4. Sonicate or homogenize on ice to lyse cells (6 times for 10

Lebendiker, Mario

396

IEEE TRANSACTIONS ON RELIABILITY, VOL. 38, NO. 1,1989 APRIL 103 Reliable Protocols for Distributed  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON RELIABILITY, VOL. 38, NO. 1,1989 APRIL 103 Reliable Protocols for Distributed-tolerance, Message complexity, Reliable protocol Reader Aids - Purpose: Design reliable distributed protocols Special Termination Detection S. Venkatesan University of Pittsburgh, Pittsburgh Key Words - Distributed system, Fault

Venkatesan, S.

397

Protocol, Qualification Standard for the Site Lead Program - May 2011 |  

Broader source: Energy.gov (indexed) [DOE]

Qualification Standard for the Site Lead Program - May Qualification Standard for the Site Lead Program - May 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011 May 2011 Qualification Standard for the Site Lead Program This Qualification Standard establishes common functional area competency requirements for personnel assigned as Site Leads in the Office of Safety and Emergency Management Evaluations. Satisfactory and documented completion of the competency requirements contained in this Standard ensures that employees possess the minimum requisite competence to fulfill their functional area duties and responsibilities. This Standard is integrated with existing qualification standards developed by DOE in accordance with DOE Order 426.1, Federal Technical Capability. Protocol, Qualification Standard for the Site Lead Program - May 2011

398

A Comparison of US and Chinese EV Battery Testing Protocols  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

US and Chinese EV US and Chinese EV Battery Testing Protocols: Results D. Robertson, 1 J. Christophersen, 2 Fang Wang, 3 Fan Bin, 3 I. Bloom 1 US/China Electric Vehicle Initiative Meeting August 23-24, 2012 Boston, MA 1 Argonne National Laboratory 2 Idaho National Laboratory 3 CATARC A Comparison of US and Chinese Battery Testing Protocols  Battery testing is a time-consuming and costly process  There are parallel testing efforts, such as those in the US and China  These efforts may be better leveraged through international collaboration  The collaboration may establish standardized, accelerated testing procedures and will allow battery testing organizations to cooperate in the analysis of the resulting data  In turn, the collaboration may accelerate electric vehicle development and

399

A Sensing Error Aware MAC Protocol for Cognitive Radio Networks  

E-Print Network [OSTI]

Cognitive radios (CR) are intelligent radio devices that can sense the radio environment and adapt to changes in the radio environment. Spectrum sensing and spectrum access are the two key CR functions. In this paper, we present a spectrum sensing error aware MAC protocol for a CR network collocated with multiple primary networks. We explicitly consider both types of sensing errors in the CR MAC design, since such errors are inevitable for practical spectrum sensors and more important, such errors could have significant impact on the performance of the CR MAC protocol. Two spectrum sensing polices are presented, with which secondary users collaboratively sense the licensed channels. The sensing policies are then incorporated into p-Persistent CSMA to coordinate opportunistic spectrum access for CR network users. We present an analysis of the interference and throughput performance of the proposed CR MAC, and find the analysis highly accurate in our simulation studies. The proposed sensing error aware CR MAC p...

Hu, Donglin

2011-01-01T23:59:59.000Z

400

SPTP: A Trust Management Protocol for Online and Ubiquitous Systems  

Science Journals Connector (OSTI)

With the recent proliferation of ubiquitous, mobile and cloud-based systems, security, privacy and trust concerns surrounding the use of emerging technologies in the ensuing wake of the Internet of Things (IoT) continues to mount. In most instances, ... Keywords: Privacy Framework, SPT, Security, Trust Management, Trust and Privacy Protocol, Cloud, Collective Intelligence, mHealth, Ubiquitous Computing, Mobile Computing, Online Advertising Privacy

Ivor D. Addo, Ji-Jiang Yang, Sheikh I. Ahamed

2014-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Protocols of radiocontaminant air monitoring for inhalation exposure estimates  

SciTech Connect (OSTI)

Monitoring the plutonium and americium particle emissions from soils contaminated during atmospheric nuclear testing or due to accidental releases is important for several reasons. First, it is important to quantify the extent of potential human exposure from inhalation of alpha-emitting particles, which is the major exposure pathway from transuranic radionuclides. Second, the information provided by resuspension monitoring is the basis of criteria that determine the target soil concentrations for management and cleanup of contaminated soil sites. There are other radioactive aerosols, such as the fission products (cesium and strontium) and neutron-activation products (europium isotopes), which may be resuspended and therefore necessary to monitor as well. This Standard Protocol (SP) provides the method used for radiocontaminant air monitoring by the Health and Ecological Assessment Division (formerly Environmental Sciences Division), Lawrence Livermore National Laboratory, as developed and tested at Nevada Test Site (NTS) and in the Marshall Islands. The objective of this SP is to document the applications and methods of monitoring of all the relevant variables. This protocol deals only with measuring air concentrations of radionuclides and total suspended particulates (TSP, or {open_quotes}dust{close_quotes}). A separate protocol presents the more difficult measurements required to determine transuranic aerosol emission rates, or {open_quotes}resuspension rate{close_quotes}.

Shinn, J.H.

1995-09-01T23:59:59.000Z

402

Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems  

SciTech Connect (OSTI)

The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

2014-06-01T23:59:59.000Z

403

Gold Standard Program Model | Open Energy Information  

Open Energy Info (EERE)

Gold Standard Program Model Gold Standard Program Model Jump to: navigation, search Tool Summary Name: Gold Standard Program Model Agency/Company /Organization: World Wildlife Fund Sector: Climate, Energy User Interface: Other Complexity/Ease of Use: Moderate Website: www.cdmgoldstandard.org/project-certification/rules-and-toolkit Cost: Paid Related Tools Environmental Benefits Mapping and Analysis Program (BenMAP) MIT Emissions Prediction and Policy Analysis (EPPA) Model ProForm ... further results Find Another Tool FIND DEVELOPMENT IMPACTS ASSESSMENT TOOLS A bottom-up method of certifying Kyoto Protocol Clean Development Mechanism projects and voluntary programs that result in verifiable co-benefits. Approach It is a bottom up method of certifying Kyoto Protocol Clean Development Mechanism projects as well as voluntary programs that result in verifiable

404

Spatial analysis of fish distribution in relation to offshore wind farm developments.  

E-Print Network [OSTI]

??In an effort to support the Kyoto Protocol, the government of the United Kingdom has targeted a goal of obtaining 15% of its electricity supply… (more)

Gay, Marybeth Eshleman

2012-01-01T23:59:59.000Z

405

Intertemporal Emissions Trading and Market Power: Modeling a Dominant Firm with a Competitive Fringe  

Science Journals Connector (OSTI)

In international emissions trading schemes such as the Kyoto Protocol and the European Union Emissions Trading Scheme, the suboptimal negotiation of the cap...

Julien Chevallier

2011-01-01T23:59:59.000Z

406

Green Enterprises | Open Energy Information  

Open Energy Info (EERE)

SW7 1QJ Sector: Carbon Product: As an active participant in the global carbon market, Green Enterprises incorporates the objective of the Kyoto Protocol through the Clean...

407

Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1  

E-Print Network [OSTI]

Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1 Fish Tank Water Changing Fry and tanks: 1. Remove air stone & lid, then take tank from shelf and place fry to make sure it matches # on tank label. 4. Use small (air stone size) plastic tubing to siphon

Langerhans, Brian

408

Mechanical and Aerospace Engineering  

E-Print Network [OSTI]

Mechanical and Aerospace Engineering seminar Three Dimensional Traction Force Microscopy with Applications in Cell Mechanics abstract The interactions between biochemical and mechanical signals during-dimensional measurement techniques are needed to investigate the effect of mechanical properties of the substrate

409

Mechanical Engineer Company Description  

E-Print Network [OSTI]

Mechanical Engineer Company Description Control Solutions Inc. is a small, dynamic, and rapidly. Position Description The Mechanical Engineer is responsible for all aspects associated with the mechanical enclosures, brackets, cabling assemblies among others. Systems include mechanisms, sensors, hydraulics, among

Kostic, Milivoje M.

410

MECHANICAL ENGINEERING Ross Schlueter  

E-Print Network [OSTI]

MECHANICAL ENGINEERING Ross Schlueter Engineering Deputy For Mechanical Engineering Russ Wells Mechanical Engineering Department Deputy ELECTRONICS, SOFTWARE & INSTRUMENTATION ENGINEERING Henrik von Der Sen Mechanical Admin. Assist. Joan Wolter Electronics Admin. Assist. Marilyn Wong Division Admin

411

A Comparative experimental study of media access protocols for wireless radio networks  

SciTech Connect (OSTI)

We conduct a comparative experimental analysis of three well known media access protocols: 802.11, CSMA, and MACA for wireless radio networks. Both fixed and ad-hoc networks are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of experiments was to study how (i) the size of the network, (ii) number of open connections, (iii) the spatial location of individual connections, (iv) speed with which individual nodes move and (v) protocols higher up in the protocol stack (e,g. routing layer) affect the performance of the media access sublayer protocols. The performance of the protocols was measured w.r.t. three important parameters: (1) number of received packets, (2) average latency of each packet, and (3) throughput. The following general qualitative conclusions were obtained; some of the conclusions reinforce the earlier claims by other researchers. (1) Although 802.11 performs better than the other two protocols with respect to fairness of transmission, packets dropped, and latency, its performance is found to (i) show a lot of variance with changing input parameters and (ii) the overall performance still leaves a lot of room for improvement. (2) CSMA does not perform too well under the fairness criteria, however, was the best in terms of the latency criteria. (3) MACA also shows fairness problems and has poor performance at high packet injection rates. (4) Protocols in the higher level of the protocol stack affect the MAC layer performance. The main general implications of our work is two folds: (1) No single protocol dominated the other protocols across various measures of efficiency. This motivates the design of a new class of parameterized protocols that adapt to changes in the network connectivity and loads. We refer to these class of protocols as parameterized dynamically adaptive efficient protocols and as a first step suggest key design requirements for such a class of protocols. (2) Performance analysis of protocols at a given level in the protocol stack need to be studied not locally in isolation but as a part of the complete protocol stack. The results suggest that in order to improve the performance of a communication network, it will be important to study the entire protocol stuck as a single algorithmic construct; optimizing individual layers in the 7 layer OSI stack will not yield performance improvements beyond a point.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, M. V. (Madhav V.)

2001-05-24T23:59:59.000Z

412

Verifying a Simplified Fuel Oil Flow Field Measurement Protocol  

SciTech Connect (OSTI)

The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

Henderson, H.; Dentz, J.; Doty, C.

2013-07-01T23:59:59.000Z

413

Protocol, Technical Qualification Program - October 22, 2003 | Department  

Broader source: Energy.gov (indexed) [DOE]

Technical Qualification Program - October 22, 2003 Technical Qualification Program - October 22, 2003 Protocol, Technical Qualification Program - October 22, 2003 October 22, 2003 Technical Qualification Program Procedure (OA-50-TQP-1) This procedure implements the Office of ES&H Evaluations Technical Qualification Program (TQP) per the criteria contained in DOE Manual 426.1-1 "Federal Technical Capability Manual". Key elements of the program include: identifying personnel required to participate in the TQP, identifying, developing, approving, revising and updating individual qualification requirements, evaluating staff members against the assigned Technical Qualification Standards and documenting the approval of equivalencies, establishing and updating individual development plans, training

414

Special Features: Kyoto University's International Relations Endeavors  

E-Print Network [OSTI]

researchers, but to actively engage with the international community, concentrating on the strategy's three central pillars of research, education, and international service. This issue of Research Activities University is to sustain and develop its historical commitment to academic freedom and to pursue harmonious

Takada, Shoji

415

26AUTUMN 2014 Kyoto University Newsletter  

E-Print Network [OSTI]

International Offices: The European Center in Heidelberg and the ASEAN Center in Bangkok World-renowned KU

Takada, Shoji

416

Climate policy: The Kyoto approach has failed  

Science Journals Connector (OSTI)

... capital invested in it, numerous subsequent Conference of the Parties (COP) meetings and considerable economic costs, it has had no noticeable impact on global carbon emissions. These remain on ... India will be twice their present size, requiring the addition of 400–600 gigawatts of coal-fired generating capacity to their electricity systems. ...

Dieter Helm

2012-11-28T23:59:59.000Z

417

Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

Many energy-aware routing protocols have been proposed for wireless sensor networks. Most of them are only energy savers and do not take care about energy balancing. The energy saver protocols try to decrease the energy consumption of the network as a whole; however the energy manager protocols balance the energy consumption in the network to avoid network partitioning. This means that energy saver protocols are not necessarily energy balancing and vice versa. However, the lifetime of wireless sensor network is strictly depending on energy consumption; therefore, energy management is an essential task to be considered. This paper proposes an energy aware routing protocol, named FEAR, which considers energy balancing and energy saving. It finds a fair trade-off between energy balancing and energy saving by fuzzy set concept. FEAR routing protocol is simulated and evaluated by Glomosim simulator.

Ahvar, Ehsan; Piran, Mohammad Jalil

2011-01-01T23:59:59.000Z

418

Next-generation communication protocol concepts for future nanosatellite constellations  

Science Journals Connector (OSTI)

Nanosatellite constellations at low Earth orbits represent a cost-efficient way for the accomplishment of Earth and space observation tasks. With the growing complexity of the exploration tasks, the amount of science data is expected to increase. For data download purposes efficient communication strategies must be adopted. The available power of a single nanosatellite spacecraft is limited by the small area of solar arrays. The communications equipment consumes a substantial amount of power. A constellation of nanosatellites allows to share resources efficiently, assigning major tasks to different spacecrafts. Within the constellation, a dedicated spacecraft which acts as data relay, monitoring and controlling inter-satellite communications is advantageous. This allows all other satellites to reuse the energy saved by implementing low-energy consuming communications links between the satellites. With this approach, taking advantage of scheduled communication contacts, the overall system performance can be maximized. For the envisaged data relay scenario, the adoption of advanced communication protocol concepts is required. This paper presents innovative solutions for the fulfilment of the described communications tasks. After an investigation of the system requirements, strategies for the interconnection of the spacecrafts for the creation of a small constellation network are provided. Suitable transport protocol implementations are investigated and efficient store-and-forward concepts are proposed. A communication architecture for the usage of a data relay satellite within the constellation is presented, describing the role of the different nodes in the network.

Patrick Romano; Manuela Unterberger; Otto Koudelka

2010-01-01T23:59:59.000Z

419

Trapped Ion Quantum Error Correcting Protocols Using Only Global Operations  

E-Print Network [OSTI]

Quantum error-correcting codes are many-body entangled states that are prepared and measured using complex sequences of entangling operations. Each element of such an entangling sequence introduces noise to delicate quantum information during the encoding or reading out of the code. It is important therefore to find efficient entangling protocols to avoid the loss of information. Here we propose an experiment that uses only global entangling operations to encode an arbitrary logical qubit to either the five-qubit repetition code or the five-qubit code, with a six-ion Coulomb crystal architecture in a Penning trap. We show that the use of global operations enables us to prepare and read out these codes using only six and ten global entangling pulses, respectively. The proposed experiment also allows the acquisition of syndrome information during readout. We provide a noise analysis for the presented protocols, estimating that we can achieve a six-fold improvement in coherence time with noise as high as $\\sim 1\\%$ on each entangling operation.

Joseph F. Goodwin; Benjamin J. Brown; Graham Stutter; Howard Dale; Richard C. Thompson; Terry Rudolph

2014-07-07T23:59:59.000Z

420

Building America Indoor Temperature and Humidity Measurement Protocol  

SciTech Connect (OSTI)

When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every 4 years the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the 'average occupant' in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

Engebrecht-Metzger, C.; Norton, P.

2014-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

International Workshops to Foster Implementation of the IAEA Additional Protocol  

SciTech Connect (OSTI)

A country’s adherence to the International Atomic Energy Agency’s (IAEA) Additional Protocol is an important statement to the world of that country’s commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEA’s regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

2003-07-14T23:59:59.000Z

422

ENGINEERING MECHANICS SEMINARSENGINEERING MECHANICS SEMINARS THINK COMPOSITE  

E-Print Network [OSTI]

ENGINEERING MECHANICS SEMINARSENGINEERING MECHANICS SEMINARS THINK COMPOSITE "THINK outside the box" for more competitive structural COMPOSITES Dr. Melih Papila Visiting Professor, Aero/Astro Department, Stanford University. Adv. Composites and Polymer Processing Lab., Sabanci University, Istanbul. mpapila

Ponce, V. Miguel

423

Breaking and making quantum money: toward a new quantum cryptographic protocol  

E-Print Network [OSTI]

Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge. There are no secure public-key quantum money schemes in the literature; as we show in this paper, the only previously published scheme [1] is insecure. We introduce a category of quantum money protocols which we call collision-free. For these protocols, even the bank cannot prepare multiple identical-looking pieces of quantum money. We present a blueprint for how such a protocol might work as well as a concrete example which we believe may be insecure.

Andrew Lutomirski; Scott Aaronson; Edward Farhi; David Gosset; Avinatan Hassidim; Jonathan Kelner; Peter Shor

2009-12-21T23:59:59.000Z

424

A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes  

Broader source: Energy.gov [DOE]

Summary of LANL?s testing protocol work presented to the High Temperature Membrane Working Group Meeting, Orlando FL, October 17, 2003

425

David Niedzwiecki 3/2/2012 2:37:42 PM Protocol for Ultrathin Nitride Membranes  

E-Print Network [OSTI]

necessary to remove the nitride layer. -Use the CHF3/CF4/Ar oxide removal protocol to remove the oxide. Do 8

Movileanu, Liviu

426

E-Print Network 3.0 - aware routing protocol Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for Mobile Ad Hoc Networks Morteza Maleki, Karthik Dantu... the network lifetime. Simulation results show that the proposed power-aware source routing protocol has... . The...

427

Testing and Evaluation Protocol for Backpack-Based Radiation Detection Systems Used for Homeland  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

428

Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

429

Testing and Evaluation Protocol for Spectroscopy-Based Portal Monitors Used for Homeland Security  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Spectroscopy- Based Portal Monitors Used for Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

430

Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

431

Testing and Evaluation Protocol for Alarming Personal Radiation Detectors for Homeland Security  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Alarming Personal Radiation Detectors for Homeland Security T................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

432

Testing and Evaluation Protocol for Mobile and Transportable Radiation Monitors Used for Homeland  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Mobile and Transportable Radiation Monitors Used for Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

433

Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

434

Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

435

Eavesdropping on the "ping-pong" type quantum communication protocols with invisible photon  

E-Print Network [OSTI]

The crucial issue of quantum communication protocol is its security. In this paper, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed. PACS:03.67.Hk

Qing-yu Cai

2005-07-30T23:59:59.000Z

436

Development and quantitative analyses of a universal rRNA-subtraction protocol for microbial metatranscriptomics  

E-Print Network [OSTI]

Metatranscriptomes generated by pyrosequencing hold significant potential for describing functional processes in complex microbial communities. Meeting this potential requires protocols that maximize mRNA recovery by ...

Stewart, Frank J.

437

Mechanical & Biomedical Engineering  

E-Print Network [OSTI]

Mechanical & Biomedical Engineering Department BACHELOR OF SCIENCE IN MECHANICAL ENGINEERING COURSE 105 Mechanical Engineering Graphics 3 CHEM 111L College Chemistry Lab (DLN) 1 ENGL 102 English PHYS 211 Mechanics, Waves & Heat (DLN) 4 UF 100 Intellectual Foundations 3 PHYS 211L Mechanics, Waves

Barrash, Warren

438

REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS, INFCIRC/540 (Corrected) VOLUME II/III IAEA COMMITTEE 24, Major Issues Underlying the Model Additional Protocol (1996-1997).  

SciTech Connect (OSTI)

Volume I of this Review traces the origins of the Model Additional Protocol. It covers the period from 1991, when events in Iraq triggered an intensive review of the safeguards system, until 1996, when the IAEA Board of Governors established Committee 24 to negotiate a new protocol to safeguards agreement. The period from 1991-1996 set the stage for this negotiation and shaped its outcome in important ways. During this 5-year period, many proposals for strengthening safeguards were suggested and reviewed. Some proposals were dropped, for example, the suggestion by the IAEA Secretariat to verify certain imports, and others were refined. A rough consensus was established about the directions in which the international community wanted to go, and this was reflected in the draft of an additional protocol that was submitted to the IAEA Board of Governors on May 6, 1996 in document GOV/2863, Strengthening the Effectiveness and Improving the Efficiency of the Safeguards System - Proposals For Implementation Under Complementary Legal Authority, A Report by the Director General. This document ended with a recommendation that, 'the Board, through an appropriate mechanism, finalize the required legal instrument taking as a basis the draft protocol proposed by the Secretariat and the explanation of the measures contained in this document.'

Rosenthal, M.D.; Saum-Manning, L.; Houck, F.

2010-01-01T23:59:59.000Z

439

Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Aftertreatment (Agreement 13415) Thermal Deactivation Mechanisms of Fully-Formed Lean NOx Trap Catalysts Aged by LeanRich Cycling Impacts of Biodiesel on Emission Control Devices...

440

Mechanical Engineering Graduate Student  

E-Print Network [OSTI]

......................................................................................9 Engineering Career Services ................................................................9 McMechanical Engineering Graduate Student Handbook January 2014 Department of Mechanical Engineering University of Wisconsin-Madison #12;Mechanical Engineering Web Page: http://www.engr.wisc.edu/me Graduate

Wisconsin at Madison, University of

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Mechanical & Industrial Engineering  

E-Print Network [OSTI]

Mechanical & Industrial Engineering 1 Welcome MIE Industrial Advisory Board October 15, 2010 #12;Mechanical & Industrial Engineering 2 MIE Dorothy Adams Undergraduate/Graduate Secretary David Schmidt Associate Professor & Graduate Program Director #12;Mechanical & Industrial Engineering 3 MIE James Rinderle

Mountziaris, T. J.

442

MECHANICAL ENGINEERING UNDERGRADUATE MAJOR  

E-Print Network [OSTI]

HANDBOOK FOR MECHANICAL ENGINEERING UNDERGRADUATE MAJOR Old Dominion University Department of Mechanical Engineering Batten College of Engineering and Technology Norfolk, Virginia 23529-0247 #12;TABLE OF CONTENTS MECHANICAL ENGINEERING HANDBOOK

443

Mechanical engineering Department Seminar  

E-Print Network [OSTI]

Mechanical engineering Department Seminar Katia Bertoldi Harvard University Soft materials in response to diverse stimuli. While the mechanical attributes - such as energy absorption, stiffness and switchable functionalities. Katia Bertoldi is an Assistant Professor of Applied Mechanics at Harvard

444

Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks  

SciTech Connect (OSTI)

We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

445

Addendum to the Building America House Simulation Protocols  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Addendum to the Building Addendum to the Building America House Simulation Protocols C. Engebrecht Metzger, E. Wilson, and S. Horowitz National Renewable Energy Laboratory December 2012 ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, subcontractors, or affiliated partners makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark,

446

DOE Transportation Protocols Topic Group Summary of Second Conference  

Broader source: Energy.gov (indexed) [DOE]

Summary of Second Conference Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TEC/WG) DOE Transportation Protocols Working Group was held at 11:00 a.m. Eastern time on Thursday, April 8, 1999. The session was led by Mona Williams, DOE/National Transportation Program (NTP)-Albuquerque. Other participants included Patricia Armijo, DOE/NTP-Albuquerque; Alex Thrower, Urban Energy & Transportation Corporation; Chris Wells, Southern States Energy Board; Elizabeth Helvey, JK Research Associates; Ken Niles, Oregon Office of Energy; Lisa Sattler, Council of State Governments-Midwestern Office; Laurel Cook, DOE/Naval Reactors (NR); Chris Wentz, New Mexico Department of Energy, Minerals and Natural Resources; Phillip Paull, Council of State Governments-Northeastern Conference; and

447

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

USCAR FUEL CELL TECH TEAM USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May 26, 2010 Fuel cells, especially for automotive propulsion, must operate over a wide range of operating and cyclic conditions. The desired operating range encompasses temperatures from below the freezing point to well above the boiling point of water, humidity from ambient to saturated, and half-cell potentials from 0 to >1.5 volts. Furthermore, the anode side of the cell may be exposed to hydrogen and air during different parts of the driving and startup/shutdown cycles. The severity in operating conditions is greatly exacerbated by the transient and cyclic nature of

448

Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx  

Broader source: Energy.gov (indexed) [DOE]

4/12/10 4/12/10 1 EM Protocol for Application of Contingency and Management Reserve for the Acquisition of Capital Asset Projects This document provides guidance for the development and consistent application of government contingency and contractor management reserve (MR) in the planning and execution of DOE capital asset projects in accordance with the requirements of DOE Order 413.3 and the Federal Acquisition Regulations (FARs). This guidance is consistent with Acquisition Letter 2009-01, "Management Reserve and Contingency," October 6, 2008 from the Office of Procurement and Assistance Management. Project contingency and MR are an integral part of the DOE capital asset project risk management process, providing project managers with the tools to respond to project risks and

449

Automated Protocols Used by Labs | Scientific and Technical Information  

Office of Scientific and Technical Information (OSTI)

Notices Notices Automated Protocols Used by Labs Print page Print page Email page Email page DOE laboratories have two additional options for submitting data electronically to OSTI. They are: Batch Upload (Site-to-OSTI), and Harvesting (OSTI-to-Site). The XML DTD supporting Batch Upload specifies the same metadata that is used by the web-based AN 241.1. The main difference between web notice input and Harvesting upload is that the latter allows uploading of multiple records as a batch file. The web 241.1 is for single-record input only. Harvesting consists of three main phases: 1) Metadata mapping and technical development, 2) Testing, and 3) Production. The production phase is ongoing based on monitoring for quality control. Required Metadata Elements Author(s)

450

Microsoft Word - Assessment-C-SiteVisitProtocol  

Broader source: Energy.gov (indexed) [DOE]

ATTACHMENT C ATTACHMENT C DEPARTMENTAL EVALUATION AND SITE VISIT PROTOCOL 1. The Departmental Records Officer will provide in writing to the PRO a sixty day notice of intent to evaluate, along with recommended sites to be visited and areas to be examined. 2. The PRO will notify sites to be visited and coordinate mutually agreeable dates with the Departmental Records Officer. 3. The PRO will provide an overview of the organization's Records Management Program and make summaries of assessments available for review prior to the evaluation. 4. The PRO will highlight changes made to the program and future plans for improvement. 5. Field site visits may include the PRO and shall not exceed three days unless specified in writing. 6. Field sites will provide an overview of:

451

A Zero Knowledge Protocol For Nuclear Warhead Verification  

SciTech Connect (OSTI)

The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

Glaser, Alexander [Princeton, Univ., NJ (United States). Program on Science and Global Security] [Princeton, Univ., NJ (United States). Program on Science and Global Security; Goldston, Robert J. [Princeton Plasma Physics Lab., Princeton, NJ (United States)] [Princeton Plasma Physics Lab., Princeton, NJ (United States)

2014-03-14T23:59:59.000Z

452

Addendum to the Building America House Simulation Protocols  

Broader source: Energy.gov (indexed) [DOE]

Addendum to the Building Addendum to the Building America House Simulation Protocols C. Engebrecht Metzger, E. Wilson, and S. Horowitz National Renewable Energy Laboratory December 2012 ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, subcontractors, or affiliated partners makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark,

453

Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software  

SciTech Connect (OSTI)

This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

2013-09-06T23:59:59.000Z

454

Monroe Thomas, Mechanical Technician  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Monroe Thomas, Mechanical Technician Print The weekend before the ALS was scheduled to start up again after the most recent shutdown, mechanical technician Monroe Thomas kept...

455

A real-time routing protocol with mobility support and load distribution for mobile wireless sensor networks  

Science Journals Connector (OSTI)

Mobile wireless sensor network (MWSN) is a wireless ad hoc network that consists of a very large number of tiny sensor nodes communicating with each other in which sensor nodes are either equipped with motors for active mobility or attached to mobile objects for passive mobility. A real-time routing protocol for MWSN is an exciting area of research because messages are delivered according to their end-to-end deadlines. MWSN demands real-time routing in many applications including disasters fighting, forest fire detection and volcanic eruption detection. This paper proposes a novel idea of real-time that provides mobility and load distribution (RTMLD) for MWSN. RTMLD utilised corona mechanism and optimal forwarding metrics to forward the data packet in MWSN. It computes the optimal forwarding node based on RSSI, remaining battery level of sensor nodes and packet delay over one-hop. RTMLD ensures high packet delivery ratio and experiences minimum end-to-end delay in WSN and MWSN compared with baseline routing protocol. RTMLD has been successfully verified through test bed and simulation experiment.

Adel A. Ahmed; Norsheila Fisal

2014-01-01T23:59:59.000Z

456

Plant Biomass and Mechanisms of Recalcitrance Activity Lead: Debra Mohnen  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Biomass and Mechanisms of Recalcitrance Activity Biomass and Mechanisms of Recalcitrance Activity Lead: Debra Mohnen 1.2 Cell Wall Synthesis and Mechanisms of Recalcitrance Activity Lead: Al Darvill TASK 1. Nucleotide-sugar/polysaccharide domain - Bar-Peled TASK 2. Cellulose domain - Kalluri TASK 3. Xylan and other hermiceluloses domain - York TASK 4. Pectin domain - Mohnen TASK 5. APAP1 domain - Tan TASK 6. Lignin domain - Dixon TASK 7. Transcription factor domain - Dixon TASK 8. Cellular/subcellular localization domain - Hahn 1.2.1: Cell Wall Synthesis and Mechanisms of Recalcitrance Activity (Darvill) 1.1 TOP and Elite Populus and Switchgrass and System Analysis Lead: Tuskan / Dixon 1.1.2: TOP and Elite Line Analysis Platform and Protocols (Nelson) 1.1.1: Selection of the TOP Populus and Switchgrass Lines

457

The past, present and future of protocol checking with CSP and FDR  

E-Print Network [OSTI]

AVoCS 2006 The past, present and future of protocol checking with CSP and FDR Bill Roscoe1 Oxford of these meetings was the development of the CSP model of cryptographic protocols, following Gavin Lowe's discovery the particular advantages of using a process algebra, and CSP in particular, for modelling cryptoprotocols

Paris-Sud XI, Université de

458

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network [OSTI]

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

459

Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman, William Ivancic  

E-Print Network [OSTI]

Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman, William Ivancic to ensure connectivity of the mobile nodes with the Internet. However, there has been no comprehensive cost analysis of mobility protocol entities that considers all possible costs. In this paper, we have developed

Atiquzzaman, Mohammed

460

Off-line Micro-payment Protocol for Multiple Vendors in Mobile Commerce Xiaoling Dai1  

E-Print Network [OSTI]

to be enhanced for existing micro- payment approaches. Also, with the proliferation of wireless networks, mobile] and the NetPay micro-payment protocol with the client- side e-wallet in the client-server networks. WeOff-line Micro-payment Protocol for Multiple Vendors in Mobile Commerce Xiaoling Dai1 Oluwatomi

Grundy, John

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis  

Science Journals Connector (OSTI)

......Automated Validation of Internet Security Protocols and...formalisms is natural in a young research area as researchers...Automated Validation of Internet Security Protocols and...used by principal A. By abuse of notation, we also...Mn . We will slightly abuse notation and refer to......

Carlos Caleiro; Luca Viganò; David Basin

2005-11-01T23:59:59.000Z

462

Fish Community Assessment Rapid Bioassessment Protocol V --Fish (EPA 1989, 1999).......................................................693  

E-Print Network [OSTI]

APPENDIX C Fish Community Assessment CONTENTS Rapid Bioassessment Protocol V -- Fish (EPA 1989 ......................................................................................................................................707 RAPID BIOASSESSMENT PROTOCOL V -- FISH (EPA 1989, 1999) The following are excerpts from U.S. EPA, but focuses on fish. Electrofishing, the most common technique used by agencies that monitor fish communities

Pitt, Robert E.

463

Optimal Decentralized Protocol for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low  

E-Print Network [OSTI]

Abstract-- Motivated by the power-grid-side challenges in the integration of electric vehicles, we proposeOptimal Decentralized Protocol for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low a decentralized protocol for negotiating day-ahead charging schedules for electric vehicles. The overall goal

Low, Steven H.

464

SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks Venugopalan Ramasubramanian@ece.cornell.edu, egs@cs.cornell.edu} ABSTRACT A central challenge in ad hoc networks is the design of rout- ing--Routing Protocols General Terms Design, Performance Keywords Hybrid, Adaptive, Ad Hoc Networks This work

Keinan, Alon

465

Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks  

E-Print Network [OSTI]

Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks Suyang Ju Submitted to the graduate degree program in Electrical Engineering & Computer Science and the Graduate Faculty of the University of Kansas School...: Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks Dissertation Committee: _____________________________________ Dr. Joseph B. Evans, Advisor Professor, EECS _____________________________________ Dr. Victor Frost...

Ju, Suyang

2011-12-31T23:59:59.000Z

466

Comparison of two Self-Organization and Hierarchical Routing Protocols for Ad Hoc Networks  

E-Print Network [OSTI]

Comparison of two Self-Organization and Hierarchical Routing Protocols for Ad Hoc Networks Bet. In this article, we compare two self-organization and hierarchical rout- ing protocols for ad hoc networks-organization and hierarchical routing in ad hoc networks. keywords: ad hoc networks, hierarchical routing, DHT, comparison

Paris-Sud XI, Université de

467

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols  

E-Print Network [OSTI]

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols Nuno Neves W. Kent that allows the rapid testing of checkpoint protocols with standard benchmarks. To achieve this goal, RENEW evaluated using the RENEW envi- ronment with SPEC and NAS benchmarks on a network of workstations connected

Neves, Nuno

468

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols  

E-Print Network [OSTI]

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols Nuno Neves W. Kent that allows the rapid testing of checkpoint protocols with standard benchmarks. To achieve this goal, RENEW evaluated using the RENEW envi­ ronment with SPEC and NAS benchmarks on a network of workstations connected

Neves, Nuno

469

ILC-TCP: An Interlayer Collaboration Protocol for TCP Performance Improvement in Mobile and Wireless  

E-Print Network [OSTI]

Internet has led to the optimization of network protocols to provide for a better performance. Most of the Internet traffic uses TCP, the de- facto transport layer protocol. Unfortunately, TCP performance degrades in the mobile and wireless environments. A good amount of research has been attempted to improve its performance

Helal, Abdelsalam

470

Internet Time Synchronization: the Network Time Protocol1,2,3 David L. Mills  

E-Print Network [OSTI]

Internet Time Synchronization: the Network Time Protocol1,2,3 David L. Mills Electrical Engineering is designed to distribute time information in a large, diverse internet system operating at speeds from and resulted in the designation of NTP as an Internet Standard protocol. The NTP synchronization system, which

Mills, David L.

471

LOTEC: A Simple DSM Consistency Protocol for Nested Object Transactions Peter Graham and Yahong Sui  

E-Print Network [OSTI]

LOTEC: A Simple DSM Consistency Protocol for Nested Object Transactions Peter Graham and Yahong Sui Memory (DSM) consistency protocol for an unconventional but important application domain - object applications typically targetted by DSM system designers. While, after 10 years of performance enhancement

Graham, Peter

472

DSM-PM2: A portable implementation platform for multithreaded DSM consistency protocols  

E-Print Network [OSTI]

DSM-PM2: A portable implementation platform for multithreaded DSM consistency protocols Gabriel Antoniu and Luc Bougé Abstract DSM-PM2 is a platform for designing, implementing and experimenting multithreaded DSM consistency proto- cols. It provides a generic toolbox which facilitates protocol design

Paris-Sud XI, Université de

473

Hector is an Energy effiCient Tree-based Optimized Routing protocol for wireless networks  

E-Print Network [OSTI]

Hector is an Energy effiCient Tree-based Optimized Routing protocol for wireless networks Nathalie geographic locations. We propose HECTOR, a hybrid energy efficient tree-based optimized routing protocol, based on two sets of virtual coordinates. One set is based on rooted tree coordinates, and the other

Stojmenovic, Ivan

474

Energy-Aware Tag Anti-Collision Protocols for RFID Systems Vinod Namboodiri, Lixin Gao  

E-Print Network [OSTI]

provide significant energy savings when compared to the existing Query Tree protocol while sharingEnergy-Aware Tag Anti-Collision Protocols for RFID Systems Vinod Namboodiri, Lixin Gao Department of Electrical and Computer Engineering University of Massachusetts at Amherst Email: {vnambood, lgao

Namboodiri, Vinod

475

A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks  

E-Print Network [OSTI]

A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks H. Yang, F. Ye and B. Sikdar a "Dynamic Query-tree Energy Balancing" (DQEB) protocol to dynamically adjust the tree structure and minimize networks. In [15] it has been shown that the minimum- energy broadcast tree problem is NP

Sikdar, Biplab

476

Efficient protocols for generating bipartite classical distributions and quantum Zhaohui Wei  

E-Print Network [OSTI]

Efficient protocols for generating bipartite classical distributions and quantum states Rahul Jain in optimization, convex geometry, and information theory. 1. To generate a classical distribution P(x, y), we an approximation of is allowed to generate a distribution (X, Y ) P, we present a classical protocol

Jain, Rahul

477

Utility Accrual Real-Time Resource Access Protocols with Assured Individual Activity Timeliness Behavior  

E-Print Network [OSTI]

Utility Accrual Real-Time Resource Access Protocols with Assured Individual Activity Timeliness Behavior Abstract We present a class of utility accrual resource access protocols for real-time embedded systems. The proto- cols consider application activities that are subject to time/utility function time

Ravindran, Binoy

478

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks  

E-Print Network [OSTI]

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks François Ingelrest.Mitton,David.Simplot}@lifl.fr Abstract--We present a turnover based adaptive HELLO protocol (TAP), which enables nodes in mobile networks to dynamically adjust their HELLO messages frequency depending on the current speed of nodes. To the best of our

Paris-Sud XI, Université de

479

Developing and Evaluating Routing Protocols for Rural Areas That Communicates Via Data Mules  

E-Print Network [OSTI]

Developing and Evaluating Routing Protocols for Rural Areas That Communicates Via Data Mules connectivity to isolated village networks via multiple data mules. These multiple mules communicate in order traces for multiple data mules for rural-like areas the existing protocols ad hoc on-demand distance

Blake, Edwin

480

On RTLOTOS and its application to the formal design of multimedia protocols \\Lambda  

E-Print Network [OSTI]

APPLICATION ` A LA CONCEPTION FORMELLE DE PROTOCOLES MULTIM ' EDIA R'esum'e Cet article pr'esente une nouvelle protocoles multim'edia. Une m'ethode de conception bas'ee sur des modules de sp'ecification r'es : M'ethodes formelles, LOTOS, Synchro­ nisation multim'edia Contents I Introduction 1 II LOTOS 2 III

Courtiat, Jean-Pierre

Note: This page contains sample records for the topic "kyoto protocol mechanisms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Specification and Analysis of the AER/NCA Active Network Protocol Suite in  

E-Print Network [OSTI]

Specification and Analysis of the AER/NCA Active Network Protocol Suite to the specification and analy- sis of the AER/NCA suite of active network multicast protocol compo- nents, AER/NCA poses challenging new problems for its formal specification and analysis. Real-Time Maude

Ã?lveczky, Peter Csaba

482

The Municipal Solid Waste Landfill as a Source of Montreal Protocol-restricted Halocarbons in the  

E-Print Network [OSTI]

The Municipal Solid Waste Landfill as a Source of Montreal Protocol-restricted Halocarbons of Geophysics #12;2 #12;The Municipal Solid Waste Landfill as a Source of Montreal Protocol municipal solid waste (MSW) landfills. With several hundred MSW landfills in both the US and UK, estimating

483

Protocol EM-HQ Review Field Self Assessment Site Specific QAP-QIP February  

Broader source: Energy.gov (indexed) [DOE]

EM-HQ Review Field Self Assessment Site Specific QAP-QIP EM-HQ Review Field Self Assessment Site Specific QAP-QIP February 2010 Protocol EM-HQ Review Field Self Assessment Site Specific QAP-QIP February 2010 This memorandum serves to transmit the Protocol for EM Review/Field Self-Assessment of Site-Specific QAP/QIP. The subject document is developed as part of continued efforts to ensure technical consistency, transparency, and clarity of QA requirements and expectations. Protocol EM-HQ Review Field Self Assessment Site Specific QAP-QIP February 2010 More Documents & Publications Protocol for EM Review/Field Self-Assessment of Site-Specific QAPs/QIPs Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans SOPP-43, EM-23 Quality Assurance Oversight

484

Event:GHG Protocol Latin America and Caribbean Regional Training: How to  

Open Energy Info (EERE)

Protocol Latin America and Caribbean Regional Training: How to Protocol Latin America and Caribbean Regional Training: How to Establish a National Corporate Emissions Reporting Program Jump to: navigation, search Calendar.png GHG Protocol Latin America and Caribbean Regional Training: How to Establish a National Corporate Emissions Reporting Program: all day on 2011/08/29 Aug 29 - Sept 2: Bogota, Colombia This regional workshop will provide training for government agencies, business/industry associations and key NGOs on how to establish and implement national- or regional-level corporate greenhouse gas (GHG) emissions reporting programs and trainings. The workshop will include two parts: a training of trainers of corporate GHG accounting and reporting, and a corporate GHG program design course. Members of the Brazil GHG Protocol Program, the Mexico GHG Protocol

485

Subfreezing Start/Stop Protocol for an Advanced Metallic Open-Flowfield Fuel Cell Stack  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Subfreezing Start/Stop Protocol for an Advanced Subfreezing Start/Stop Protocol for an Advanced Subfreezing Start/Stop Protocol for an Advanced Subfreezing Start/Stop Protocol for an Advanced Subfreezing Start/Stop Protocol for an Advanced Metallic Open Metallic Open Metallic Open Metallic Open- - - -Flowfield Flowfield Flowfield Flowfield Fuel Cell Stack Fuel Cell Stack Fuel Cell Stack Fuel Cell Stack Presented at: US DOE New Projects Kickoff Meeting Washington, DC 13-14 February 2007 Alternative Energy Efficient Simple Clean Today Alternative Energy Efficient Simple Clean Today Objective Objective Objective Objective This project will demonstrate a PEM fuel cell stack that is able to perform and start up in subfreezing conditions, respecting allowed energy budget, and showing limited impact at extreme temperatures over multiple

486

Running key mapping in a quantum stream cipher by the Yuen 2000 protocol  

Science Journals Connector (OSTI)

A quantum stream cipher by Yuen 2000 protocol (so-called Y00 protocol or ?? scheme) consisting of linear feedback shift register of short key is very attractive in implementing secure 40 Gbits/s optical data transmission, which is expected as a next-generation network. However, a basic model of the Y00 protocol with a very short key needs a careful design against fast correlation attacks as pointed out by Donnet et al. This Brief Report clarifies an effectiveness of irregular mapping between running key and physical signals in the driver for selection of M-ary basis in the transmitter, and gives a design method. Consequently, quantum stream cipher by the Y00 protocol with our mapping has immunity against the proposed fast correlation attacks on a basic model of the Y00 protocol even if the key is very short.

Tetsuya Shimizu, Osamu Hirota, and Yuki Nagasako

2008-03-27T23:59:59.000Z

487

Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol  

SciTech Connect (OSTI)

The participant attack is the most serious threat for quantum secret-sharing protocols. We present a method to analyze the security of quantum secret-sharing protocols against this kind of attack taking the scheme of Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59, 1829 (1999)] as an example. By distinguishing between two mixed states, we derive the necessary and sufficient conditions under which a dishonest participant can attain all the information without introducing any error, which shows that the HBB protocol is insecure against dishonest participants. It is easy to verify that the attack scheme of Karlsson, Koashi, and Imoto [Phys. Rev. A 59, 162 (1999)] is a special example of our results. To demonstrate our results further, we construct an explicit attack scheme according to the necessary and sufficient conditions. Our work completes the security analysis of the HBB protocol, and the method presented may be useful for the analysis of other similar protocols.

Qin Sujuan [State Key Laboratory of Network Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); School of Science, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); Gao Fei; Wen Qiaoyan [State Key Laboratory of Network Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, P. O. Box 810, Chengdu, 610041 (China)

2007-12-15T23:59:59.000Z

488

Mechanical & Industrial Engineering  

E-Print Network [OSTI]

Mechanical & Industrial Engineering 1 Welcome MIE Industrial Advisory Board May 5th, 2011 #12;Mechanical & Industrial Engineering 2 IAB 2010-2011 · David K. Anderson ­ Alden Research Laboratory, Inc went on for three weeks Mechanical & Industrial Engineering 6 #12;Reza Shahbazian Yassar Mechanical

Mountziaris, T. J.

489

Career Map: Mechanical Engineer  

Broader source: Energy.gov [DOE]

The Wind Program's Career Map provides job description information for Mechanical Engineer positions.

490

Mechanical Engineering Undergraduate  

E-Print Network [OSTI]

Mechanical Engineering Department Undergraduate Advising Manual for Bachelor of Science Degrees in Mechanical Engineering and Engineering Mechanics 2011-2012 - Updated April 15, 2012 #12;Johns Hopkins University ­ Department of Mechanical Engineering 2011-2012 Undergraduate Student Advising Manual Page 2

Ghosh, Somnath

491

Mechanical engineering Department Seminar  

E-Print Network [OSTI]

Mechanical engineering Department Seminar James Bird Department of Mechanical Engineering Boston ­ are discussed. James Bird is an Assistant Professor in the Mechanical Engineering Department at Boston completed post-doctoral research at MIT. His research interests include experimental fluid mechanics

492

Mechanical Engineering Undergraduate  

E-Print Network [OSTI]

Mechanical Engineering Department Undergraduate Advising Manual for Bachelor of Science Degrees in Mechanical Engineering and Engineering Mechanics 2012-2013 - Updated July 14, 2013 #12;Johns Hopkins University ­ Department of Mechanical Engineering 2012-2013 Undergraduate Student Advising Manual Page 2

Ghosh, Somnath

493

Mechanical Engineering & Thermal Group  

E-Print Network [OSTI]

Mechanical Engineering & Thermal Group The Mechanical Engineering (ME) & Thermal Group at LASP has, and ground- based mechanical systems. Instrument Design Building on decades of design experience that has evolved with the complexity of instrument design demands, LASP mechanical engineers develop advanced

Mojzsis, Stephen J.

494

Combined Quantum Mechanical and Molecular Mechanics Studies of...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mechanical and Molecular Mechanics Studies of the Electron-Transfer Reactions Involving Carbon Tetrachloride in Combined Quantum Mechanical and Molecular Mechanics Studies of the...

495

Research on Security Architecture and Protocols of Grid Computing System  

Science Journals Connector (OSTI)

This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstract of grid computing system at Grid

Xiangming Fang; Shoubao Yang; Leitao Guo; Lei Zhang

2004-01-01T23:59:59.000Z

496

A symbolic/subsymbolic interface protocol for cognitive modeling  

Science Journals Connector (OSTI)

......behavior being executed. 4.3 Elementary logic functions Using hysteresis...schematic characterization of an elementary mechanism of the mind...RC, where R is the resistance and C is the capacitance of an electric circuit implementation......

Patrick Simen; Thad Polk

2010-10-01T23:59:59.000Z

497

Sandia National Laboratories: Mechanical Testing  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

EnergyNuclear Energy Systems Laboratory (NESL) Brayton LabMechanical Testing Mechanical Testing Mechanical Testing Overview Mechanical 1-2 (2008). Standard Test Methods for...

498

MIT Joint Program on the Science and Policy of Global Change  

E-Print Network [OSTI]

The Kyoto Protocol and Developing Countries Mustafa Babiker, John M. Reilly and Henry D. Jacoby Report No-profit organizations. To inform processes of policy development and implementation, climate change research needs://web.mit.edu/globalchange/www/ Printed on recycled paper #12;The Kyoto Protocol and Developing Countries Mustafa Babiker, John M. Reilly

499

Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01  

Broader source: Energy.gov [DOE]

Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01

500

NSLS Mechanical Tech  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mechanical Tech Mechanical Tech The Mechanical Technician group is supervised by Robert Scheuerer and consists of Mechanical Technicians with fabrication/machining, assembly, installation, and alignment/surveying skills. This group also serves as an interface to Central Fabrication Services when more complex or larger fabrication efforts are needed. The Mechanical Tech group is responsible for fabricating, installing, aligning, and troubleshooting the mechanical hardware used on NSLS and SDL accelerators, front ends, and User beamlines, often starting solely from Mechanical Design group drawings or CAD files. The Mechanical Tech Group is responsible for the fabrication, assembly and installation of components at the NSLS. These components include all mechanical assemblies and RF cavities. Another part of their job is to