Powered by Deep Web Technologies
Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Energy Information Administration/Monthly Energy Review January 2001 163 Multiple Prefix Symbol  

E-Print Network [OSTI]

Prefixes Energy Source Original Unit multiplied by Conversion Factor equals Final Unit Petroleum barrels feet (ft3 ) a Exact conversion. b Calculated by the Energy Information Administration. Source: U, October 1993), pp. B-10, C-17 and C-21. Table B3. Other Physical Conversion Factors #12;

Kostic, Milivoje M.

2

Practical defenses against BGP prefix hijacking  

Science Journals Connector (OSTI)

Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates an IP prefix that the router does not own, is becoming an increasingly serious security problem on the Internet. In this paper, we conduct a first comprehensive ...

Zheng Zhang; Ying Zhang; Y. Charlie Hu; Z. Morley Mao

2007-12-01T23:59:59.000Z

3

Orphan Prefixes and the Grammaticalization of Aspect in South Slavic  

E-Print Network [OSTI]

This paper establishes the term ORPHAN PREFIX for a Slavic prefix that no longer shares a dominant spatial meaning with its cognate preposition. Most Slavic prefixes do share such a dominant spatial meaning with their ...

Dickey, Stephen M.

2012-01-01T23:59:59.000Z

4

A Taxonomy of Parallel Prefix Networks David Harris  

E-Print Network [OSTI]

A Taxonomy of Parallel Prefix Networks David Harris Harvey Mudd College / Sun Microsystems Laboratories 301 E. Twelfth St. Claremont, CA 91711 David_Harris@hmc.edu Abstract - Parallel prefix networks

Harris, David Money

5

A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS  

E-Print Network [OSTI]

network service during a prefix hijack attack. This thesis proposes a novel framework to provide defense against prefix hijacking which can be offered as a service by Content Distribution Networks and large Internet Service Providers. Our experiments...

Tadi, Krishna C.

2010-01-16T23:59:59.000Z

6

Prefix Caching assisted Periodic Broadcast: Framework and Techniques to Support  

E-Print Network [OSTI]

of popular videos and (ii) choosing appropriate prefix and suffix transmission schemes based on the principle of decoupling the suffix and prefix transmissions from each other. A greedy proxy buffer allocation algorithm. Finally, we present an integrated prefix and suffix transmission scheme such that the client only needs

Massachusetts at Amherst, University of

7

Symbolic Symbolic Computation Stephen M. Watt  

E-Print Network [OSTI]

Symbolic Symbolic Computation Stephen M. Watt University of Western Ontario London, Ontario, Canada www.csd.uwo.ca/watt Abstract Symbolic mathematical computation has become an important tool

Watt, Stephen M.

8

Concealed identification symbols and nondestructive determination of the identification symbols  

DOE Patents [OSTI]

The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

Nance, Thomas A.; Gibbs, Kenneth M.

2014-09-16T23:59:59.000Z

9

An Approximation Algorithm for Constructing Error Detecting Prefix ...  

E-Print Network [OSTI]

Sep 2, 2006 ... Hamming prefix code with an additive error of at most O(log log log n) bits ...... (b) represents both the tree T after the removal of the leaves at.

2006-09-02T23:59:59.000Z

10

Generic implementations of parallel prefix sums and its applications  

E-Print Network [OSTI]

Parallel prefix sums algorithms are one of the simplest and most useful building blocks for constructing parallel algorithms. A generic implementation is valuable because of the wide range of applications for this method. This thesis presents a...

Huang, Tao

2009-05-15T23:59:59.000Z

11

Symbolic dynamics  

E-Print Network [OSTI]

This chapter presents some of the links between automata theory and symbolic dynamics. The emphasis is on two particular points. The first one is the interplay between some particular classes of automata, such as local automata and results on embeddings of shifts of finite type. The second one is the connection between syntactic semigroups and the classification of sofic shifts up to conjugacy.

Béal, M -P; Eilers, S; Perrin, D

2010-01-01T23:59:59.000Z

12

Universality probability of a prefix-free machine  

Science Journals Connector (OSTI)

...d) Universality probability of a machine and a...machine learning, statistics, econometrics, inductive...and in particular the probability of this event (see...7: philosophy of statistics (eds P. S. Bandyopadhyay...Press. Universality probability of a prefix-free...

2012-01-01T23:59:59.000Z

13

Review: Automatic syllabification for Spanish using lemmatization and derivation to solve the prefix's prominence issue  

Science Journals Connector (OSTI)

The syllabification of Spanish's words follows a few basic rules, but the syllabification of some words deviates from the general rules according to a number of factors described in this paper. Prefixes are major cause of variations on syllabification. ... Keywords: Derivation, Lemmatization, Prefix, Syllabification

Zenón Hernández-Figueroa; Francisco J. Carreras-Riudavets; Gustavo Rodríguez-Rodríguez

2013-12-01T23:59:59.000Z

14

A Symbol of Excellence  

Broader source: Energy.gov (indexed) [DOE]

Symbol of Excellence Symbol of Excellence A Symbol of Excellence Every Challenge Home offers a cost-effective, high performance package of energy savings, comfort, health, and durability unparalleled in today's marketplace. Existing Home A Symbol of Excellence This label indicates relative performance of this DOE Challenge Home to existing homes (built between 1990 and 2010) and ENERGY STAR qualified homes. Actual performance may vary. DOE Challenge Home ENERGY STAR Home KEY QUALITY BUILT HEALTHFUL ENVIRONMENT DURABILITY ADVANCED TECHNOLOGY ULTRA EFFICIENT COMFORT PLUS The Future of Housing-Today Only a select group of the top builders in the country meet the extraordinary levels of excellence and quality specified by U.S. Department of Energy guidelines. LEARN MORE AT: buildings.energy.gov/challenge

15

Prefix-like Complexities of Finite and Infinite Sequences on Generalized Turing Machines  

E-Print Network [OSTI]

Prefix-like Complexities of Finite and Infinite Sequences on Generalized Turing Machines Alexey of Finite and Infinite Sequences on Generalized Turing Machines Alexey Chernov J¨urgen Schmidhuber March 2005 Abstract Generalized Turing machines (GTMs) are a variant of non-halting Turing machines

Schmidhuber, Juergen

16

An effective algorithm for mining closed sequential patterns and their minimal generators based on prefix trees  

Science Journals Connector (OSTI)

Sequential generator patterns and closed sequential patterns play an important role in data mining tasks. They are proposed to address difficult problems in mining sequential pattern and have often been used together to generate non-redundant rules. Based on their important role, this paper proposes an efficient algorithm called CloGen for mining closed sequential patterns and their minimal sequential generator patterns. The CloGen algorithm uses the parent-child relationship on prefix tree structure and inserts fields into each node on prefix tree to determine whether that is a minimal sequential generator pattern or closed sequential pattern. Experimental results show that the performance runtime of CloGen algorithm is much faster than that of other algorithms by more than one order of magnitude.

Thi-Thiet Pham; Jiawei Luo; Bay Vo

2013-01-01T23:59:59.000Z

17

Symbolic flattening of DEVS models  

Science Journals Connector (OSTI)

Based on the Classic Discrete Event system Specification (DEVS) formalism, a variety of modelling languages have been proposed to meet the expressiveness and performance requirements of various applications. We propose the Symbolic Flattening ... Keywords: DEVS, direct connection, flattening

Bin Chen; Hans Vangheluwe

2010-07-01T23:59:59.000Z

18

Optimizing the Layout of Proportional Symbol Maps  

E-Print Network [OSTI]

perature at weather stations, etc.). As the name suggests, symbol sizes ..... NOAA Satellite and Information Service. National geophysical data center. http:.

2010-11-10T23:59:59.000Z

19

Hitzler Neural-Symbolic Integration Osnabrck Germany November 2007 Neural-Symbolic Integration  

E-Print Network [OSTI]

Hitzler Neural-Symbolic Integration Osnabrück Germany November 2007 1/49 AIFBAIFB Neural-Symbolic Integration PD Dr. Pascal Hitzler AIFB, Universität Karlsruhe Osnabrück, Germany, November 2007 #12;Hitzler Neural-Symbolic Integration Osnabrück Germany November 2007 2/49 AIFBAIFB PD Dr. Pascal Hitzler

Hitzler, Pascal

20

Symbolic Test Selection Based on Approximate Analysis  

E-Print Network [OSTI]

Symbolic Test Selection Based on Approximate Analysis Bertrand Jeannet, Thierry J´eron, Vlad Rusu}@irisa.fr Abstract. This paper addresses the problem of generating symbolic test cases for testing the conformance. The challenge we consider is the selection of test cases according to a test purpose, which is here a set

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Multiple symbol decoding of differential space-time codes  

E-Print Network [OSTI]

2 A 4 ( 1 p2 e|2 kM ; k = 0;1; ;M 1 ) : a2i+1 = a2i: (2.1) De ne the following matrices: A0 4 2 66 4 a0 a1 a 1 a 0 3 77 5 ; Ai 4 2 66 4 a2i a2i+1 a 2i+1 a 2i 3 77 5 ; for i 1; (2.2) Gi 4 AiAH0 : (2.3) 5 It is easy to see that Ai and Gi... are both orthogonal matrices, i.e., AiAHi = AHi Ai = GiGHi = GHi Gi = I2. Hence, given Gi, Ai can be obtained by Ai = GiA0: (2.4) Also, Gi is always an element of a nite set G. Gi 2 G 4 8> >>: 2 66 4 g 0 0 g 3 77 5 ; 2 66 4 0 g g 0 3 77 5 9...

Singhal, Rohit

2004-09-30T23:59:59.000Z

22

IGS Petroleum Well Symbols--Explanation 12/8/2010 p 1/1 IGS Petroleum Well Symbols--Explanation 6/10/2010 p 1/1  

E-Print Network [OSTI]

IGS Petroleum Well Symbols--Explanation 12/8/2010 p 1/1 IGS Petroleum Well Symbols--Explanation 6/10/2010 p 1/1 The following symbols include all of the primary Petroleum Well Symbols used by the Indiana of the Petroleum Symbol Set. Trenton well; only available information is an uncertain location Symbol Modifiers

Polly, David

23

Property:StockSymbol | Open Energy Information  

Open Energy Info (EERE)

StockSymbol StockSymbol Jump to: navigation, search This is a property of type String. Pages using the property "StockSymbol" Showing 25 pages using this property. (previous 25) (next 25) A A.O. Smith + AOS + AAON + AAON + Alterra Power + MGMXF + Ameresco, Inc. + AMRC + Applied Materials + AMAT + Archer Daniels Midland + ADM + Autodesk + ADSK + C China Integrated Energy + CBEH + E EEMAP, Inc. + N/A + EnerNOC + ENOC + Evergreen Solar, Inc. + ESLR + ExxonMobil + XOM + G General Electric + GE + Geothermal Resources Council + Geothermal Resources Council + Goodwill Instrument + TPE 2423 + GreenShift Corporation + GERS.OB + Gulfsands Petroleum + AIM:GPX + H Helix Wind Corp. + HLXW + I ICF International + NASDAQ:ICFI + J Johnson Controls + JCI + M Molycorp Inc. + MCP +

24

Functional Decomposition of Symbolic Polynomials Stephen M. Watt  

E-Print Network [OSTI]

Functional Decomposition of Symbolic Polynomials Stephen M. Watt Ontario Research CentreB7 watt@uwo.ca Abstract Earlier work has presented algorithms to factor and compute GCDs of symbolic

Watt, Stephen M.

25

Automatically Generating Symbolic Prefetches for Distributed Transactional Memories  

E-Print Network [OSTI]

Automatically Generating Symbolic Prefetches for Distributed Transactional Memories Alokika Dash static compiler analysis that can automatically generate symbolic prefetches for distributed applications and Brian Demsky University of California, Irvine Abstract. Developing efficient distributed applications

Boyer, Edmond

26

Mathematics for Chemistry with Symbolic Computation  

E-Print Network [OSTI]

Mathematics for Chemistry with Symbolic Computation J. F. Ogilvie @ 2013 February 8 The software to explain their purposes and effects, but particularly to introduce mathematical concepts and principles and to implement the mathematical operations. These assignments and commands are generally intended to be executed

27

The Ideal Transformer Description and Circuit Symbol  

E-Print Network [OSTI]

The Ideal Transformer Description and Circuit Symbol As with all the other circuit elements, there is a physical transformer commonly used in circuits whose behavior can be discussed in great detail. However, in many cases the practical transformer can be adequately approximated by the "ideal transformer," which

King, Roger

28

Measuring symbol and icon characteristics: Norms for concreteness, complexity, meaningfulness, familiarity, and semantic distance for 239 symbols  

Science Journals Connector (OSTI)

This paper provides rating norms for a set of symbols and icons selected from a wide variety of sources....

Siné J. P. Mcdougall; Martin B. Curry…

1999-09-01T23:59:59.000Z

29

Analytica – An Experiment in Combining Theorem Proving and Symbolic Computation  

Science Journals Connector (OSTI)

Analytica is an automatic theorem prover for theorems in elementary analysis. The prover is written in the Mathematica language and runs in the Mathematica environment. The goal of the project is to use a powerful symbolic computation system to prove ... Keywords: Analytica, Mathematica, computer algebra, symbolic computation, theorem proving

Andrej Bauer; Edmund Clarke; Xudong Zhao

1998-12-01T23:59:59.000Z

30

Building Symbol Libraries with Autodesk MapGuide Enterprise  

E-Print Network [OSTI]

Building Symbol Libraries with Autodesk MapGuide® Enterprise Robert Bray ­ Autodesk, Inc. GS404-2 Autodesk MapGuide Enterprise introduces a new symbolization engine that allows users to define custom technologies since 1997, and is now the Lead Architect of Geospatial Product Development at Autodesk. He has

Ahmad, Sajjad

31

Symbolic Polynomials with Sparse Exponents Stephen M. Watt  

E-Print Network [OSTI]

Symbolic Polynomials with Sparse Exponents Stephen M. Watt Ontario Research Centre for Computer Algebra Department of Computer Science, University of Western Ontario London Ontario, CANADA N6A 5B7 watt

Watt, Stephen M.

32

Espbase: A microsoft access tool for selecting symbol and icon sets for usability  

Science Journals Connector (OSTI)

The ESPbase provides a tool for storing symbols and icons along with information about their characteristics. Information ... complexity, familiarity, and meaningfulness. Symbols and icons can be accessed on the ...

Oscar de Bruijn; Siné McDougall…

1999-09-01T23:59:59.000Z

33

White House Solar Panels Are a Symbol of Solar's Progress | Department...  

Broader source: Energy.gov (indexed) [DOE]

Solar Panels Are a Symbol of Solar's Progress White House Solar Panels Are a Symbol of Solar's Progress May 13, 2014 - 12:02pm Addthis An insider look at the White House rooftop...

34

Efficient Symbolic Detection of Global Properties in Distributed Systems  

E-Print Network [OSTI]

to total orders containing the happened­before relation. A consistent global state (CGS) of a computation cEfficient Symbolic Detection of Global Properties in Distributed Systems Scott D. Stoller a global state satisfying property \\Phi. Previous general­purpose algorithms for this problem explicitly

Stoller, Scott

35

COGNITIVE SCIENCE 17, 49-59 (1993) Situativity and Symbols  

E-Print Network [OSTI]

COGNITIVE SCIENCE 17, 49-59 (1993) Situativity and Symbols: Response to Vera and Simon JAMES G that emphasizes the situated character of action, including cognition and learning. A full discussion; Hutchins, 1990,1991; Laboratory of Comparative Human Cognition, 1983; Lave, 1988; Lave & Wenger, 1991

Coulson, Seana

36

Speculative Image Computation for Distributed Symbolic Reachability Analysis  

Science Journals Connector (OSTI)

......targets with S speeds on a grid represented as a X Y Z grid. N is the value of Z...workstations for sequential SmArT (SEQ) [11] and the...encoded by the MDD does not benefit much from symbolic encoding...stochastic modeling with SMART. Performance Evaluation......

Ming-Ying Chung; Gianfranco Ciardo

2011-02-01T23:59:59.000Z

37

Introduction to Symbolic Computation: a Maple/MATLAB Course  

E-Print Network [OSTI]

Introduction to Symbolic Computation: a Maple/MATLAB Course Jan Verschelde 17 May 2005 Abstract by "Numerical Analysis" (MCS 471). In numerical analysis, Maple and MATLAB are frequently used to illustrate numerical algorithms and to facilitate computer projects. As MCS 320 introduces students to programming

Verschelde, Jan

38

Type-dependence Analysis and Program Transformation for Symbolic Execution  

E-Print Network [OSTI]

decision procedure is incapable of (or inefficient in) handling the types of constraints produced during Orso, and Mary Jean Harrold College of Computing, Georgia Institute of Technology {saswat,orso,harrold}@cc.gatech.edu Abstract. Symbolic execution can be problematic when applied to real applications. This paper addresses two

Pratt, Vaughan

39

Identifying delayed directional couplings with symbolic transfer entropy  

Science Journals Connector (OSTI)

We propose a straightforward extension of symbolic transfer entropy to enable the investigation of delayed directional relationships between coupled dynamical systems from time series. Analyzing time series from chaotic model systems, we demonstrate the applicability and limitations of our approach. Our findings obtained from applying our method to infer delayed directed interactions in the human epileptic brain underline the importance of our approach for improving the construction of functional network structures from data.

Henning Dickten and Klaus Lehnertz

2014-12-08T23:59:59.000Z

40

A Symbolic Methodology To Improve Disassembly Process Design  

Science Journals Connector (OSTI)

School of Industrial Engineering and Department of Chemistry, Purdue University, 315 North Grant Street, West Lafayette, Indiana 47907-2023 ... With a sample of 71 different computers, printers, and monitors, we demonstrate that appropriate symbols reduce the total disassembly planning time by 13.2 min. ... The present work focuses on the electronics housing as a design characteristic common to computing, media, and kitchen electronics as well as appliances and other equipment. ...

Pedro Rios; Leslie Blyler; Lisa Tieman; Julie Ann Stuart; Ed Grant

2003-10-31T23:59:59.000Z

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Nominal symbols and their contribution to selected Guardian essays  

E-Print Network [OSTI]

: Dr. Harry P. Kroitor Nominal symbols were commonly used in periodical essays during the seventeenth and eighteenth centuries and the Guardian, written primarily by Sir Richard Steele and Joseph Addison, is no exception. Characters... times, to eighteenth-century British essayists, the name often made the man. In the Guardian, a series of 175 essays presented by the controlling persona Nestor Ironside and written by Sir Richard Steele, Joseph Addison, and some...

Dunsford, Deborah Williams

1987-01-01T23:59:59.000Z

42

Hamilton Operators, Discrete Symmetries, Brute Force and SymbolicC++  

E-Print Network [OSTI]

To find the discrete symmetries of a Hamilton operator $\\hat H$ is of central importance in quantum theory. Here we describe and implement a brute force method to determine the discrete symmetries given by permutation matrices for Hamilton operators acting in a finite-dimensional Hilbert space. Spin and Fermi systems are considered as examples. A computer algebra implementation in SymbolicC++ is provided.

Willi-Hans Steeb; Yorick Hardy

2012-08-23T23:59:59.000Z

43

Similarity retrieval of symbolic images with multiple instances of iconic objects: A novel approach  

E-Print Network [OSTI]

Guru,D.S. Punitha,P. Fourth Indian Conference on Computer Vision, Graphics and Image Processing ICVGIP-2004 pp 417 - 422

Guru, D.S.; Punitha, P.; Fourth Indian Conference on Computer Vision, Graphics and Image Processing ICVGIP-2004 pp 417 - 422 [More Details

44

Figure 1: IPA symbols [wikipedia]. Unvoiced Consonants Voiced Consonants Vowels  

E-Print Network [OSTI]

Figure 1: IPA symbols [wikipedia]. Unvoiced Consonants Voiced Consonants Vowels Example Dbet IPA/at H û Example Dbet IPA /th/is D D /b/ee b b /d/og d d /g/ab g g /j/udge J � /l/ook l l /m/an m m /n/ap n n /r/eal r r plea/s/ure Z Z si/ng/ G N /v/ow v v /w/in w w /y/ou y j /z/oo z z Example Dbet IPA L

Allen, Jont

45

Khalil W., Creusot D., "SYMORO+: a system for the symbolic modelling of robots", Robotica, Vol. 15, 1997, p. 153-161. SYMORO+: A SYSTEM FOR THE SYMBOLIC  

E-Print Network [OSTI]

-1- Khalil W., Creusot D., "SYMORO+: a system for the symbolic modelling of robots", Robotica, Vol-00401687,version1-3Jul2009 Author manuscript, published in "Robotica 15 (1997) 153-161" #12

Paris-Sud XI, Université de

46

SymbolChat: A flexible picture-based communication platform for users with intellectual disabilities  

Science Journals Connector (OSTI)

......the folder icons on top of the symbol grid. The symbol category view (area 3...Technology and Innovation in the Do it Yourself Smart Experiences Project (). We would like...Journal of Assistive Technology Outcomes and Benefits (2004) 1(1):57-66. Picture Communication......

Tuuli Keskinen; Tomi Heimonen; Markku Turunen; Juha-Pekka Rajaniemi; Sami Kauppinen

2012-09-01T23:59:59.000Z

47

AAAI Spring Symposium 2002, Sketch Understanding. Recognizing Multi-Stroke Symbols  

E-Print Network [OSTI]

AAAI Spring Symposium 2002, Sketch Understanding. Recognizing Multi-Stroke Symbols Chris Calhoun for multi-stroke symbols. The learned definitions are described in terms of the constituent geometric can be drawn in the same pen stroke. Pen speed and curvature are used to segment a stroke into its con

Kara, Levent Burak

48

Robinson et al. Challenges for Map Symbol Standardization Proceedings of the 7th  

E-Print Network [OSTI]

Robinson et al. Challenges for Map Symbol Standardization Proceedings of the 7th International ISCRAM Conference ­ Seattle, USA, May 2010 1 Challenges for Map Symbol Standardization in Crisis situation can readily understand what they are seeing on these maps. Standardizing map symbology is one

Klippel, Alexander

49

From Icons to Symbols: Some Speculations on the Origins of Language*  

E-Print Network [OSTI]

From Icons to Symbols: Some Speculations on the Origins of Language* ROBERT N. BRANDON and NORBERT. In the first section we offer a retooling of some traditional concepts, namely icons and symbols, which allows in section 2. KEY WORDS: Phylogenetic icons, heritability, phenotypic plasticity, phenotypic trans- mission

50

APPLICATION OF SYMBOLIC PIECEWISE AGGREGATE APPROXIMATION (PAA) ANALYSIS TO ECG SIGNALS  

E-Print Network [OSTI]

APPLICATION OF SYMBOLIC PIECEWISE AGGREGATE APPROXIMATION (PAA) ANALYSIS TO ECG SIGNALS Burcu) with Piecewise Aggregate Approximation (PAA). The same ECG series is symbolized first by PLA and then PAA. Coarsing the series by PLA proved to be more problematic than PAA. At coarser scales, details are lost

Kumova, Bora

51

Multi-class Protein Fold Recognition Through a Symbolic-Statistical Framework  

E-Print Network [OSTI]

Multi-class Protein Fold Recognition Through a Symbolic-Statistical Framework Marenglen Biba, University of Bari, Italy {biba,esposito,ferilli,basile,ndm}@di.uniba.it Abstract. Protein fold recognition to a multi-class protein fold recognition problem. We compare the proposed approach to a symbolic

Di Mauro, Nicola

52

NE-20 ACTION: SSDP Project Charter Revision CONCURRENCES RTG SYMBOL  

Office of Legacy Management (LM)

0 0 ACTION: SSDP Project Charter Revision CONCURRENCES RTG SYMBOL James W. Vaughan, Jr. N-923 Acting Assistant Secretary . for Nuclear Energy Murphi Attached for your signature is a revised Project Charter for the 1/ 86 Shippingport Station Decommissioning Project (SSDP). Since our original M determination in July that there was a need to revise the SSDP Charter, we N K23 have been in discussion with the Richland Operations Field Office (RL). INe Significant differences in management philosophy surfaced between RL and DeLaney Headquarters that required discussions up to and including the RL Manager DAE/86 and myself. I now feel that the revised Charter reflects a mutually acceptable working arrangement between the appropriate organizations. The RTGSYMBOL general roles and responsibilities defined in this Charter will facilitate

53

CONCURRENC RTG. SYMBOL GC-34 Ms. Mary Beth Brado  

Office of Legacy Management (LM)

MAY 2 9 1980 MAY 2 9 1980 CONCURRENC RTG. SYMBOL GC-34 Ms. Mary Beth Brado "*N'W Town of Lewiston * i..,! 1375 Ridge Road ^r'8 Lewiston, New York 14092 RTG.SYuBOL Dear Ms. Brado: .- ,l13. INirIA Lss iQ. W'Mott This is in response to your letter of January 29, 1980, and subsequent ..... ,. telephone discussions with irr. Brazley of my office, concerning land use 5/ /8 restrictions on the 1,511 acres declared surplus in the Towns of Lewiston RGSYMOL. and Porter, New York. In regard to your question of land use restriction and its application to the surplus land in the Lewiston area, our Office of General Counsel deter- DATE'- mined that the Department of Energy does not have the authority to restrict any land use or development of the property in question. Such authority nrTG SYMOL

54

Conversion Tables  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Carbon Dioxide Information Analysis Center - Conversion Tables Carbon Dioxide Information Analysis Center - Conversion Tables Contents taken from Glossary: Carbon Dioxide and Climate, 1990. ORNL/CDIAC-39, Carbon Dioxide Information Analysis Center, Oak Ridge National Laboratory, Oak Ridge, Tennessee. Third Edition. Edited by: Fred O'Hara Jr. 1 - International System of Units (SI) Prefixes 2 - Useful Quantities in CO2 3 - Common Conversion Factors 4 - Common Energy Unit Conversion Factors 5 - Geologic Time Scales 6 - Factors and Units for Calculating Annual CO2 Emissions Using Global Fuel Production Data Table 1. International System of Units (SI) Prefixes Prefix SI Symbol Multiplication Factor exa E 1018 peta P 1015 tera T 1012 giga G 109 mega M 106 kilo k 103 hecto h 102 deka da 10 deci d 10-1 centi c 10-2

55

A Note on the Functional Decomposition of Symbolic Polynomials Stephen M. Watt  

E-Print Network [OSTI]

A Note on the Functional Decomposition of Symbolic Polynomials Stephen M. Watt Ontario Research, CANADA N6A 5B7 watt@uwo.ca It often arises that the general form of a polynomial is known

Watt, Stephen M.

56

Online Recognition of Multi-Stroke Symbols with Orthogonal Series Oleg Golubitsky Stephen M. Watt  

E-Print Network [OSTI]

Online Recognition of Multi-Stroke Symbols with Orthogonal Series Oleg Golubitsky Stephen M. Watt Department of Computer Science University of Western Ontario London, Ontario, Canada N6A 5B7 {ogolubit,watt

Watt, Stephen M.

57

SPARSE EXPONENTS IN SYMBOLIC POLYNOMIALS MATTHEW MALENFANT AND STEPHEN M. WATT  

E-Print Network [OSTI]

SPARSE EXPONENTS IN SYMBOLIC POLYNOMIALS MATTHEW MALENFANT AND STEPHEN M. WATT Abstract. We.M. WATT The algorithms fall into two families: algebraic extension methods and projec- tion methods

Watt, Stephen M.

58

Hybrid Mathematical Symbol Recognition using Support Vector Machines Birendra Keshari and Stephen M. Watt  

E-Print Network [OSTI]

. Watt Department of Computer Science University of Western Ontario London, Ontario, Canada N6A 5B7 {bkeshari,watt}@orcca.on.ca Abstract Recognition of mathematical symbols is a challenging task, with a large

Watt, Stephen M.

59

RECOGNITION FOR LARGE SETS OF HANDWRITTEN MATHEMATICAL SYMBOLS Stephen M. Watt and Xiaofang Xie  

E-Print Network [OSTI]

RECOGNITION FOR LARGE SETS OF HANDWRITTEN MATHEMATICAL SYMBOLS Stephen M. Watt and Xiaofang Xie Dept. of Computer Science University of Western Ontario London Ontario, Canada N6A 5B7 {watt

Watt, Stephen M.

60

A Statistical and Structural Approach for Symbol Recognition, Using XML Modelling  

Science Journals Connector (OSTI)

This paper deals with the problem of symbol recognition in technical document interpretation. We present a system using a statistical and structural approach. This system uses two interpretation levels. In a first level, the system extracts and recognizes ...

Mathieu Delalandre; Pierre Héroux; Sébastien Adam; Eric Trupin; Jean-Marc Ogier

2002-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Physica D 154 (2001) 259286 What symbolic dynamics do we get with a misplaced partition?  

E-Print Network [OSTI]

-uniqueness. Interestingly, we find topological entropy as a function of misplacement to be devil's staircase; 95.10.Fh Keywords: Symbol dynamics; Topological entropy; Kneading theory; Devil's staircase 1

Lai, Ying-Cheng

62

LS-145 STANDARD SYMBOLS FOR UNITS OF MEASURE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5 5 STANDARD SYMBOLS FOR UNITS OF MEASURE ____________________________________________________________________________________ AIP IEEE CDR APS ____________________________________________________________________________________ ampere A A A A ampere hour Ah Ah A·h A·h ampere turn At A A At angstrom A · A · Å atmosphere, std atm atm atm atm atomic mass unit amu u amu atomic percent at.% - at.% atomic unit a.u. - a.u. atomic weight at.wt. - at.wt. bar bar bar bar bar British Thermal Unit Btu Btu Btu calorie (cgs) cal cal cal centimeter cm cm cm cm coulomb C C C C cubic centimeter cm 3 cm 3 cm 3 cycles per second Hz, cps, Hz, c/s Hz Hz c/s, c/sec cubic meter m 3 m 3 decibel dB dB dB dB decibel above 1 mW dBm - dBm degree (plane angle) ...°, deg ...° ...°,deg ...°, deg degree Celsius °C °C °C °C degree Fahrenheit °F °F °F °F electromagnetic unit

63

Product symbolic status: development of a scale to assess different product types  

E-Print Network [OSTI]

for the degree of DOCTOR OF PHILOSOPHY Approved by: Chair of Committee, Charles D. Samuelson Committee Members, Stephanie C. Payne Larry G. Gresham James H. Leigh Head of Department, William S. Rholes August 2005 Major... International University Chair of Advisory Committee: Dr. Charles Samuelson The literature on status, product symbolism, product involvement, and reference group influence is reviewed to conceptually define the Product Symbolic Status construct...

Wright, James Arthur

2006-10-30T23:59:59.000Z

64

A Symbol of Uniqueness: The Cluster Bootstrap for the 3-Loop MHV Heptagon  

E-Print Network [OSTI]

Seven-particle scattering amplitudes in planar super-Yang-Mills theory are believed to belong to a special class of generalised polylogarithm functions called heptagon functions. These are functions with physical branch cuts whose symbols may be written in terms of the 42 cluster A-coordinates on Gr(4,7). Motivated by the success of the hexagon bootstrap programme for constructing six-particle amplitudes we initiate the systematic study of the symbols of heptagon functions. We find that there is exactly one such symbol of weight six which satisfies the MHV last-entry condition and is finite in the $7 \\parallel 6$ collinear limit. This unique symbol is both dihedral and parity-symmetric, and remarkably its collinear limit is exactly the symbol of the three-loop six-particle MHV amplitude, although none of these properties were assumed a priori. It must therefore be the symbol of the three-loop seven-particle MHV amplitude. The simplicity of its construction suggests that the n-gon bootstrap may be surprisingly powerful for n>6.

James M. Drummond; Georgios Papathanasiou; Marcus Spradlin

2014-12-11T23:59:59.000Z

65

Combining Explicit and Symbolic Approaches for Better On-the-Fly LTL Model Checking  

E-Print Network [OSTI]

We present two new hybrid techniques that replace the synchronized product used in the automata-theoretic approach for LTL model checking. The proposed products are explicit graphs of aggregates (symbolic sets of states) that can be interpreted as B\\"uchi automata. These hybrid approaches allow on the one hand to use classical emptiness-check algorithms and build the graph on-the-fly, and on the other hand, to have a compact encoding of the state space thanks to the symbolic representation of the aggregates. The Symbolic Observation Product assumes a globally stuttering property (e.g., LTL \\ X) to aggregate states. The Self-Loop Aggregation Product} does not require the property to be globally stuttering (i.e., it can tackle full LTL), but dynamically detects and exploits a form of stuttering where possible. Our experiments show that these two variants, while incomparable with each other, can outperform other existing approaches.

Duret-Lutz, Alexandre; Poitrenaud, Denis; Thierry-Mieg, Yann

2011-01-01T23:59:59.000Z

66

A simple approach to lifetime learning in genetic programming-based symbolic regression  

Science Journals Connector (OSTI)

Genetic programming GP coarsely models natural evolution to evolve computer programs. Unlike in nature, where individuals can often improve their fitness through lifetime experience, the fitness of GP individuals generally does not change during their ... Keywords: Genetic programming, hybrid genetic algorithms, lifetime learning, local search, memetic algorithms, symbolic regression

Raja Muhammad Atif Azad; Conor Ryan

2014-06-01T23:59:59.000Z

67

1 Copyright 2010 by ASME ROLE OF AUTOMATED SYMBOLIC GENERATION OF EQUATIONS OF MOTION IN  

E-Print Network [OSTI]

-efficient simulation models are vital for rapid design-refinement through iterative simulation- based parametric 1 Copyright © 2010 by ASME ROLE OF AUTOMATED SYMBOLIC GENERATION OF EQUATIONS OF MOTION-Multi-Body-Systems (AMBS) used in various applications. There is also increased interest in the model-based design

Krovi, Venkat

68

The effectiveness of portfolios in assessing students' connections between mathematical symbols and mathematical concepts  

E-Print Network [OSTI]

fulfillment of the requirements for the degree of MASTER OF SCIENCE August 1995 Major Subject: Educational Curriculum k Instruction THE EFFECTIVENESS OF PORTFOLIOS IN ASSESSING STUDENTS' CONNECTIONS BETWEEN MATHEMATICAL SYMBOLS AND MATHEMATICAL CONCEPTS.... Dockweiler (Mender) Gonzalo Garcia, Jr. (Member) Donna Wiseman (Head of Department) August 1995 Major Subject: Educational Curriculum & Instruction ABSTRACT The EfFectiveness of Portfolios in Assessing Students' Connections Between Mathematical...

McGinnis, Leslie Grable

1995-01-01T23:59:59.000Z

69

Symbolic Dynamic Programming for Discrete and Continuous State MDPs Scott Sanner  

E-Print Network [OSTI]

k + xi > 100 : 0 If our objective is to maximize the long-term value V (i.e., the sum of rewardsSymbolic Dynamic Programming for Discrete and Continuous State MDPs Scott Sanner NICTA & the ANU-theoretic planning for DC- MDPs, optimal solutions have only been defined so far for limited settings, e.g., DC

Sanner, Scott

70

Symbolic Variable Elimination for Discrete and Continuous Graphical Models Scott Sanner  

E-Print Network [OSTI]

Symbolic Variable Elimination for Discrete and Continuous Graphical Models Scott Sanner NICTA & ANU, e.g., estimating the position and pose of entities from measurements in robotics, or radar track Intelligence (www.aaai.org). All rights reserved. n xx1 ...x2 d 10 d 0 100 P(d) = P(x |d) = d x i i Figure 1

Sanner, Scott

71

Symbol-Anchoring in Cassie Stuart C. Shapiro and Haythem O. Ismail  

E-Print Network [OSTI]

Symbol-Anchoring in Cassie Stuart C. Shapiro and Haythem O. Ismail #3; Department of Computer engaged in a series of projects in which Cassie, the SNePS cognitive agent (Shapiro & Rapa- port 1987; Shapiro 1989; Shapiro & Rapaport 1991; 1992; Shapiro 1998; Shapiro & The SNePS Implemen- tation Group 1999

Shapiro, Stuart C.

72

Symbol-Anchoring in Cassie Stuart C. Shapiro and Haythem O. Ismail  

E-Print Network [OSTI]

Symbol-Anchoring in Cassie Stuart C. Shapiro and Haythem O. Ismail Department of Computer Science York Buffalo, NY 14260-2000 {shapiro | hismail}@cse.buffalo.edu Abstract We have been engaged engaged in a series of projects in which Cassie, the SNePS cognitive agent (Shapiro & Rapa- port 1987

Shapiro, Stuart C.

73

MCS 320 Introduction to Symbolic Computation Spring 2011 Maple Lecture 2. Getting Started and Getting Help  

E-Print Network [OSTI]

and Getting Help In this lecture we show how to use Maple as a calculator and explore the extensive help 1 #12;MCS 320 Introduction to Symbolic Computation Spring 2011 2.2 Getting Help Maple can be quite overwhelming to the novice. Navigating through the help browser shows the structure of the software system

Verschelde, Jan

74

Decoupling Synchronization from Logic for Efficient Symbolic Model Checking of Statecharts  

E-Print Network [OSTI]

98195­2350, U.S.A. +1­206­543­1695 {wchan,anderson,beame,notkin}@cs.washington.edu \\Lambda The Boeing Company, Seattle, U.S.A. {david.h.jones,william.e.warner}@boeing.com ABSTRACT Symbolic model checking system developed by the Boeing Commercial Airplane Group. The results disclosed subtle modeling

Beame, Paul

75

Mining Massive Archives of Mice Sounds with Symbolized Representations Jesin Zakaria1  

E-Print Network [OSTI]

Mining Massive Archives of Mice Sounds with Symbolized Representations Jesin Zakaria1 Sarah that the time is ripe for archives of mice songs to fall into the purview of data mining. We show a novel technique for mining mice vocalizations directly in the visual (spectrogram) space that practitioners

Zordan, Victor

76

Scalable continuous range monitoring of moving objects in symbolic indoor space  

Science Journals Connector (OSTI)

Indoor spaces accommodate large populations of individuals. The continuous range monitoring of such objects can be used as a foundation for a wide variety of applications, e.g., space planning, way finding, and security. Indoor space differs from outdoor ... Keywords: continuous range, indoor moving objects, symbolic indoor space

Bin Yang; Hua Lu; Christian S. Jensen

2009-11-01T23:59:59.000Z

77

High-Coverage Symbolic Patch Testing Paul Dan Marinescu and Cristian Cadar  

E-Print Network [OSTI]

High-Coverage Symbolic Patch Testing Paul Dan Marinescu and Cristian Cadar Department of Computing patches are often poorly tested, with many of them containing faults that affect the correct operation to increase the quality of patches by providing developers with an automated mechanism for generating a set

Cadar, Cristian

78

1d-SAX : a Novel Symbolic Representation for Time Series  

E-Print Network [OSTI]

approximation (APCA), piecewise aggregate approximation (PAA), etc (see [1] for a survey). Symbolic methods have success. SAX is based on PAA and assumes that PAA values follow a Gaussian distribution. SAX discretizes PAA values according to equal-sized areas under the Gaussian curve yielding so-called breakpoints

Paris-Sud XI, Université de

79

MRA-Wavelet subspace architecture for logic, probability, and symbolic sequence processing  

E-Print Network [OSTI]

The linear subspaces of a multiresolution analysis (MRA) and the linear subspaces of the wavelet analysis induced by the MRA, together with the set inclusion relation, form a very special lattice of subspaces which herein is called a "primorial lattice". This paper introduces an operator R that extracts a set of 2^{N-1} element Boolean lattices from a 2^N element Boolean lattice. Used recursively, a sequence of Boolean lattices with decreasing order is generated---a structure that is similar to an MRA. A second operator, which is a special case of a "difference operator", is introduced that operates on consecutive Boolean lattices L_2^n and L_2^{n-1} to produce a sequence of orthocomplemented lattices. These two sequences, together with the subset ordering relation, form a primorial lattice P. A logic or probability constructed on a Boolean lattice L_2^N likewise induces a primorial lattice P. Such a logic or probability can then be rendered at N different "resolutions" by selecting any one of the N Boolean lattices in P and at N different "frequencies" by selecting any of the N different orthocomplemented lattices in P. Furthermore, P can be used for symbolic sequence analysis by projecting sequences of symbols onto the sublattices in P using one of three lattice projectors introduced. P can be used for symbolic sequence processing by judicious rejection and selection of projected sequences. Examples of symbolic sequences include sequences of logic values, sequences of probabilistic events, and genomic sequences (as used in "genomic signal processing").

Daniel J. Greenhoe

2014-10-13T23:59:59.000Z

80

Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption  

E-Print Network [OSTI]

protocols in which the parties are allowed to use ideal functionalities as well as a set of powerful on the other hand this abstraction may make us "forget" about issues that make an attack possible. One solution version. Or, in other words, that intuitively the symbolic adversary is as powerful as the computational

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Fault Tolerant Planning: Toward Probabilistic Uncertainty Models in Symbolic Non-Deterministic Planning  

E-Print Network [OSTI]

, but for quite different reasons. The main advantage of MDP solving is the high expressive power of the domain of probability distributions over these states. This allows powerful symbolic search methods based on Binary model of action effects. The current solution classes are suitable when a pure disjunctive model

Veloso, Manuela M.

82

,"Program Source/ Treasury Account Symbol: Agency Code","Program Source/Treasury Account Symbol: Account Code","Program Source/Treasury Account Symbol; Sub-Account Code (OPTIONAL)","Program Description (Account Title)","Total Appropriation","Total Obligations","Total Disbursements"  

Broader source: Energy.gov (indexed) [DOE]

85 85 ,"Submitter Name:","David Abercrombie" ,"Submitter Contact Info:","David.Abercrombie@hq.doe.gov" ,"Program Source/ Treasury Account Symbol: Agency Code","Program Source/Treasury Account Symbol: Account Code","Program Source/Treasury Account Symbol; Sub-Account Code (OPTIONAL)","Program Description (Account Title)","Total Appropriation","Total Obligations","Total Disbursements" 1,89,211,"N/A","Fossil Energy Research and Development, Recovery Act",3400000000,0,0 2,89,227,"N/A","Science, Recovery Act",1600000000,0,0 3,89,237,"N/A","Office of the Inspector General, Recovery Act",15000000,0,0

83

,"Program Source/ Treasury Account Symbol: Agency Code","Program Source/Treasury Account Symbol: Account Code","Program Source/Treasury Account Symbol; Sub-Account Code (OPTIONAL)","Program Description (Account Title)","Total Appropriation","Total Obligations","Total Disbursements"  

Broader source: Energy.gov (indexed) [DOE]

78 78 ,"Submitter Name:","David Abercrombie" ,"Submitter Contact Info:","David.Abercrombie@hq.doe.gov" ,"Program Source/ Treasury Account Symbol: Agency Code","Program Source/Treasury Account Symbol: Account Code","Program Source/Treasury Account Symbol; Sub-Account Code (OPTIONAL)","Program Description (Account Title)","Total Appropriation","Total Obligations","Total Disbursements" 1,89,211,"N/A","Fossil Energy Research and Development, Recovery Act",3400000000 2,89,227,"N/A","Science, Recovery Act",1600000000 3,89,237,"N/A","Office of the Inspector General, Recovery Act",15000000 4,89,253,"N/A","Defense Environmental Cleanup, Recovery Act",5127000000

84

Coherent states, 6j symbols and properties of the next to leading order asymptotic expansions  

SciTech Connect (OSTI)

We present the first complete derivation of the well-known asymptotic expansion of the SU(2) 6j symbol using a coherent state approach, in particular we succeed in computing the determinant of the Hessian matrix. To do so, we smear the coherent states and perform a partial stationary point analysis with respect to the smearing parameters. This allows us to transform the variables from group elements to dihedral angles of a tetrahedron resulting in an effective action, which coincides with the action of first order Regge calculus associated to a tetrahedron. To perform the remaining stationary point analysis, we compute its Hessian matrix and obtain the correct measure factor. Furthermore, we expand the discussion of the asymptotic formula to next to leading order terms, prove some of their properties and derive a recursion relation for the full 6j symbol.

Kami?ski, Wojciech, E-mail: wkaminsk@fuw.edu.pl [Wydzia? Fizyki, Uniwersytet Warszawski, Ho?a 69, 00-681, Warsaw (Poland) [Wydzia? Fizyki, Uniwersytet Warszawski, Ho?a 69, 00-681, Warsaw (Poland); Perimeter Institute for Theoretical Physics, 31 Caroline Street North, Waterloo, Ontario N2L 2Y5 (Canada); Max Planck Institute for Gravitational Physics, Am Mühlenberg 1, D-14476 Potsdam (Germany); Steinhaus, Sebastian, E-mail: steinhaus.sebastian@gmail.com [Perimeter Institute for Theoretical Physics, 31 Caroline Street North, Waterloo, Ontario N2L 2Y5 (Canada) [Perimeter Institute for Theoretical Physics, 31 Caroline Street North, Waterloo, Ontario N2L 2Y5 (Canada); Max Planck Institute for Gravitational Physics, Am Mühlenberg 1, D-14476 Potsdam (Germany)

2013-12-15T23:59:59.000Z

85

Name Address Place Zip Sector Product Stock Symbol Year founded Number  

Open Energy Info (EERE)

Address Place Zip Sector Product Stock Symbol Year founded Number Address Place Zip Sector Product Stock Symbol Year founded Number of employees Number of employees Telephone number Website Coordinates Region ABS Alaskan Inc Van Horn Rd Fairbanks Alaska Gateway Solar Wind energy Marine and Hydrokinetic Solar PV Solar thermal Wind Hydro Small scale wind turbine up to kW and solar systems distributor http www absak com United States AER NY Kinetics LLC PO Box Entrance Avenue Ogdensburg Marine and Hydrokinetic United States AW Energy Lars Sonckin kaari Espoo FI Marine and Hydrokinetic http www aw energy com Finland AWS Ocean Energy formerly Oceanergia Redshank House Alness Point Business Park Alness Ross shire IV17 UP Marine and Hydrokinetic http www awsocean com United Kingdom Able Technologies Audubon Road Englewood Marine and Hydrokinetic http

86

Attractor Spaces as Modules: A Semi-Eliminative Reduction of Symbolic AI to Dynamic Systems Theory  

Science Journals Connector (OSTI)

I propose a semi-eliminative reduction of Fodor's concept of module to the concept of attractor basin which is used in Cognitive Dynamic Systems Theory (DST). I show how attractor basins perform the same explanatory function as modules in several DST ... Keywords: Central Pattern Generator, Dynamic Systems Theory, Fodor, GOFAI, Kelso, Mezernich and Kaas, Port, Thelen and Smith, Van Gelder, Walter Freeman, animal locomotion, attractor spaces, bifurcations, collective variable, connectionism, distributed processing, invariant sets, modularity, orbit, symbolic systems hypothesis

Teed Rockwell

2005-02-01T23:59:59.000Z

87

Transverse electric scattering on inhomogeneous objects: Singular integral equation, symbol of the operator, and matrix elements  

E-Print Network [OSTI]

This is a companion report for the paper "Transverse electric scattering on inhomogeneous objects: Spectrum of integral operator and preconditioning" by the present authors. In this report we formulate the two-dimensional transverse electric scattering problem as a standard singular integral equation, derive the symbol of the integral operator for H\\"older-continuous contrasts, and calculate the elements of the system matrix obtained after discretization via the mid-point rule.

Zouros, Grigorios P

2011-01-01T23:59:59.000Z

88

Modular symbols for reductive groups and p-adic Rankin-Selberg convolutions over number fields  

E-Print Network [OSTI]

We give a construction of a wide class of modular symbols attached to reductive groups. As an application we construct a p-adic distribution interpolating the special values of the twisted Rankin-Selberg L-function attached to cuspidal automorphic representations of GL(n) and GL(n-1) over number fields. If the representations are ordinary at p, our distribution is bounded and gives rise to a p-adic L-function.

Januszewski, Fabian

2009-01-01T23:59:59.000Z

89

A Complete Equational Axiomatization for Prefix Iteration  

E-Print Network [OSTI]

Algebra (MPA), which is a subalgebra of BPA equivalent to Milner's basic CCS. We present a fi- nite] incorporated the binary Kleene star in Basic Process Algebra (BPA) [2], and they suggested three equational axioms for BPA, are a complete axiomatization for BPA modulo bisimulation. In this paper, we add

Fokkink, Wan

90

Symbolic computation of solitons in the normal dispersion regime of inhomogeneous optical fibres  

SciTech Connect (OSTI)

A nonlinear Schroedinger equation with varying dispersion, nonlinearity and gain (or absorption) is studied for ultrashort optical pulses propagating in inhomogeneous optical fibres in the case of normal dispersion. Using the modified Hirota method and symbolic computation, the bilinear form and analytic soliton solution are derived. Stable bright and dark solitons are observed in the normal dispersion regime. A periodically varying soliton and compressed soliton without any fluctuation are obtained. Combined and kink-shaped solitons are observed. Possibly applicable soliton control techniques, which are used to design dispersion-managed systems, are proposed. The proposed techniques may find applications in soliton management communication links, soliton compression and soliton control. (solitons)

Liu Wenjun; Tain Bo; Li Min; Jiang Yan; Qu Qixing; Wang Pan; Sun Kun [School of Science, Beijing University of Posts and Telecommunications, Beijing (China)

2011-06-30T23:59:59.000Z

91

Motorist interpretation of potential transition symbols in a freeway lane control signal array  

E-Print Network [OSTI]

. APPENDIX 8 . 59 VITA 66 LIST OF TABLES TABLE 1. Comparison of Houston Auto Show Results and Previous Research Page Subject Response to Yellow Symbols in a Freeway LCS Array: TTI Summer 1992 14 Lane Control Signal Arrays 21 Lane Control Signal... Arrays Shown to Subjects in the TTI 1992 Houston Auto Show Survey . 3. LCS Arrays Shown to Subjects in the TTI Summer 1992 Survey 4. Freeway Scenes Shown to Subjects Participating in Survey: Arrays 1 and 2 . . . . . 22 5. Freeway Scenes Shown...

Wohlschlaeger, Steven D

2012-06-07T23:59:59.000Z

92

,"Program Source/ Treasury Account Symbol: Agency Code","Program Source/Treasury Account Symbol: Account Code","Program Source/Treasury Account Symbol; Sub-Account Code (OPTIONAL)","Program Description (Account Title)","Total Appropriation","Total Obligations","Total Disbursements"  

Broader source: Energy.gov (indexed) [DOE]

9 9 ,"Submitter Name:","David Abercrombie" ,"Submitter Contact Info:","David.Abercrombie@hq.doe.gov" ,"Program Source/ Treasury Account Symbol: Agency Code","Program Source/Treasury Account Symbol: Account Code","Program Source/Treasury Account Symbol; Sub-Account Code (OPTIONAL)","Program Description (Account Title)","Total Appropriation","Total Obligations","Total Disbursements" 1,89,331,"N/A","Energy Efficiency and Renewable Energy, Recovery Act ",1.68e+10,228226615,0 2,89,328,"N/A","Electricity Delivery and Energy Reliability, Recovery Act",4500000000,0,0 3,89,211,"N/A","Fossil Energy Research and Development, Recovery Act",3400000000,0,0

93

,"Program Source/ Treasury Account Symbol: Agency Code","Program Source/Treasury Account Symbol: Account Code","Program Source/Treasury Account Symbol; Sub-Account Code (OPTIONAL)","Program Description (Account Title)","Total Appropriation","Total Obligations","Total Disbursements"  

Broader source: Energy.gov (indexed) [DOE]

906 906 ,"Submitter Name:","David Abercrombie" ,"Submitter Contact Info:","David.Abercrombie@hq.doe.gov" ,"Program Source/ Treasury Account Symbol: Agency Code","Program Source/Treasury Account Symbol: Account Code","Program Source/Treasury Account Symbol; Sub-Account Code (OPTIONAL)","Program Description (Account Title)","Total Appropriation","Total Obligations","Total Disbursements" 1,89,331,"N/A","Energy Efficiency and Renewable Energy, Recovery Act ",1.68e+10,374217313.6,78891.63 2,89,328,"N/A","Electricity Delivery and Energy Reliability, Recovery Act",4500000000,0,0 3,89,211,"N/A","Fossil Energy Research and Development, Recovery Act",3400000000,0,0

94

Multiple density layered insulator  

DOE Patents [OSTI]

A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

Alger, Terry W. (Tracy, CA)

1994-01-01T23:59:59.000Z

95

Attacking Symbolic State Explosion Giorgio Delzanno 1;? Jean-Fran cois Raskin 2;?? Laurent Van Begin 2;? ? ?  

E-Print Network [OSTI]

Begin 2;? ? ? 1 Dipartimento di Informatica e Scienze dell'Informazione Universit#18;a di Genova via] we need to represent in#12;nite, upward-closed sets of markings, ? This work was partially done when of symbolic repre- sentations for upward-closed sets of marking are collections of minimal points [ACJT96

96

Development of the Symbolic Manipulator Laboratory modeling package for the kinematic design and optimization of the Future Armor Rearm System robot  

SciTech Connect (OSTI)

A new program package, Symbolic Manipulator Laboratory (SML), for the automatic generation of both kinematic and static manipulator models in symbolic form is presented. Critical design parameters may be identified and optimized using symbolic models as shown in the sample application presented for the Future Armor Rearm System (FARS) arm. The computer-aided development of the symbolic models yields equations with reduced numerical complexity. Important considerations have been placed on the closed form solutions simplification and on the user friendly operation. The main emphasis of this research is the development of a methodology which is implemented in a computer program capable of generating symbolic kinematic and static forces models of manipulators. The fact that the models are obtained trigonometrically reduced is among the most significant results of this work and the most difficult to implement. Mathematica, a commercial program that allows symbolic manipulation, is used to implement the program package. SML is written such that the user can change any of the subroutines or create new ones easily. To assist the user, an on-line help has been written to make of SML a user friendly package. Some sample applications are presented. The design and optimization of the 5-degrees-of-freedom (DOF) FARS manipulator using SML is discussed. Finally, the kinematic and static models of two different 7-DOF manipulators are calculated symbolically.

March-Leuba, S.; Jansen, J.F.; Kress, R.L.; Babcock, S.M. (Oak Ridge National Lab., TN (United States)); Dubey, R.V. (Tennessee Univ., Knoxville, TN (United States). Dept. of Mechanical and Aerospace Engineering)

1992-08-01T23:59:59.000Z

97

Development of the Symbolic Manipulator Laboratory modeling package for the kinematic design and optimization of the Future Armor Rearm System robot. Ammunition Logistics Program  

SciTech Connect (OSTI)

A new program package, Symbolic Manipulator Laboratory (SML), for the automatic generation of both kinematic and static manipulator models in symbolic form is presented. Critical design parameters may be identified and optimized using symbolic models as shown in the sample application presented for the Future Armor Rearm System (FARS) arm. The computer-aided development of the symbolic models yields equations with reduced numerical complexity. Important considerations have been placed on the closed form solutions simplification and on the user friendly operation. The main emphasis of this research is the development of a methodology which is implemented in a computer program capable of generating symbolic kinematic and static forces models of manipulators. The fact that the models are obtained trigonometrically reduced is among the most significant results of this work and the most difficult to implement. Mathematica, a commercial program that allows symbolic manipulation, is used to implement the program package. SML is written such that the user can change any of the subroutines or create new ones easily. To assist the user, an on-line help has been written to make of SML a user friendly package. Some sample applications are presented. The design and optimization of the 5-degrees-of-freedom (DOF) FARS manipulator using SML is discussed. Finally, the kinematic and static models of two different 7-DOF manipulators are calculated symbolically.

March-Leuba, S.; Jansen, J.F.; Kress, R.L.; Babcock, S.M. [Oak Ridge National Lab., TN (United States); Dubey, R.V. [Tennessee Univ., Knoxville, TN (United States). Dept. of Mechanical and Aerospace Engineering

1992-08-01T23:59:59.000Z

98

Pyrochemical multiplicity counter development  

SciTech Connect (OSTI)

Impure plutonium-bearing materials from pyrochemical processes often display both significant self-multiplication and variable ({alpha},n) reaction rates. Standard neutron coincidence counting techniques usually fail to accurately measure these materials. Neutron multiplicity counters measure the third moment of the neutron multiplicity distribution and thus make it possible to deduce the fertile plutonium mass of a sample even when both the self-multiplication and the ({alpha},n) reaction rate are unknown. A multiplicity counter suitable for measuring pyrochemical materials has been designed and built. This paper describes the results of characterization studies for the new counter. The counter consists of 126 helium-3 tubes arranged in 4 concentric rings in a polyethylene moderator; the average spacing between the tubes is 1.59 cm. The end plugs for the counter are made of graphite, and the 24.1- by 37.5-cm sample cavity is cadmium lined. The counter consists of two distinct halves from which the neutron counts are summed. The counter is capable of operation in either a freestanding mode with the two halves coupled together by an external cabinet or in a glove-box mode with the two halves placed around a glovebox well and then mated. For a {sup 252}Cf source centered in the sample cavity, the measured efficiency of the new multiplicity counter is 57.7% and its die-away time is 47.2{mu}s. 8 refs., 9 figs.

Langner, D.G.; Dytlewski, N.; Krick, M.S.

1991-01-01T23:59:59.000Z

99

V-094: IBM Multiple Products Multiple Vulnerabilities | Department of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

94: IBM Multiple Products Multiple Vulnerabilities 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database versions 7.2 and 7.1 IBM Tivoli Service Request Manager versions 7.2, 7.1, and 6.2 ABSTRACT: A weakness and multiple vulnerabilities have been reported in multiple IBM products. REFERENCE LINKS: IBM Reference #:1625624 IBM Product Security Incident Response Blog Secunia Advisory SA52132

100

A Study of Practice Issues in Model-Based Verification Using the Symbolic Model Verifier (SMV)  

E-Print Network [OSTI]

vii Acknowledgements ix 1 Introduction 1 2 Background 3 2.1 Model-Based Verification 3 2.2 The Simplex Coordinated Demonstration System 4 3 Modeling with Statecharts 7 3.1 Statechart Notation 7 3.2 Creating the Statechart Model 8 4 Modeling Checking with the Symbolic Model Verifier (SMV) 11 4.1 Model Checking Steps 11 4.2 SMV Modeling Notation: 12 4.3 Creating the SMV Model 13 4.3.1 Learning SMV 13 4.3.2 Variables 14 4.3.3 Model Refinement 14 4.3.4 Iterations of the Model 15 4.3.5 Syntax Checking 16 4.4 Checking the Claims 16 4.4.1 Claim 1 17 4.4.2 Claim 2 17 4.4.3 Claim 3: 18 5 Process Metrics and Observations 21 5.1 Learning the System 21 5.2 Learning SMV Modeling Language and Tool 22 5.3 Modeling the System 22 5.4 Making Changes to the Models 23 5.5 Generating and Checking Claims 24 ii CMU/SEI-98-TR-013 6 Summary 25 6.1 Observations on the Modeling Effort 25 6.2 Observations on the Practice 26 6.3 Observations on Applicability 27 6.4 Future Work 27 7 References 29 Appendix ...

Using The; Grama R. Srinivasan; David P. Gluch; Mario Moya

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Multiple Rankine topping cycles  

SciTech Connect (OSTI)

The efficiency of a Rankine cycle is primarily determined by the temperatures of heat addition and rejection. However, no working fluid has been identified which will operate in a Rankine cycle over an extremely wide temperature range. Multiple Rankine topping cycles offer a technique for achieving high thermal efficiencies in power plants by allowing the use of several working fluids. This paper gives a history of Rankine topping cycles, presents an analysis for the calculation of the overall efficiency of a three-module multiple Rankine cycle, and presents results from a case study for a sodium-mercury-water cycle.

McWhirter, J.D. [Argonne National Lab., Idaho Falls, ID (United States). Engineering Div.]|[Idaho State Univ., Pocatello, ID (United States). Coll. of Engineering

1995-07-01T23:59:59.000Z

102

Multiple gap photovoltaic device  

DOE Patents [OSTI]

A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

Dalal, Vikram L. (Newark, DE)

1981-01-01T23:59:59.000Z

103

Multiple System Rate Process  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

DSW Multiple System Transmission Rate Process DSW Multiple System Transmission Rate Process Federal Register Notice Withdrawing Rate Proposal (PDF) Formal Process Extension Federal Register Notice (PDF) Customer Savings Under Various MSTR (XLS) Public Information Forum March 29, 2005 Customer Meeting Overview (Power Point) Customer Meeting Overview (PDF) Customer Meeting Transcript (PDF) Public Comment Forum April 6, 2005 Customer Meeting Transcript (PDF) Response Letter 5-17-05 (PDF) Customer Letters Tonopah ID-5/25/05 (PDF) APS-5/26/05 (PDF) SRP-5/27/05 (PDF) RSLynch-6/1/05 (PDF) KRSaline-6/1/05 (PDF) Formal Process Federal Register Notice (Word) Federal Register Notice (PDF) Brochure (Word) Appendices to Brochure: A B C D E1 E2 F1 F2 GH Public Information Forum July 14, 2004 Customer Meeting Overview (Power Point)

104

Multiple sclerosis and interferon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Multiple sclerosis and interferon Multiple sclerosis and interferon Name: iguanajoe Status: N/A Age: N/A Location: N/A Country: N/A Date: Around 1993 Question: I have recently read that interferon is being used as a treatment for multiple sclerosis. Please explain how it affects the nerve tissue and how effective it is. Replies: Interferon is a cell to cell chemical messenger which essentially protects cells from viruses. That is, when a virus infects a cell, it sends out interferon, which is received by neighboring cells. A biochemical reaction then follows which builds the cells resistance viruses, and hopefully, it will be enough to prevent the virus from spreading. If there is work with interferon and MS, perhaps some researchers believe that MS is caused by a viral infection that destroys nervous tissue. r, that viruses cause some genetic mutation which compromises the maintenance of healthy nervous tissue. By the way, the genetic cause for another muscular-nervous disorder, Lou Gherigs Disease or ALS, was recently found to be a hereditary genetic disorder. People susceptible to ALS did not have a gene which codes for a certain superoxide dismutase antioxidant enzyme, necessary to maintain healthy nervous tissue and prevent it from free radical destruction. Maybe the cause of MS is similar.

105

New advances in symbol timing synchronization of single-carrier, multi-carrier and space-time multiple-antenna systems  

E-Print Network [OSTI]

to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR OF PHILOSOPHY Approved by: Chair of Committee, Erchin Serpedin Committee Members, Costas N. Georghiades Andrew K. Chan Siu A. Chin... to my advisor, Profes- sor Erchin Serpedin, who has been an excellent teacher and an inspiring advisor. I have to thank him for his patience in reviewing and giving precious advice on my research work. I also have to thank Professor Costas N. Georghiades...

Wu, Yik Chung

2005-11-01T23:59:59.000Z

106

The Perceptual Interaction of Simple and Complex Point Symbol Shapes and Background Textures in Visual Search on Tourist Maps  

E-Print Network [OSTI]

and discrimination in visual search? Also, how does context, the map background from which the target symbols must be picked out by the searcher, affect visual search? 6 Purpose of the Study The purpose of this study is to find out by means of map use... by the objective physical shapes of the objects in the field of view, this does not mean that we do not have the tendency to modify the formal qualities of 13 what we perceive; for people, some shapes are meaningless and some are “good” in their shapes...

Alhosani, Naeema M.

2009-05-31T23:59:59.000Z

107

,"Program Source/ Treasury Account Symbol: Agency Code","Program Source/Treasury Account Symbol: Account Code","Program Source/Treasury Account Symbol; Sub-Account Code (OPTIONAL)","Program Description (Account Title)","Total Appropriation","Total Obligations","Total Disbursements","DOE Program Office Administering Funds"  

Broader source: Energy.gov (indexed) [DOE]

2 2 ,"Submitter Name:","David Abercrombie" ,"Submitter Contact Info:","David.Abercrombie@hq.doe.gov" ,"Program Source/ Treasury Account Symbol: Agency Code","Program Source/Treasury Account Symbol: Account Code","Program Source/Treasury Account Symbol; Sub-Account Code (OPTIONAL)","Program Description (Account Title)","Total Appropriation","Total Obligations","Total Disbursements","DOE Program Office Administering Funds" 1,89,331,"N/A","Energy Efficiency and Renewable Energy, Recovery Act",1.68e+10,10000,0,"Energy Efficiency and Renewable Energy" 2,89,328,"N/A","Electricity Delivery and Energy Reliability, Recovery Act",4500000000,0,0,"Electricity Delivery and Energy Reliability"

108

Multiple layer insulation cover  

DOE Patents [OSTI]

A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

Farrell, James J. (Livingston Manor, NY); Donohoe, Anthony J. (Ovid, NY)

1981-11-03T23:59:59.000Z

109

Traits and Multiple Genes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Traits and Multiple Genes Traits and Multiple Genes Name: Frank Location: N/A Country: N/A Date: N/A Question: Please, could you give me an example of how human traits are controlled by more than one pair of alleles? Replies: Your question is just a bit vague, there are different answers depending on just what your question is. I will answer it in terms of polygenic traits also known as additive alleles. When you think of traits such as skin color, hair color and eye color, or traits where there is a wide range of phenotypes they are usually under the control of more than one pair of alleles. These alleles can even be on different chromosomes! Each pair of additive alleles adds to the phenotype. For instance in the case of skin color, scientists now believe that 3 genes control skin color. You then get 3 sets from your mother and 3 from your father for 6 possibilities. If all 6 of the alleles are for dark skin, you will have the darkest possible skin. If you have 5 dark alleles and one light, you will have very dark skin. If you have all 6 light alleles then you will have the lightest skin possible. Is it possible to have a child that is light skinned when both parents are dark-skinned? Well, not if both have all 6 dark alleles, but if they have some light alleles and the child inherits all of the possible light alleles available, then yes, the child could have lighter skin than either parent. It is now believed that eye color is not simply brown being dominant over blue because how many people do you know that have the same shade of brown or blue eyes? Eye color must also be polygenic.

110

AM with Multiple Merlins  

E-Print Network [OSTI]

We introduce and study a new model of interactive proofs: AM(k), or Arthur-Merlin with k non-communicating Merlins. Unlike with the better-known MIP, here the assumption is that each Merlin receives an independent random challenge from Arthur. One motivation for this model (which we explore in detail) comes from the close analogies between it and the quantum complexity class QMA(k), but the AM(k) model is also natural in its own right. We illustrate the power of multiple Merlins by giving an AM(2) protocol for 3SAT, in which the Merlins' challenges and responses consist of only n^{1/2+o(1)} bits each. Our protocol has the consequence that, assuming the Exponential Time Hypothesis (ETH), any algorithm for approximating a dense CSP with a polynomial-size alphabet must take n^{(log n)^{1-o(1)}} time. Algorithms nearly matching this lower bound are known, but their running times had never been previously explained. Brandao and Harrow have also recently used our 3SAT protocol to show quasipolynomial hardness for approximating the values of certain entangled games. In the other direction, we give a simple quasipolynomial-time approximation algorithm for free games, and use it to prove that, assuming the ETH, our 3SAT protocol is essentially optimal. More generally, we show that multiple Merlins never provide more than a polynomial advantage over one: that is, AM(k)=AM for all k=poly(n). The key to this result is a subsampling theorem for free games, which follows from powerful results by Alon et al. and Barak et al. on subsampling dense CSPs, and which says that the value of any free game can be closely approximated by the value of a logarithmic-sized random subgame.

Scott Aaronson; Russell Impagliazzo; Dana Moshkovitz

2014-01-27T23:59:59.000Z

111

Hadron multiplicities at the LHC  

E-Print Network [OSTI]

We present the predictions for hadron multiplicities in pp, pA and AA collisions at the LHC based on our approach to the Color Glass Condensate.

D. Kharzeev; E. Levin; M. Nardi

2007-07-05T23:59:59.000Z

112

The International Symposium on Numeric and Symbolic Algorithms for Scientific Computing, SYNASC, is an annual event in Timioara, Romania. It has been organized by the West  

E-Print Network [OSTI]

years, an international forum for presenting their research, as well as by facilitating contacts between of the symposium were the plenary talks given by a distinguished set of international researchers: James DavenportPreface The International Symposium on Numeric and Symbolic Algorithms for Scientific Computing

Watt, Stephen M.

113

ELEC3028 Digital Transmission Overview & Information Theory S Chen 1. A source emits symbols Xi, 1 i 6, in the BCD format with probabilities P(Xi)  

E-Print Network [OSTI]

.03 101 5. Derive the coding efficiency of both the uncoded BCD signal as well as the Shannon-Fano coded symbols Xi, 1 i 6, in the BCD format with probabilities P(Xi) as given in Table 1, at a rate Rs = 9. Apply Shannon-Fano coding to the source signal characterised in Table 1. Are there any disadvantages

Chen, Sheng

114

Integrability study on a generalized (2+1)-dimensional variable-coefficient Gardner model with symbolic computation  

SciTech Connect (OSTI)

Gardner model describes certain nonlinear elastic structures, ion-acoustic waves in plasmas, and shear flows in ocean and atmosphere. In this paper, by virtue of the computerized symbolic computation, the integrability of a generalized (2+1)-dimensional variable-coefficient Gardner model is investigated. Painleve integrability conditions are derived among the coefficient functions, which reduce all the coefficient functions to be proportional only to {gamma}(t), the coefficient of the cubic nonlinear term u{sup 2}u{sub x}. Then, an independent transformation of the variable t transforms the reduced {gamma}(t)-dependent equation into a constant-coefficient integrable one. Painleve test shows that this is the only case when our original generalized (2+1)-dimensional variable-coefficient Gardner model is integrable.

Lue Xing; Zhang Haiqiang; Xu Tao; Li He [School of Science, Beijing University of Posts and Telecommunications, P.O. Box 122, Beijing 100876 (China); Tian Bo [School of Science, Beijing University of Posts and Telecommunications, P.O. Box 122, Beijing 100876 (China); State Key Laboratory of Software Development Environment, Beijing University of Aeronautics and Astronautics, Beijing 100191 (China); Key Laboratory of Information Photonics and Optical Communications (BUPT), Ministry of Education, Beijing University of Posts and Telecommunications, P.O. Box 128, Beijing 100876 (China)

2010-12-15T23:59:59.000Z

115

Parallel progressive multiple sequence alignment  

Science Journals Connector (OSTI)

Multiple Sequence Alignment is an essential tool in the analysis and comparison of biological sequences. Unfortunately, the complexity of this problem is exponential. Currently feasible methods are, therefore, only approximations. The progressive ...

Erik Pitzer

2005-02-01T23:59:59.000Z

116

Multiple Motivations Institutional Change Principle  

Broader source: Energy.gov [DOE]

The multiple motivations principle suggests that a portfolio approach—rather than a single strategy—may be required to achieve change. Research demonstrates that people and institutions adopt new...

117

Multiple hypothesis evaluation in auditing  

E-Print Network [OSTI]

In many audit tasks, auditors evaluate multiple hypotheses to diagnose the situation. Research suggests this is a complex task that individuals have difficulty performing. Further, there is little guidance in professional ...

Srivastava, Rajendra P.; Wright, Arnold; Mock, Theodore J.

2002-11-01T23:59:59.000Z

118

Multiple matching of parameterized patterns  

Science Journals Connector (OSTI)

We extend Baker's theory of parameterized pattern matching [Proc. 25th Annual STOC, 1993, pp. 71–80] to algorithms that match multiple patterns in a text. We first consider the case where the patterns are fixed a...

Ramana M. Idury; Alejandro A. Schäffer

1994-01-01T23:59:59.000Z

119

The INEL beryllium multiplication experiment  

SciTech Connect (OSTI)

The experiment to measure the multiplication of 14-MeV neutrons in bulk beryllium has been completed. The experiment consists of determining the ratio of {sup 56}Mn activities induced in a large manganese bath by a central 14-MeV neutron source, with and without a beryllium sample surrounding the source. In the manganese bath method a neutron source is placed at the center of a totally-absorbing aqueous solution of MnSo{sub 4}. The capture of neutrons by Mn produces a {sup 56}Mn activity proportional to the emission rate of the source. As applied to the measurement of the multiplication of 14- MeV neutrons in bulk beryllium, the neutron source is a tritium target placed at the end of the drift tube of a small deuteron accelerator. Surrounding the source is a sample chamber. When the sample chamber is empty, the neutrons go directly to the surrounding MnSO{sub 4} solution, and produce a {sup 56}Mn activity proportional to the neutron emission rate. When the chamber contains a beryllium sample, the neutrons first enter the beryllium and multiply through the (n,2n) process. Neutrons escaping from the beryllium enter the bath and produce a {sup 56}Mn activity proportional to the neutron emission rate multiplied by the effective value of the multiplication in bulk beryllium. The ratio of the activities with and without the sample present is proportional to the multiplication value. Detailed calculations of the multiplication and all the systematic effects were made with the Monte Carlo program MCNP, utilizing both the Young and Stewart and the ENDF/B-VI evaluations for beryllium. Both data sets produce multiplication values that are in excellent agreement with the measurements for both raw and corrected values of the multiplication. We conclude that there is not real discrepancy between experimental and calculated values for the multiplication of neutrons in bulk beryllium. 12 figs., 11 tabs., 18 refs.

Smith, J.R.; King, J.J.

1991-03-01T23:59:59.000Z

120

Fair capacity sharing of multiple aperiodic servers  

E-Print Network [OSTI]

For handling multiple aperiodic tasks with different temporal requirements, multiple aperiodic servers are used. Since capacity is partitioned statically among the multiple servers, they suffer from heavy capacity exhaustions. Bernat and Burns...

Melapudi, Vinod Reddy

2002-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Federal Energy Management Program: Multiple Motivations Institutional  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Multiple Multiple Motivations Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Facebook Tweet about Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Twitter Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Google Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Delicious Rank Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Digg Find More places to share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on AddThis.com... Sustainable Buildings & Campuses

122

Modularization to Support Multiple Brand Platforms  

E-Print Network [OSTI]

Methods to determine acceptable architecture for multiple platforms supporting multiple brands must represent both platform cost saving commonization as well as revenue enhancing brand distinctions. Functional architecting ...

Agus, Sudjianto

2001-09-09T23:59:59.000Z

123

Multiple smart weapons employment mechanism  

SciTech Connect (OSTI)

A digital communications armament network adaptor is described for carrying multiple smart weapons on a single wing pylon station of an aircraft, comprising: an aircraft having a weapons controller configured in compliance with MIL-STD 1553; multiple wing-mounted pylons on said aircraft, each providing a weapons station with communications and ejection and release mechanisms electrically connected to said controller for the airborne launch of smart weapons; a multiple ejector rack affixed to at least one pylon, said rack holding a plurality of smart weapons; and an electronic digital network connected between the controller and said rack-mounted smart weapons, said network located in said rack and including circuitry which receives coded digital communications from said controller and selectively rebroadcasts said communications to one of said smart weapons on said rack designated by said coded communications, thereby controlling all required functions of said designated smart weapon.

McGlynn, M.P.; Meiklejohn, W.D.

1993-07-20T23:59:59.000Z

124

Information transfer at multiple scales  

Science Journals Connector (OSTI)

In the study of complex systems a fundamental issue is the mapping of the networks of interaction between constituent subsystems of a complex system or between multiple complex systems. Such networks define the web of dependencies and patterns of continuous and dynamic coupling between the system’s elements characterized by directed flow of information spanning multiple spatial and temporal scales. Here, we propose a wavelet-based extension of transfer entropy to measure directional transfer of information between coupled systems at multiple time scales and demonstrate its effectiveness by studying (a) three artificial maps, (b) physiological recordings, and (c) the time series recorded from a chaos-controlled simulated robot. Limitations and potential extensions of the proposed method are discussed.

Max Lungarella; Alex Pitti; Yasuo Kuniyoshi

2007-11-27T23:59:59.000Z

125

Interactive Multiple Scale Small Multiples Andrew S. Forsberg  

E-Print Network [OSTI]

-dependent, include thousands of time steps, and have multiple fields. While mathematical modeling helps users? Motivated by the complex data generated from bat flight simulations in a wind tunnel [8], we designed datasets (e.g., kinematics, anatomical structures, and the wake structure behind bat wings). The views

Laidlaw, David

126

Multiple resonant railgun power supply  

DOE Patents [OSTI]

A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

Honig, E.M.; Nunnally, W.C.

1985-06-19T23:59:59.000Z

127

Multiple matching of parameterized patterns  

Science Journals Connector (OSTI)

We extend Baker's theory of parameterized string matching (1993) to algorithms that match multiple patterns in a text. We first consider the case where the patterns are fixed and preprocessed once, and then the case where the pattern set can change by insertions and deletions. Baker's algorithms are based on suffix trees, whereas ours are based on pattern matching automata.

Ramana M. Idury; Alejandro A. Schäffer

1996-01-01T23:59:59.000Z

128

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1  

E-Print Network [OSTI]

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1 2012 INTERNAL USER GUIDE A Guide to the Multiple Sclerosis Society Grant Tracker Society web page: http://www.mssociety.org.uk/ #12;Multiple Sclerosis Society (Grant Tracker) Multiple

129

The proliferation of functions: multiple systems playing multiple roles in multiple super systems  

E-Print Network [OSTI]

 played by any given system are represented by the  function analysis diagram (Aurisicchio, Bracewell, & Armstrong, 2013;  Devoino et al., 1997). Here, components of a system are connected to each  other through the effect that one has on the other. Components can affect  multiple...

Crilly, Nathan

2014-07-14T23:59:59.000Z

130

Aufgabenstellung, Bezeichnungen und Symbole  

Science Journals Connector (OSTI)

Die Untersuchungen erstreckten sich auf drei Gruppen von Wärmekraftprozessen : Einkreisprozesse: 1. offene Gasturbinenprozesse ...

Dr.-Ing. Herbert Bachl

1961-01-01T23:59:59.000Z

131

A NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS  

Science Journals Connector (OSTI)

...NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS 10.1126...NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS. | Journal...maturity, variety and treatment on the iodine value...CHICAGO, ILLINOIS WATER SOLUBLE MAGNESIUM...NEW MULTIPLE-UNIT ELECTRODIALYSIS ous fields of science...

Aasulv Löddesöl

1932-07-22T23:59:59.000Z

132

Recirculation in multiple wave conversions  

SciTech Connect (OSTI)

A one-dimensional multiple wave-conversion model is constructed that allows energy recirculation in ray phase space. Using a modular eikonal approach, the connection coefficients for this model are calculated by ray phase-space methods. Analytical results (confirmed numerically) show that all connection coefficients exhibit interference effects that depend on an interference phase, calculated from the coupling constants and the area enclosed by the intersecting rays. This conceptual model, which focuses on the topology of intersecting rays in phase space, is used to investigate how mode conversion between primary and secondary waves is modified by the presence of a tertiary wave.

Kaufman, A. N.; Brizard, A.J.; Kaufman, A.N.; Tracy, E.R.

2008-07-30T23:59:59.000Z

133

Multiple protocol fluorometer and method  

DOE Patents [OSTI]

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

134

Inverse scattering series for multiple attenuation: An example with surface and internal multiples  

SciTech Connect (OSTI)

A multiple attenuation method derived from an inverse scattering series is described. The inversion series approach allows a separation of multiple attenuation subseries from the full series. The surface multiple attenuation subseries was described and illustrated in Carvalho et al. (1991, 1992). The internal multiple attenuation method consists of selecting the parts of the odd terms that are associated with removing only multiply reflected energy. The method, for both types of multiples, is multidimensional and does not rely on periodicity or differential moveout, nor does it require a model of the reflectors generating the multiples. An example with internal and surface multiples will be presented.

Araujo, F.V. [PPPG/Federal Univ. of Bahia, Salvador (Brazil); Weglein, A.B. [Schlumberger Cambridge Research (United Kingdom); Carvalho, P.M. [Petrobras SA, Rio de Janeiro (Brazil); Stolt, R.H.

1994-12-31T23:59:59.000Z

135

Solvable model of quantum phase transitions and the symbolic-manipulation-based study of its multiply degenerate exceptional points and of their unfolding  

SciTech Connect (OSTI)

It is known that the practical use of non-Hermitian (i.e., typically, PT-symmetric) phenomenological quantum Hamiltonians H?H{sup †} requires an efficient reconstruction of an ad hoc Hilbert-space metric ?=?(H) which would render the time-evolution unitary. Once one considers just the N-dimensional matrix toy models H=H{sup (N)}, the matrix elements of ?(H) may be defined via a coupled set of N{sup 2} polynomial equations. Their solution is a typical task for computer-assisted symbolic manipulations. The feasibility of such a model-completion construction is illustrated here via a discrete square well model H=p{sup 2}+V endowed with a k-parametric close-to-the-boundary interaction V. The model is shown to possess (possibly, multiply degenerate) exceptional points marking the phase transitions which are attributable, due to the exact solvability of the model at any Nsymbolic manipulations and extrapolations at all N and k.

Znojil, Miloslav, E-mail: znojil@ujf.cas.cz

2013-09-15T23:59:59.000Z

136

Hereditary Multiple Exostoses with Pseudoaneurysm  

SciTech Connect (OSTI)

A 16-year-old male patient with hereditary multiple exostoses (HME) was found to have a pseudoaneurysm of the left popliteal artery caused by osteochondroma in the lower femur. The diagnosis was confirmed by ultrasound, magnetic resonance imaging and magnetic resonance angiography without the need to perform an angiogram. The osteochondroma was excised and the popliteal artery was repaired with a saphenous graft. Vascular complications are extremely rare in HME, pseudoaneurysm being the most common and mostly located in the popliteal artery. This complication should be considered in young HME patients with a mass at the knee region. The radiological spectrum of investigations allows the diagnosis of this complication with proper and less invasive management procedures for the patient.

Al-Hadidy, Azmy M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan)], E-mail: ahadidy@ju.edu.jo; Al-Smady, Moa'ath M. [Jordan University Hospital, University of Jordan, Department of Vascular Surgery (Jordan); Haroun, Azmi A. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Hamamy, Hanan A. [National Institute for Diabetes Endocrinology and Genetics (Jordan); Ghoul, Suha M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Shennak, Akram O. [Jordan University Hospital, University of Jordan, Department of Orthopedic Surgery (Jordan)

2007-06-15T23:59:59.000Z

137

Inverted and multiple nematic emulsions  

Science Journals Connector (OSTI)

We investigate experimentally the structures that form when small colloidal particles are suspended in a nematic solvent. These structures are anisotropic, and their formation is driven by interactions arising from the orientational elasticity of the nematic solvent. By using inverted and multiple nematic emulsions composed of water droplets dispersed in a thermotropic liquid crystal, we identify the nature of these interactions, and demonstrate that they can be controlled by the anchoring of the liquid crystal molecules at the surfaces of the droplets. When the anchoring is normal, the droplets form linear chains, suggesting a long-range dipole-dipole attraction between the particles. By contrast, the interactions are repulsive at short range, and prevent contact of the droplets, thereby stabilizing them against coalescence. When the anchoring is planar, the droplets generate distortions that have a quadrupolar character. The resultant elastic interactions lead to more compact, but still anisotropic, clusters.

P. Poulin and D. A. Weitz

1998-01-01T23:59:59.000Z

138

Multiple acousto-optic q-switch  

DOE Patents [OSTI]

An improved dynamic moire interferometer comprised of a lasing medium providing a plurality of beams of coherent light, a multiple q-switch producing multiple trains of 100,000 or more pulses per second, a combining means collimating multiple trains of pulses into substantially a single train and directing beams to specimen gratings affixed to a test material, and a controller, triggering and sequencing the emission of the pulses with the occurrence and recording of a dynamic loading event.

Deason, Vance A. (Idaho Falls, ID)

1993-01-01T23:59:59.000Z

139

Multiplicity of investment equilibria when pollution permits are not tradable  

E-Print Network [OSTI]

Paper ???? Multiplicity of investment equilibria whenauthor. Multiplicity of investment equilibria when pollutionon aggregate levels of investment in abatement capital.

Karp, Larry

2006-01-01T23:59:59.000Z

140

Systems analysis of multiple regulator perturbations allows discoveryo...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Systems analysis of multiple regulator perturbations allows discoveryof virulence factors in Salmonella. Systems analysis of multiple regulator perturbations allows discoveryof...

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Multiple Layer Graphene Optical Modulator - Energy Innovation...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Materials Advanced Materials Find More Like This Return to Search Multiple Layer Graphene Optical Modulator Lawrence Berkeley National Laboratory Contact LBL About This...

142

Code design for multiple-input multiple-output broadcast channels  

E-Print Network [OSTI]

Recent information theoretical results indicate that dirty-paper coding (DPC) achieves the entire capacity region of the Gaussian multiple-input multiple-output (MIMO) broadcast channel (BC). This thesis presents practical code designs for Gaussian...

Uppal, Momin Ayub

2009-06-02T23:59:59.000Z

143

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang  

E-Print Network [OSTI]

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang Computer Science and Eng. Dept. Texas A&M University College Station, TX 77843 yuewang@cse.tamu.edu Abstract--Rank modulation is a scheme that uses-change memories, etc. An extension of rank modulation is studied in this paper, where multiple cells can have

Jiang, Anxiao "Andrew"

144

Analysis of Variance (ANOVA) Multiple Comparisons  

E-Print Network [OSTI]

Analysis of Variance (ANOVA) Multiple Comparisons The Kruskal-Wallis Test Two-Way ANOVA Stat 491 The Kruskal-Wallis Test Two-Way ANOVA Introduction We are interested in testing equality of k population means (ANOVA) Multiple Comparisons The Kruskal-Wallis Test Two-Way ANOVA ANOVA: Simulated Data (k = 4; µ1 = 5

Bardsley, John

145

Multiple Point Schemes for Corank 1 Maps  

Science Journals Connector (OSTI)

......Multiple Point Schemes for Corank 1 Maps Washington Luiz Marar David Mond...MULTIPLE POINT SCHEMES FOR CORANK 1 MAPS WASHINGTON LUIZ MARAR AND DAVID...1). Finally, denote the map Cn "1+fc -> C*~m defined...g:(Cn -1+k ,0) *C\\gis G-invariant}. Then

Washington Luiz Marar; David Mond

1989-06-01T23:59:59.000Z

146

Charged track multiplicity in B meson decay  

Science Journals Connector (OSTI)

We have used the CLEO II detector to study the multiplicity of charged particles in the decays of B mesons produced at the ?(4S) resonance. Using a sample of 1.5×106 B meson pairs, we find the mean inclusive charged particle multiplicity to be 10.71±0.02-0.15+0.21 for the decay of the pair. This corresponds to a mean multiplicity of 5.36±0.01-0.08+0.11 for a single B meson. Using the same data sample, we have also extracted the mean multiplicities in semileptonic and nonleptonic decays. We measure a mean of 7.82±0.05-0.19+0.21 charged particles per BB¯ decay when both mesons decay semileptonically. When neither B meson decays semileptonically, we measure a mean charged particle multiplicity of 11.62±0.04-0.18+0.24 per BB¯ pair.

G. Brandenburg et al. (CLEO Collaboration)

2000-03-07T23:59:59.000Z

147

Modeling Multiple Causes of Carcinogenesis  

SciTech Connect (OSTI)

An array of epidemiological results and databases on test animal indicate that risk of cancer and atherosclerosis can be up- or down-regulated by diet through a range of 200%. Other factors contribute incrementally and include the natural terrestrial environment and various human activities that jointly produce complex exposures to endotoxin-producing microorganisms, ionizing radiations, and chemicals. Ordinary personal habits and simple physical irritants have been demonstrated to affect the immune response and risk of disease. There tends to be poor statistical correlation of long-term risk with single agent exposures incurred throughout working careers. However, Agency recommendations for control of hazardous exposures to humans has been substance-specific instead of contextually realistic even though there is consistent evidence for common mechanisms of toxicological and carcinogenic action. That behavior seems to be best explained by molecular stresses from cellular oxygen metabolism and phagocytosis of antigenic invasion as well as breakdown of normal metabolic compounds associated with homeostatic- and injury-related renewal of cells. There is continually mounting evidence that marrow stroma, comprised largely of monocyte-macrophages and fibroblasts, is important to phagocytic and cytokinetic response, but the complex action of the immune process is difficult to infer from first-principle logic or biomarkers of toxic injury. The many diverse database studies all seem to implicate two important processes, i.e., the univalent reduction of molecular oxygen and breakdown of aginuine, an amino acid, by hydrolysis or digestion of protein which is attendant to normal antigen-antibody action. This behavior indicates that protection guidelines and risk coefficients should be context dependent to include reference considerations of the composite action of parameters that mediate oxygen metabolism. A logic of this type permits the realistic common-scale modeling of multiple causes of carcinogenesis and shifts the risk-assessment logic to considerations of ?what dose does?? in contrast to the current process of the substance-specific question of ?what dose is?? Whether reactive oxygen is the proximate or contributing cause of disease or simply a better estimate of biologically effective dose, it has enormous advantages for improved risk- and policy-based decisions. Various estimates of immune system modulation will be given based on radiobiology.

Jones, T.D.

1999-01-24T23:59:59.000Z

148

PJM Interconnection (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Delaware Program Type Interconnection PJM (originally Pennsylvania, Jersey, Maryland) Interconnection is a Regional Transmission Organization (RTO) that coordinates the movement of wholesale electricity in all or parts of Delaware, Illinois, Indiana, Kentucky, Maryland, Michigan, New Jersey, North Carolina, Ohio, Pennsylvania, Tennessee, Virginia, West Virginia and the District of Columbia. The PJM region has an area of 214,000 square miles, a population of about 60 million and a peak demand of 163,848 megawatts

149

A Study of Multiplicities in Hadronic Interactions  

SciTech Connect (OSTI)

Using data from the SELEX (Fermilab E781) experiment obtained with a minimum-bias trigger, we study multiplicity and angular distributions of secondary particles produced in interactions in the experimental targets. We observe interactions of {Sigma}{sup -}, proton, {pi}{sup -}, and {pi}{sup +}, at beam momenta between 250 GeV/c and 650 GeV/c, in copper, polyethylene, graphite, and beryllium targets. We show that the multiplicity and angular distributions for meson and baryon beams at the same momentum are identical. We also show that the mean multiplicity increases with beam momentum, and presents only small variations with the target material.

Estrada Tristan, Nora Patricia; /San Luis Potosi U.

2006-02-01T23:59:59.000Z

150

The MARVEL assembly for neutron multiplication  

SciTech Connect (OSTI)

A new multiplying test assembly is under development at Idaho National Laboratory to support research, validation, evaluation, and learning. The item is comprised of three stacked, highly-enriched uranium (HEU) cylinders, each 11.4 cm in diameter and having a combined height of up to 11.7 cm. The combined mass of all three cylinders is 20.3 kg of HEU. Calculations for the bare configuration of the assembly indicate a multiplication level of >3.5 (keff=0.72). Reflected configurations of the assembly, using either polyethylene or tungsten, are possible and have the capability of raising the assembly's multiplication level to greater than 10. This paper describes simulations performed to assess the assembly's multiplication level under different conditions and describes the resources available at INL to support the use of these materials. We also describe some preliminary calculations and test activities using the assembly to study neutron multiplication.

David L. Chichester; Mathew T. Kinlaw

2013-10-01T23:59:59.000Z

151

Multiple Vehicle Routing Problem with Fuel Constraints  

E-Print Network [OSTI]

In this paper, a Multiple Vehicle Routing Problem with Fuel Constraints (MVRPFC) is considered. This problem consists of a field of targets to be visited, and a collection of vehicles with fuel tanks that may visit the targets. Consideration...

Levy, David

2013-06-26T23:59:59.000Z

152

Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs  

E-Print Network [OSTI]

Anisotropic grid–adaptive strategies are presented for viscous flow simulations in which the accurate prediction of multiple aerodynamic outputs (such as the lift, drag, and moment coefficients) is required from a single ...

Venditti, David A.

153

Nonparametric estimation of multiple structures with outliers  

E-Print Network [OSTI]

Nonparametric estimation of multiple structures with outliers Wei Zhang and Jana Kosecka George outliers (pseudo outliers) to it in addition to the true outliers (gross outliers). The problem of robust

Kosecka, Jana

154

Algorithms for Multiple Vehicle Routing Problems  

E-Print Network [OSTI]

Surveillance and monitoring applications require a collection of heterogeneous vehicles to visit a set of targets. This dissertation considers three fundamental routing problems involving multiple vehicles that arise in these applications. The main...

Bae, Jung Yun

2014-06-02T23:59:59.000Z

155

Friction and the Multiplicity of Equilibria  

E-Print Network [OSTI]

but large, the measure of the ROM is therefore non-monotonicTherefore the measure of the ROM is positive. However, as ?region of multiplicity” (ROM) is the intersection of two or

Karp, Larry

2005-01-01T23:59:59.000Z

156

Multiple-Coincidence Interrogation of Fissionables  

SciTech Connect (OSTI)

The multiple coincidence technique uses 14.1 MeV neutrons to produce (n, multiple-?) coincidences to detect fissile and fissionable materials. Measurements of n-?-? coincidences with targets of depleted uranium (DU), W, and Pb, show that the counting rate for the DU is substantially above that for the non-fissionables. Also, the data involving prompt neutrons and delayed gammas in the DU time spectra provide a signature for fissionables that is distinct from that of non-fissionables.

J.P. Hurley, R.P. Keegan, J.R. Tinsley, R. Trainham

2009-05-01T23:59:59.000Z

157

An analysis of multiple component mooring lines  

E-Print Network [OSTI]

AN ANALYSIS OF MULTIPLE COMPONENT MOORING LINES A Thesis by THOMAS ROBERT NALTERS Submitted to the Graduate College of Texas ASM University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE December 1977 Major...'595 ABSTRACT An Analysis Of Multiple Component Mooring Lines (December 1977) Thomas Robert Walters, B. E. , Vanderbilt University Co-Chai rman of Advisory Committee: Dr. Ts ung- Chow Su Co- Chai rman of Advisory Committee: Dr. Richard Domi nguez...

Walters, Thomas Robert

2012-06-07T23:59:59.000Z

158

T-597: WordPress Multiple Security Vulnerabilities | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

7: WordPress Multiple Security Vulnerabilities T-597: WordPress Multiple Security Vulnerabilities April 7, 2011 - 5:42am Addthis PROBLEM: WordPress is prone to multiple security...

159

V-041: Red Hat CloudForms Multiple Vulnerabilities | Department...  

Energy Savers [EERE]

V-041: Red Hat CloudForms Multiple Vulnerabilities V-041: Red Hat CloudForms Multiple Vulnerabilities December 6, 2012 - 4:01am Addthis PROBLEM: Red Hat CloudForms Multiple...

160

T-694: IBM Tivoli Federated Identity Manager Products Multiple...  

Broader source: Energy.gov (indexed) [DOE]

T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 -...

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA Aptamers and Graphene Oxide Nanosheets. In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA...

162

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Broader source: Energy.gov (indexed) [DOE]

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

163

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Energy Savers [EERE]

32: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 -...

164

Hydrogen Bonded Arrays: The Power of Multiple Hydrogen Bonds...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Bonded Arrays: The Power of Multiple Hydrogen Bonds. Hydrogen Bonded Arrays: The Power of Multiple Hydrogen Bonds. Abstract: Hydrogen bond interactions in small covalent model...

165

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen K-edge Spectroscopy and Electronic Structure Theory . Covalency in Metal-Oxygen Multiple Bonds Evaluated Using...

166

Symbolic derivation of high-order Rayleigh-Schroedinger perturbation energies using computer algebra: Application to vibrational-rotational analysis of diatomic molecules  

SciTech Connect (OSTI)

Rayleigh-Schroedinger perturbation theory is an effective and popular tool for describing low-lying vibrational and rotational states of molecules. This method, in conjunction with ab initio techniques for computation of electronic potential energy surfaces, can be used to calculate first-principles molecular vibrational-rotational energies to successive orders of approximation. Because of mathematical complexities, however, such perturbation calculations are rarely extended beyond the second order of approximation, although recent work by Herbert has provided a formula for the nth-order energy correction. This report extends that work and furnishes the remaining theoretical details (including a general formula for the Rayleigh-Schroedinger expansion coefficients) necessary for calculation of energy corrections to arbitrary order. The commercial computer algebra software Mathematica is employed to perform the prohibitively tedious symbolic manipulations necessary for derivation of generalized energy formulae in terms of universal constants, molecular constants, and quantum numbers. As a pedagogical example, a Hamiltonian operator tailored specifically to diatomic molecules is derived, and the perturbation formulae obtained from this Hamiltonian are evaluated for a number of such molecules. This work provides a foundation for future analyses of polyatomic molecules, since it demonstrates that arbitrary-order perturbation theory can successfully be applied with the aid of commercially available computer algebra software.

Herbert, J.M. [Kansas State Univ., Manhattan, KS (United States). Dept. of Chemistry] [Kansas State Univ., Manhattan, KS (United States). Dept. of Chemistry

1997-07-01T23:59:59.000Z

167

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels  

E-Print Network [OSTI]

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels Fernando P procedure that generalizes the mercury/waterfilling algorithm, previously proposed for parallel non-interfering chan- nels. In this generalization the mercury level accounts for the sub- optimal (non-Gaussian) input

Verdú, Sergio

168

Charged-particle multiplicity at LHC energies  

ScienceCinema (OSTI)

The talk presents the measurement of the pseudorapidity density and the multiplicity distribution with ALICE at the achieved LHC energies of 0.9 and 2.36 TeV.An overview about multiplicity measurements prior to LHC is given and the related theoretical concepts are briefly discussed.The analysis procedure is presented and the systematic uncertainties are detailed. The applied acceptance corrections and the treatment of diffraction are discussed.The results are compared with model predictions. The validity of KNO scaling in restricted phase space regions is revisited. 

None

2011-10-06T23:59:59.000Z

169

Erratum: Formation Control of Multiple Mobile Robots Systems  

Science Journals Connector (OSTI)

The paper entitled “Formation Control of Multiple Mobile Robots Systems” by Zhanfeng Li, Youliang Ma...

Zhanfeng Li; Youliang Ma; Tong Ren

2008-01-01T23:59:59.000Z

170

Multiple Triclosan Targets in Trypanosoma brucei  

Science Journals Connector (OSTI)

...Microbiology ARTICLE ARTICLES Multiple Triclosan Targets in Trypanosoma brucei Kimberly...It was therefore not surprising that triclosan, an inhibitor of type II enoyl-acyl...EC50s) of 10 and 13 muM, respectively. Triclosan also inhibited cell-free fatty acid...

Kimberly S. Paul; Cyrus J. Bacchi; Paul T. Englund

2004-08-01T23:59:59.000Z

171

Wind direction modelling using multiple observation points  

Science Journals Connector (OSTI)

...gains in the produced output power. chaos engineering|wind forecasting|multiple measurements...realized that the modelling of power output in wind turbines needs to be performed...region; in region 3, for high winds, the power output is subject to a threshold...

2008-01-01T23:59:59.000Z

172

Quasi Multiplication and K-groups  

E-Print Network [OSTI]

We give a negative answer to the question raised by Mart Abel about whether his proposed definition of K0 and K1 groups in terms of quasi multiplication is indeed equivalent to the established ones in algebraic K-theory....

Lee, Tsiu-Kwen; Sheu, Albert Jeu-Liang

2013-02-28T23:59:59.000Z

173

A Survey of Multiplicity Fluctuations in PHENIX  

E-Print Network [OSTI]

The PHENIX Experiment at the Relativistic Heavy Ion Collider has made measurements of event-by-event fluctuations in the charged particle multiplicity as a function of collision energy, centrality, collision species, and transverse momentum in heavy ion collisions. The results of these measurements will be reviewed and discussed.

Jeffery T. Mitchell

2005-10-27T23:59:59.000Z

174

Computer Simulations Reveal Multiple Functions for Aromatic  

E-Print Network [OSTI]

Computer Simulations Reveal Multiple Functions for Aromatic Residues in Cellulase Enzymes NREL researchers use high-performance computing to demonstrate fundamental roles of aromatic residues in cellulase enzyme tunnels. National Renewable Energy Laboratory (NREL) computer simulations of a key indus- trial

175

Gene prediction by multiple spliced alignment  

Science Journals Connector (OSTI)

With recent advances in sequencing technologies, a huge amount of DNA sequences become available year after year. In order to obtain useful information on these sequences, we need to process them in search of biologically meaningful regions. The genes ... Keywords: comparative genomics, gene prediction, multiple spliced alignment

Rodrigo Mitsuo Kishi; Ronaldo Fiorilo dos Santos; Said Sadique Adi

2011-08-01T23:59:59.000Z

176

Medical image classification with multiple kernel learning  

Science Journals Connector (OSTI)

Nowadays, medical images are generated by hospitals and medical centers rapidly. The large volume of medical image data produces a strong need to effective medical image retrieval. The visual characteristic of medical image, such as modality, anatomical ... Keywords: feature fusion, image classification, medical imaging, multiple kernel learning

Hong Wu; Hao Zhang; Chao Li

2010-12-01T23:59:59.000Z

177

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;MATLAB Parallel MATLAB sets up one special agent called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

178

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;Matlab Parallel ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 67 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

179

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff: Advanced Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 69 #12;Matlab ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 69 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

180

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 66 #12;MATLAB Parallel MATLAB sets up one special worker called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

The multiple vortex nature of tropical cyclogenesis  

E-Print Network [OSTI]

) __________________________ __________________________ John Nielsen-Gammon Craig Epifanio (Chair of Committee) (Member) __________________________ __________________________ Fuqing Zhang Hongxing Liu (Member) (Member) December 2004 Major Subject: Atmospheric Sciences... iii ABSTRACT The Multiple Vortex Nature of Tropical Cyclogenesis. (December 2004) Jason Allen Sippel, B.S., Texas A&M University Chair of Advisory Committee: Dr. John Nielsen-Gammon This thesis contains an observational analysis...

Sippel, Jason Allen

2005-02-17T23:59:59.000Z

182

Experimental Verification of Carrier Multiplication in Graphene  

Science Journals Connector (OSTI)

By this method, we obtain occupation probabilities at eight distinct energies, enabling a safe reconstruction of the time-dependent carrier distribution in the relevant range in momentum space, assuming quasi-instantaneous thermalization of the excited carriers. ... Schaller, R. D.; Klimov, V. I.High Efficiency Carrier Multiplication in PbSe Nanocrystals: Implications for Solar Energy Conversion Phys. ...

T. Plötzing; T. Winzer; E. Malic; D. Neumaier; A. Knorr; H. Kurz

2014-08-21T23:59:59.000Z

183

Jet multiplicities as the QGP thermometer  

E-Print Network [OSTI]

It is proposed to use the energy behavior of mean multiplicities of jets propagating in a nuclear medium as the thermometer of this medium during the collision phases. The qualitative effects are demonstrated in the framework of the fixed coupling QCD with account of jet quenching.

I. M. Dremin; O. S. Shadrin

2006-02-10T23:59:59.000Z

184

Monitoring voltage collapse margin with synchrophasors across transmission corridors with multiple lines and multiple contingencies  

E-Print Network [OSTI]

We use synchrophasor measurements of the complex voltage and current at both ends of multiple transmission lines that connect areas of a power system to monitor the online voltage collapse margin. A new reduction is used to reduce the multiple transmission lines to a single line equivalent and determine how to combine the synchrophasor measurements. Generator reactive power limits can be accommodated. The results show that this methodology can capture the effect of multiple contingencies inside the transmission corridors, giving awareness to the operators about the severity of contingencies with respect to voltage stability.

Ramirez, Lina

2014-01-01T23:59:59.000Z

185

A material's multiple personalities | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship The brightness and energy of X-ray beams are critical properties for research. The APS Upgrade will make our X-ray beams brighter, meaning more X-rays can be focused onto a smaller, laser-like spot, allowing researchers to gather more data in greater detail in less time. A material's multiple personalities By Jared Sagoff * September 11, 2013 Tweet EmailPrint ARGONNE, Ill. - Just like people, materials can sometimes exhibit "multiple personalities." This kind of unusual behavior in a certain class of materials has compelled researchers at the U.S. Department of Energy's Argonne National Laboratory to take a closer look at the precise

186

Multiple Scattering Measurements in the MICE Experiment  

SciTech Connect (OSTI)

The international Muon Ionization Cooling Experiment (MICE), under construction at RAL, will test a prototype cooling channel for a future Neutrino Factory or Muon Collider. The cooling channel aims to achieve, using liquid hydrogen absorbers, a 10% reduction in transverse emittance. The change in 4D emittance will be determined with an accuracy of 1% by measuring muons individually. Step IV of MICE will make the first precise emittance-reduction measurements of the experiment. Simulation studies using G4MICE, based on GEANT4, find a significant difference in multiple scattering in low Z materials, compared with the standard expression quoted by the Particle Data Group. Direct measurement of multiple scattering using the scintillating-fibre trackers is found to be possible, but requires the measurement resolution to be unfolded from the data.

Carlisle, T.; Cobb, J.; /Oxford U.; Neuffer, D.; /Fermilab

2012-05-01T23:59:59.000Z

187

Weak multiplicativity for random quantum channels  

E-Print Network [OSTI]

It is known that random quantum channels exhibit significant violations of multiplicativity of maximum output p-norms for any p>1. In this work, we show that a weaker variant of multiplicativity nevertheless holds for these channels. For any constant p>1, given a random quantum channel N (i.e. a channel whose Stinespring representation corresponds to a random subspace S), we show that with high probability the maximum output p-norm of n copies of N decays exponentially with n. The proof is based on relaxing the maximum output infinity-norm of N to the operator norm of the partial transpose of the projector onto S, then calculating upper bounds on this quantity using ideas from random matrix theory.

Montanaro, Ashley

2011-01-01T23:59:59.000Z

188

Method for High Accuracy Multiplicity Correlation Measurements  

E-Print Network [OSTI]

Multiplicity correlation measurements provide insight into the dynamics of high energy collisions. Models describing these collisions need these correlation measurements to tune the strengths of the underlying QCD processes which influence all observables. Detectors, however, often possess limited coverage or reduced efficiency that influence correlation measurements in obscure ways. In this paper, the effects of non-uniform detection acceptance and efficiency on the measurement of multiplicity correlations between two distinct detector regions (termed forward-backward correlations) are derived. This result is transformed into a correction method. Verification of the presented correction method is provided through simulations using different event generators. The result of the method allows one to correct measurements in a simulation independent manner with high accuracy and thereby shed light on the underlying processes.

Gulbrandsen, K

2014-01-01T23:59:59.000Z

189

Experience with pipelined multiple instruction streams  

SciTech Connect (OSTI)

Pipelining has been used to implement efficient, high-speed vector computers. It is also an effective method for implementing multiprocessors. The Heterogeneous Element Processor (HEP) built by Denelcor Incorporated is the first commercially available computer system to use pipelining to implement multiple processes. This paper introduces the architecture and programming environment of the HEP and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware.

Jordon, H.F.

1984-01-01T23:59:59.000Z

190

Multiple Rankine topping cycles offer high efficiency  

SciTech Connect (OSTI)

The efficiency of a Rankine cycle is primarily determined by the temperatures of heat addition and heat rejection. However, no working fluid has been identified that will operate in a Rankine cycle over an extremely wide temperature range. Multiple Rankine topping cycles offer a technique for achieving high thermal efficiencies in power plants by allowing the use of several working fluids to span larger temperature ranges.

McWhirter, J.D. [Idaho State Univ., Pocatello, ID (United States)

1997-10-01T23:59:59.000Z

191

Neutron multiplicities for the transplutonium nuclides  

SciTech Connect (OSTI)

This paper continues, with respect to the transplutonium nuclides, earlier efforts to collate and evaluate data from the scientific literature on the prompt neutron multiplicity distribution from fission and its first moment = ..sigma..nuPnu. The isotopes considered here for which P/sub nu/ and or data (or both) were found in the literature are of americium (Am), curium (Cm), berkelium (Bk), californium (Cf), einsteinium (Es), fermium (Fm), and nobelium (No).

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

192

[0268] First Galley Proofs MULTIPLICITIES, BOUNDARY POINTS,  

E-Print Network [OSTI]

, multiplicity, extreme point, sharp point, boundary point. c Ð , Zagreb Paper OaM-0268 1 #12;2 W.S. CHEUNG NUMERICAL RANGES WAI-SHUN CHEUNG, XUHUA LIU AND TIN-YAU TAM (Communicated by C.-K. Li) Abstract, XUHUA LIU AND T.Y. TAM Given W(A), Embry [8] introduced M = M (A) := {x Cn : x Ax = x x}. In general

Tam, Tin-Yau

193

Alternatives for Helium-3 in Multiplicity Counters  

SciTech Connect (OSTI)

Alternatives to helium-3 are being actively pursued due to the shortage and rising costs of helium-3. For safeguards applications, there are a number of ongoing investigations to find alternatives that provide the same capability in a cost-effective manner. One of the greatest challenges is to find a comparable alternative for multiplicity counters, since they require high efficiency and short collection or die-away times. Work has been progressing on investigating three commercially available alternatives for high efficiency multiplicity counters: boron trifluoride (BF3) filled proportional tubes, boron-lined proportional tubes, and lithium fluoride with zinc sulfide coated light guides. The baseline multiplicity counter used for the investigation is the Epithermal Neutron Multiplicity Counter with 121 helium-3 filled tubes at 10 atmosphere pressure, which is a significant capability to match. The primary tool for the investigation has been modeling and simulation using the Monte Carlo N-Particle eXtended (MCNPX) radiation transport program, with experiments to validate the models. To directly calculate the coincidence rates in boron-lined (and possibly other) detectors, the MCNPX code has been enhanced to allow the existing coincidence tally to be used with energy deposition rather than neutron capture reactions. This allows boron-lined detectors to be modeled more accurately. Variations of tube number and diameter along with variations in the amount of inter-tube moderator have been conducted for the BF3 and boron-lined cases. Tube pressure was investigated for BF3, up to two atmospheres, as well as optimal boron thickness in the boron-lined tubes. The lithium fluoride was modeled as sheets of material with light guides in between, and the number and thickness of the sheets investigated. The amount of light guide, which in this case doubles as a moderator, was also optimized. The results of these modeling and simulation optimization investigations are described and results presented.

Ely, James H.; Siciliano, Edward R.; Lintereur, Azaree T.; Swinhoe, Martyn T.

2013-04-01T23:59:59.000Z

194

Exponential smoothing with a damped multiplicative trend  

Science Journals Connector (OSTI)

Multiplicative trend exponential smoothing has received very little attention in the literature. It involves modelling the local slope by smoothing successive ratios of the local level, and this leads to a forecast function that is the product of level and growth rate. By contrast, the popular Holt method uses an additive trend formulation. It has been argued that more real series have multiplicative trends than additive. However, even if this is true, it seems likely that the more conservative forecast function of the Holt method will be more robust when applied in an automated way to a large batch of series with different types of trend. In view of the improvements in accuracy seen in dampening the Holt method, in this paper we investigate a new damped multiplicative trend approach. An empirical study, using the monthly time series from the M3-Competition, gave encouraging results for the new approach at a range of forecast horizons, when compared to the established exponential smoothing methods.

James W. Taylor

2003-01-01T23:59:59.000Z

195

MPACT Fast Neutron Multiplicity System Prototype Development  

SciTech Connect (OSTI)

This document serves as both an FY2103 End-of-Year and End-of-Project report on efforts that resulted in the design of a prototype fast neutron multiplicity counter leveraged upon the findings of previous project efforts. The prototype design includes 32 liquid scintillator detectors with cubic volumes 7.62 cm in dimension configured into 4 stacked rings of 8 detectors. Detector signal collection for the system is handled with a pair of Struck Innovative Systeme 16-channel digitizers controlled by in-house developed software with built-in multiplicity analysis algorithms. Initial testing and familiarization of the currently obtained prototype components is underway, however full prototype construction is required for further optimization. Monte Carlo models of the prototype system were performed to estimate die-away and efficiency values. Analysis of these models resulted in the development of a software package capable of determining the effects of nearest-neighbor rejection methods for elimination of detector cross talk. A parameter study was performed using previously developed analytical methods for the estimation of assay mass variance for use as a figure-of-merit for system performance. A software package was developed to automate these calculations and ensure accuracy. The results of the parameter study show that the prototype fast neutron multiplicity counter design is very nearly optimized under the restraints of the parameter space.

D.L. Chichester; S.A. Pozzi; J.L. Dolan; M.T. Kinlaw; S.J. Thompson; A.C. Kaplan; M. Flaska; A. Enqvist; J.T. Johnson; S.M. Watson

2013-09-01T23:59:59.000Z

196

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect (OSTI)

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 25% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2008-01-03T23:59:59.000Z

197

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect (OSTI)

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. Also by relating a topic's interestingness to an article's interestingness, iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 9% to 14% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2007-02-15T23:59:59.000Z

198

Design of globally optimal multiple description scalar quantizers  

E-Print Network [OSTI]

This thesis investigates the design of globally optimal multiple description scalar quantizers. The design of multiple description scalar quantizers is formulated as a combinatorial optimization problem due to the index assignment issue. The first...

Desilva, Buveneka Kanishka

2012-06-07T23:59:59.000Z

199

Multiple Steady States in Ideal Two-Product Distillation  

E-Print Network [OSTI]

Multiple Steady States in Ideal Two-Product Distillation Elling W. Jacobsen and Sigurd Skogestad Chemical Engineering Dept., University of Trondheim-NTH, N-7034 Trondheim, Norway Simple distillation and compositions in the column. Introduction Multiple steady states (multiplicity) in distillation columns have

Skogestad, Sigurd

200

New multiplicativity results for qubit maps  

E-Print Network [OSTI]

Let $\\Phi$ be a trace-preserving, positivity-preserving (but not necessarily completely positive) linear map on the algebra of complex $2 \\times 2$ matrices, and let $\\Omega$ be any finite-dimensional completely positive map. For $p=2$ and $p \\geq 4$, we prove that the maximal $p$-norm of the product map $\\Phi \\ot \\Omega$ is the product of the maximal $p$-norms of $\\Phi$ and $\\Omega$. Restricting $\\Phi$ to the class of completely positive maps, this settles the multiplicativity question for all qubit channels in the range of values $p \\geq 4$.

Christopher King; Nilufer Koldan

2006-03-09T23:59:59.000Z

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Multiple volume compressor for hot gas engine  

DOE Patents [OSTI]

A multiple volume compressor for use in a hot gas (Stirling) engine having a plurality of different volume chambers arranged to pump down the engine when decreased power is called for and return the working gas to a storage tank or reservoir. A valve actuated bypass loop is placed over each chamber which can be opened to return gas discharged from the chamber back to the inlet thereto. By selectively actuating the bypass valves, a number of different compressor capacities can be attained without changing compressor speed whereby the capacity of the compressor can be matched to the power available from the engine which is used to drive the compressor.

Stotts, Robert E. (Clifton Park, NY)

1986-01-01T23:59:59.000Z

202

Multiple frequency method for operating electrochemical sensors  

DOE Patents [OSTI]

A multiple frequency method for the operation of a sensor to measure a parameter of interest using calibration information including the steps of exciting the sensor at a first frequency providing a first sensor response, exciting the sensor at a second frequency providing a second sensor response, using the second sensor response at the second frequency and the calibration information to produce a calculated concentration of the interfering parameters, using the first sensor response at the first frequency, the calculated concentration of the interfering parameters, and the calibration information to measure the parameter of interest.

Martin, Louis P. (San Ramon, CA)

2012-05-15T23:59:59.000Z

203

Experience with pipelined multiple instruction streams  

SciTech Connect (OSTI)

The authors introduces the architecture and programming environment of the heterogeneous element processor (HEP) and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware. 35 references.

Jordan, H.F.

1984-01-01T23:59:59.000Z

204

Multiplicative cascades and seismicity in natural time  

Science Journals Connector (OSTI)

Natural time ? enables the distinction of two origins of self-similarity, i.e., the process memory and the process increments infinite variance. Employing multiplicative cascades in natural time, the most probable value of the variance ?1(???2?????2) is explicitly related with the parameter b of the Gutenberg-Richter law of randomly shuffled earthquake data. Moreover, the existence of temporal and magnitude correlations is studied in the original earthquake data. Magnitude correlations are larger for closer in time earthquakes, when the maximum interoccurrence time varies from half a day to 1 min.

N. V. Sarlis; E. S. Skordas; P. A. Varotsos

2009-08-11T23:59:59.000Z

205

Multiple gamma lines from semi-annihilation  

SciTech Connect (OSTI)

Hints in the Fermi data for a 130 GeV gamma line from the galactic center have ignited interest in potential gamma line signatures of dark matter. Explanations of this line based on dark matter annihilation face a parametric tension since they often rely on large enhancements of loop-suppressed cross sections. In this paper, we pursue an alternative possibility that dark matter gamma lines could arise from ''semi-annihilation'' among multiple dark sector states. The semi-annihilation reaction ?{sub i}?{sub j} ? ?{sub k}? with a single final state photon is typically enhanced relative to ordinary annihilation ?{sub i}?-bar {sub i} ? ?? into photon pairs. Semi-annihilation allows for a wide range of dark matter masses compared to the fixed mass value required by annihilation, opening the possibility to explain potential dark matter signatures at higher energies. The most striking prediction of semi-annihilation is the presence of multiple gamma lines, with as many as order N{sup 3} lines possible for N dark sector states, allowing for dark sector spectroscopy. A smoking gun signature arises in the simplest case of degenerate dark matter, where a strong semi-annihilation line at 130 GeV would be accompanied by a weaker annihilation line at 173 GeV. As a proof of principle, we construct two explicit models of dark matter semi-annihilation, one based on non-Abelian vector dark matter and the other based on retrofitting Rayleigh dark matter.

D'Eramo, Francesco [Department of Physics, University of California, Berkeley, CA 94720 (United States); McCullough, Matthew; Thaler, Jesse, E-mail: fraderamo@berkeley.edu, E-mail: mccull@mit.edu, E-mail: jthaler@mit.edu [Center for Theoretical Physics, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States)

2013-04-01T23:59:59.000Z

206

T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities 6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities March 14, 2011 - 3:05pm Addthis PROBLEM: Oracle has acknowledged multiple vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to compromise a user's system. PLATFORM: Sun Solaris 10 ABSTRACT: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. reference LINKS: Secunia Advisory: SA43747 Oracle Sun Advisory: CVE Multiple Vulnerabilities in Adobe Flash Player Secure List: SA43747 Oracle Sun Support Adobe Flash Player for Linux and Solaris IMPACT ASSESSMENT: High Discussion: Oracle has acknowledged multiple vulnerabilities in Solaris, which can be exploited by malicious people to disclose sensitive information, bypass

207

Prompt neutron multiplicities for the transplutonium nuclides  

SciTech Connect (OSTI)

The direct determination of the average prompt neutron emission values is reviewed, and a method of comparing different sites of neutron emission multiplicity distribution values is described. Measured and recommended values are tabulated for these nuclides: /sup 241/Am, /sup 242/Am, /sup 242/Cm, /sup 243/Cm, /sup 244/Cm, /sup 246/Cm, /sup 247/Cm, /sup 248/Cm, /sup 250/Cm, /sup 245/Cm, /sup 249/Bk, /sup 246/Cf, /sup 249/Cf, /sup 250/Cf, /sup 252/Cf, /sup 254/Cf, /sup 251/Cf, /sup 253/Es, /sup 254/Es, /sup 244/Fm, /sup 246/Fm, /sup 255/Fm, /sup 252/No, /sup 254/Fm, /sup 256/Fm, /sup 257/Fm. 59 refs., 24 tabs. (LEW)

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

208

Free Energy of Multiple Overlapping Chains  

Science Journals Connector (OSTI)

How accurate is pair additivity in describing interactions between soft polymer-based nanoparticles? Using numerical simulations we compute the free energy cost required to overlap multiple chains in the same region of space, and provide a quantitative measure of the effectiveness of pair additivity as a function of chain number and length. Our data suggest that pair additivity can indeed become quite inadequate as the chain density in the overlapping region increases. We also show that even a scaling theory based on polymer confinement can only partially account for the complexity of the problem. In fact, we unveil and characterize an isotropic to star-polymer crossover taking place for large number of chains, and propose a revised scaling theory that better captures the physics of the problem.

Katherine Klymko and Angelo Cacciuto

2011-12-27T23:59:59.000Z

209

Multiple crossbar network: Integrated supercomputing framework  

SciTech Connect (OSTI)

At Los Alamos National Laboratory, site of one of the world's most powerful scientific supercomputing facilities, a prototype network for an environment that links supercomputers and workstations is being developed. Driven by a need to provide graphics data at movie rates across a network from a Cray supercomputer to a Sun scientific workstation, the network is called the Multiple Crossbar Network (MCN). It is intended to be coarsely grained, loosely coupled, general-purpose interconnection network that will vastly increase the speed at which supercomputers communicate with each other in large networks. The components of the network are described, as well as work done in collaboration with vendors who are interested in providing commercial products. 9 refs.

Hoebelheinrich, R. (Los Alamos National Lab., NM (USA))

1989-01-01T23:59:59.000Z

210

Multiple predictor smoothing methods for sensitivity analysis.  

SciTech Connect (OSTI)

The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric regression techniques are described: (1) locally weighted regression (LOESS), (2) additive models, (3) projection pursuit regression, and (4) recursive partitioning regression. The indicated procedures are illustrated with both simple test problems and results from a performance assessment for a radioactive waste disposal facility (i.e., the Waste Isolation Pilot Plant). As shown by the example illustrations, the use of smoothing procedures based on nonparametric regression techniques can yield more informative sensitivity analysis results than can be obtained with more traditional sensitivity analysis procedures based on linear regression, rank regression or quadratic regression when nonlinear relationships between model inputs and model predictions are present.

Helton, Jon Craig; Storlie, Curtis B.

2006-08-01T23:59:59.000Z

211

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

212

U-104: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe Flash Player Multiple Vulnerabilities 4: Adobe Flash Player Multiple Vulnerabilities U-104: Adobe Flash Player Multiple Vulnerabilities February 16, 2012 - 6:30am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.1.102.55 and prior for Windows, Macintosh, Linux, and Solaris Adobe Flash Player versions 11.1.112.61 and prior for Android 4.x Adobe Flash Player versions 11.1.111.5 and prior for Android 3.x and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. reference LINKS: Adobe Security Bulletin Secunia Advisory 48033 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Adobe Flash Player, which

213

U-249: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

49: Google Chrome Multiple Vulnerabilities 49: Google Chrome Multiple Vulnerabilities U-249: Google Chrome Multiple Vulnerabilities August 31, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome 21.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome. reference LINKS: Secunia Advisory SA50447 Stable Channel Update CVE-2012-2865 CVE-2012-2866 CVE-2012-2867 CVE-2012-2868 CVE-2012-2869 CVE-2012-2870 CVE-2012-2871 CVE-2012-2872 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. 1) An out-of-bounds read error exists when handling line breaks. 2) A bad cast error exists within run-ins.

214

V-121: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Google Chrome Multiple Vulnerabilities 1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: versions prior to 26.0.1410.43. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Secunia Advisory SA52761 CVE-2013-0916 CVE-2013-0917 CVE-2013-0918 CVE-2013-0919 CVE-2013-0920 CVE-2013-0921 CVE-2013-0922 CVE-2013-0923 CVE-2013-0924 CVE-2013-0925 CVE-2013-0926 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. IMPACT: 1) A use-after-free error exists in Web Audio.

215

V-105: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Vulnerabilities 5: Google Chrome Multiple Vulnerabilities V-105: Google Chrome Multiple Vulnerabilities March 6, 2013 - 12:09am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome prior to 25.0.1364.152. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Stable Channel Update Secunia Advisory SA52454 CVE-2013-0902 CVE-2013-0903 CVE-2013-0904 CVE-2013-0905 CVE-2013-0906 CVE-2013-0907 CVE-2013-0908 CVE-2013-0909 CVE-2013-0910 CVE-2013-0911 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities in Google Chrome may have an unknown impact and others can be exploited by malicious people to compromise a user's system. 1) A use-after-free error exists in frame loader. 2) A use-after-free error exists in browser navigation handling.

216

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

217

Organic light emitting device having multiple separate emissive layers  

DOE Patents [OSTI]

An organic light emitting device having multiple separate emissive layers is provided. Each emissive layer may define an exciton formation region, allowing exciton formation to occur across the entire emissive region. By aligning the energy levels of each emissive layer with the adjacent emissive layers, exciton formation in each layer may be improved. Devices incorporating multiple emissive layers with multiple exciton formation regions may exhibit improved performance, including internal quantum efficiencies of up to 100%.

Forrest, Stephen R. (Ann Arbor, MI)

2012-03-27T23:59:59.000Z

218

Measuring multiple residual-stress components using the contour method and multiple cuts  

SciTech Connect (OSTI)

The conventional contour method determines one component of stress over the cross section of a part. The part is cut into two, the contour of the exposed surface is measured, and Bueckner's superposition principle is analytically applied to calculate stresses. In this paper, the contour method is extended to the measurement of multiple stress components by making multiple cuts with subsequent applications of superposition. The theory and limitations are described. The theory is experimentally tested on a 316L stainless steel disk with residual stresses induced by plastically indenting the central portion of the disk. The stress results are validated against independent measurements using neutron diffraction. The theory has implications beyond just multiple cuts. The contour method measurements and calculations for the first cut reveal how the residual stresses have changed throughout the part. Subsequent measurements of partially relaxed stresses by other techniques, such as laboratory x-rays, hole drilling, or neutron or synchrotron diffraction, can be superimposed back to the original state of the body.

Prime, Michael B [Los Alamos National Laboratory; Swenson, Hunter [Los Alamos National Laboratory; Pagliaro, Pierluigi [U. PALERMO; Zuccarello, Bernardo [U. PALERMO

2009-01-01T23:59:59.000Z

219

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Broader source: Energy.gov (indexed) [DOE]

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

220

Building multiple adsorption sites in porous polymer networks...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Building multiple adsorption sites in porous polymer networks for carbon capture applications Previous Next List Weigang Lu, Wolfgang M. Verdegaal, Jiamei Yu, Perla B Balbuena,...

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

ALS Capabilities Reveal Multiple Functions of Ebola Virus  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ALS Capabilities Reveal Multiple Functions of Ebola Virus Print A central dogma of molecular biology is that a protein's sequence dictates its fold, and the fold dictates its...

222

A Photovoltaic Test Platform Realized with Multiple Independent Outputs.  

E-Print Network [OSTI]

??In this thesis, a project to design and build a photovoltaic test platform is discussed. Essentially, it is a photovoltaic simulator designed to have multiple… (more)

Crawford, Kevin P.

2011-01-01T23:59:59.000Z

223

Smoothing of the cosmic background radiation by multiple gravitational scattering  

Science Journals Connector (OSTI)

We investigated the smoothing of the cosmic background radiation (CBR) ... rays increases exponentially through multiple scatterings. This exponential growth occurs if the distance is smaller...

Junichiro Making

1994-01-01T23:59:59.000Z

224

Multiplex Chaos Synchronization in Semiconductor Lasers with Multiple Optoelectronic Feedbacks  

E-Print Network [OSTI]

Secure chaos based multiplex communication system scheme is proposed utilizing globally coupled semiconductor lasers with multiple variable time delay optoelectronic feedbacks.

E. M. Shahverdiev; K. A. Shore

2011-11-06T23:59:59.000Z

225

Carrier Multiplication in Nanocrystal Quantum Dots and Solar Energy Conversion  

Science Journals Connector (OSTI)

This paper discusses aspects of carrier multiplication (multiexciton generation by single photons) in semiconductor nanocrystals such as its mechanism, competing relaxation channels,...

Klimov, Victor I

226

Project Profile: CSP Energy Storage Solutions - Multiple Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

CSP Energy Storage Solutions - Multiple Technologies Compared US Solar Holdings logo US Solar Holdings, under the Thermal Storage FOA, is aiming to demonstrate commercial,...

227

Multiple frequency electron cyclotron heating for the Levitated Dipole Experiment .  

E-Print Network [OSTI]

??The use of multiple frequencies of electron cyclotron resonance heating (ECRH) in the Levitated Dipole Experiment (LDX) is an important tool that will tailor the… (more)

Mahar, Scott B

2005-01-01T23:59:59.000Z

228

Poly(dimethylsiloxane) microchip-based immunoassay with multiple...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

immunoassay with multiple reaction zones: Toward on-chip multiplex detection platform. Abstract: In this work, a poly(dimethylsiloxane) (PDMS) microchip-based immuno-sensing...

229

Multiple phase estimation in quantum cloning machines  

E-Print Network [OSTI]

Since the initial discovery of the Wootters-Zurek no-cloning theorem, a wide variety of quantum cloning machines have been proposed aiming at imperfect but optimal cloning of quantum states within its own context. Remarkably, most previous studies have employed the Bures fidelity or the Hilbert-Schmidt norm as the figure of merit to characterize the quality of the corresponding cloning scenarios. However, in many situations, what we truly care about is the relevant information about certain parameters encoded in quantum states. In this work, we investigate the multiple phase estimation problem in the framework of quantum cloning machines, from the perspective of quantum Fisher information matrix (QFIM). Focusing on the generalized d-dimensional equatorial states, we obtain the analytical formulas of QFIM for both universal quantum cloning machine (UQCM) and phase-covariant quantum cloning machine (PQCM), and prove that PQCM indeed performs better than UQCM in terms of QFIM. We highlight that our method can be generalized to arbitrary cloning schemes where the fidelity between the single-copy input and output states is input-state independent. Furthermore, the attainability of the quantum Cramer-Rao bound is also explicitly discussed.

Yao Yao; Li Ge; Xing Xiao; Xiao-guang Wang; Chang-pu Sun

2014-07-22T23:59:59.000Z

230

(Prefix) Chemical Company Amount Location Quantity(>1) acetone dimethyl acetal MCB 500g 1013 YC #1  

E-Print Network [OSTI]

refridge. 3 N- acetyl L-tyrosine Aldrich 5g refridge. acetylacetone Pfaltz & Bauer 500g 1013 YC #1 1 Chloride Engelhard 10 g 1013 MC #1 Ammonium iron( II) sulfate hexahydrate Sigma 100g 1013 MC #1 #12

Turro, Claudia

231

Iterative Equalization for Single-Carrier Cyclic-Prefix in Doubly-Dispersive Channels  

E-Print Network [OSTI]

is assumed at least as long as the channel impulse response, can be written [3] r = Htls + . (1) Here

Schniter, Philip

232

High-Speed Prefix-Preserving IP Address Anonymization for Passive Measurement Systems  

E-Print Network [OSTI]

to attacks between conventional anonymization and our approach shows that TSA performs better for small scale trace, sensitive header fields need to be sanitized. In most cases these fields are the IP source

Shenoy, Prashant

233

E-Print Network 3.0 - adverbially prefixal verbs Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(ACL) Anthology Collection: Computer Technologies and Information Sciences 6 VIRTEX -a German-Russlan Translation Experiment B. Busehbeck, R. Hensehel, I. H6ser, G. Klimonow, A....

234

(Use the prefix 2293 to dial 4-digit IISc numbers from outside)  

E-Print Network [OSTI]

Finance and Accounts 2E 15 Main Building 3D 36 AlUMNI ASSOCIATION 2D 23 AMENITIES Amenities Hall 2E 22 Institute) 2E 53 Swimming Pool 3D 64 Tata Memorial Science Club (TMSC) 2D 21 Tata Book House 3E 78 AUDITORIA Choksi Hall 2E 52 Faculty Hall 3D 36 J N Tata Auditorium (NSSC) 3E 54 Satish Dhawan Auditorium (CSIC) 3E

Srinivasan, N.

235

"No.","Treasury Appropriation Symbol","Title/Program","Total Appropriation","Total Obligations","Total Disbursements"  

Broader source: Energy.gov (indexed) [DOE]

Weekly Update Report Data (sheet 1 of 2) Version 1.0" Weekly Update Report Data (sheet 1 of 2) Version 1.0" ,"Agency Name:","Department of Energy" ,"Week Start Date:",39867 ,"Submitter Name:","David Abercrombie" ,"Submitter Contact Info:","David.Abercrombie@hq.doe.gov" "No.","Treasury Appropriation Symbol","Title/Program","Total Appropriation","Total Obligations","Total Disbursements" 1,"89-09/10-0211","Fossil Energy Research and Development, Recovery Act",3400000000,0,0 2,"89-09/10-0227","Science, Recovery Act",1600000000,0,0 3,"89-09/12-0237","Inspector General, Recovery Act",15000000,0,0 4,"89-09/10-0253","Defense Environmental Cleanup, Recovery Act",5127000000,0,0

236

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance  

E-Print Network [OSTI]

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance J. J. Westman-7045 USA Abstract A compartment model for the evolution of cancer subject to multiple chemotherapeutic agents is presented. The formulation accounts for the heterogeneous nature of cancer and drug resistance

Hanson, Floyd B.

237

Coordinated Output Regulation of Multiple Heterogeneous Linear Systems  

E-Print Network [OSTI]

, the generalizations of coordination of multiple linear dynamic systems to the cooperative output regulation problemCoordinated Output Regulation of Multiple Heterogeneous Linear Systems Ziyang Meng, Tao Yang, Dimos V. Dimarogonas, and Karl H. Johansson Abstract-- The coordinated output regulation problem

Dimarogonas, Dimos

238

A Multiple Criteria Decision Analysis (MCDA) Software Selection Framework  

Science Journals Connector (OSTI)

With the gaining popularity of multiple criteria decision analysis (MCDA) among researchers and practitioners, a variety of software that implements sophisticated MCDA methods and techniques is now available. To address the issue of the missing methodological ... Keywords: Multiple Criteria Decision Analysis, MCDA, Software evaluation, multicriteria aggregation procedures

Yan Li; Manoj A. Thomas

2014-01-01T23:59:59.000Z

239

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers  

E-Print Network [OSTI]

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers Kyeong Jin Kim of interference from multiple licensed transceivers on cognitive underlay single carrier systems is examined, and 3) interference power from the primary transmitters. For this cognitive underlay single carrier

Elkashlan, Maged

240

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods  

E-Print Network [OSTI]

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods Judith E. Devaney, John G plaster over multiple time periods. We use three dimensional data obtained through X-ray microtomography of the plaster datasets that had been labeled with their autoclass predictions. The rules were found to have both

Fernandez, Thomas

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location  

E-Print Network [OSTI]

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location in Bread Wheat Leonardo A Alien Sources and Its Chromosomal Location in Bread Wheat Abstract Wheat (Triticum aestivum) is a very of this thesis were to: 1) identify novel sources of resistance to multiple aphid species in a wheat-alien

242

Generalized quadratic multiple knapsack problem and two solution approaches  

Science Journals Connector (OSTI)

The Quadratic Knapsack Problem (QKP) is one of the well-known combinatorial optimization problems. If more than one knapsack exists, then the problem is called a Quadratic Multiple Knapsack Problem (QMKP). Recently, knapsack problems with setups have ... Keywords: Combinatorial optimization, F-MSG, Generalized Quadratic Multiple Knapsack Problem (G-QMKP), Genetic Algorithm (GA), Production with plastic injection

Tugba Saraç; Aydin Sipahioglu

2014-03-01T23:59:59.000Z

243

Model Reduction for Power Electronics Systems with Multiple Heat Sources  

E-Print Network [OSTI]

Model Reduction for Power Electronics Systems with Multiple Heat Sources A. Augustin, T. Hauck, B demonstrates the model order re- duction procedures applied to semiconductor devices with multiple heat sources. The approach is demonstrated for a device with nine heat sources where some of them are perma- nently active

Paris-Sud XI, Université de

244

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a  

E-Print Network [OSTI]

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a Single Fiber. In this work, we demonstrate the successful fabrication of an eight-device cascaded optoelectronic fiber of integrating multiple optoelectronic components into a single fiber cross-section. This is in fact a common

California at Irvine, University of

245

Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole Experiment  

E-Print Network [OSTI]

Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole Experiment by Scott B. Mahar on Graduate Students #12;2 #12;Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole frequencies of electron cyclotron resonance heating (ECRH) in the Levitated Dipole Experiment (LDX

246

Complex multiplication, rationality and mirror symmetry for abelian varieties  

E-Print Network [OSTI]

We show that complex multiplication on abelian varieties is equivalent to the existence of a constant rational K\\"ahler metric. We give a sufficient condition for a mirror of an abelian variety of CM-type to be of CM-type as well. We also study the relationship between complex multiplication and rationality of a toroidal lattice vertex algebra.

Meng Chen

2005-12-20T23:59:59.000Z

247

Cooperative target convergence using multiple agents  

SciTech Connect (OSTI)

This work considers the problem of causing multiple (100`s) autonomous mobile robots to converge to a target and provides a follow-the-leader approach to the problem. Each robot has only a limited-range sensor for sending the target and also larger but also limited-range robot-to-robot communication capability. Because of the small amount of information available to the robots, a practical approach to improve convergence to the target is to have a robot follow the robot with the best quality of information. Specifically, each robot emits a signal that informs in-range robots what its status is. A robot has a status value of 0 if it is itself in range of the target. A robot has a status of 1 if it is not in range of the target but is in communication range of a robot that is in range of the target. A robot has a status of 2 if it is not in range of the target but is within range of another robot that has status 1, and so on. Of all the mobile robots that any given robot is in range of, it follows the one with the best status. The emergent behavior is the ant-like trails of robots following each other toward the target. If the robot is not in range of another robot that is either in range of the target or following another robot, the robot will assign-1 to its quality-of-information, and will execute an exhaustive search. The exhaustive search will continue until it encounters either the target or another robot with a nonnegative quality-of-information. The quality of information approach was extended to the case where each robot only has two-bit signals informing it of distance to in-range robots.

Kwok, K.S.; Driessen, B.J.

1997-10-01T23:59:59.000Z

248

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player / AIR Multiple Vulnerabilities 0: Adobe Flash Player / AIR Multiple Vulnerabilities V-090: Adobe Flash Player / AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player / AIR Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.5.502.149 and prior for Windows and Macintosh Adobe Flash Player versions 11.2.202.262 and prior for Linux Adobe Flash Player versions 11.1.115.37 and prior for Android 4.x Adobe Flash Player versions 11.1.111.32 and prior for Android 3.x and 2.x Adobe AIR versions 3.5.0.1060 and prior Adobe AIR versions 3.5.0.1060 SDK and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player and AIR. REFERENCE LINKS: Vulnerability identifier: APSB13-05 Secunia Advisory SA52166 CVE-2013-0637 CVE-2013-0638 CVE-2013-0639

249

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

250

U-100: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0: Google Chrome Multiple Vulnerabilities 0: Google Chrome Multiple Vulnerabilities U-100: Google Chrome Multiple Vulnerabilities February 10, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system. PLATFORM: Google Chrome 16.x ABSTRACT: A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Reference LINKS: Google Announcements and Release Channel Secunia Advisory SA47938 Security Tracker ID 1026654 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some

251

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

252

V-132: IBM Tivoli System Automation Application Manager Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

253

U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities 6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities December 22, 2011 - 6:30am Addthis PROBLEM: Mozilla Firefox / Thunderbird Multiple Vulnerabilities . PLATFORM: Mozilla Firefox 8.x and Mozilla Thunderbird 8.x ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. reference LINKS: Advisory 2011-53 Advisory 2011-54 Advisory 2011-55 Advisory 2011-56 Advisory 2011-57 Advisory 2011-58 Secunia Advisory: SA47302 IMPACT ASSESSMENT: High Discussion: Vulnerabilities have been reported in Mozilla Firefox and Thunderbird, where one has an unknown impact and others can be exploited by malicious people to disclose sensitive information and compromise a user's system. 1) Some unspecified errors can be exploited to corrupt memory. No further

254

V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Firefox Multiple Vulnerabilities 6: Mozilla Firefox Multiple Vulnerabilities V-126: Mozilla Firefox Multiple Vulnerabilities April 4, 2013 - 6:00am Addthis PROBLEM: Mozilla Firefox Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 20.0 ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52770 Secunia Advisory SA52293 Mozilla Security Announcement mfsa2013-30 Mozilla Security Announcement mfsa2013-31 Mozilla Security Announcement mfsa2013-32 Mozilla Security Announcement mfsa2013-34 Mozilla Security Announcement mfsa2013-35

255

V-224: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Google Chrome Multiple Vulnerabilities 4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to compromise a user's system. PLATFORM: Google Chrome 28.x ABSTRACT: The vulnerabilities are reported in versions prior to 29.0.1547.57 REFERENCE LINKS: Secunia Advisory ID: 1028921 CVE-2013-2887 CVE-2013-2900 CVE-2013-2901 CVE-2013-2902 CVE-2013-2903 CVE-2013-2904 CVE-2013-2905 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose

256

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

257

V-132: IBM Tivoli System Automation Application Manager Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

258

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

162: Drupal Multiple Vulnerabilities 162: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

259

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

260

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Broader source: Energy.gov (indexed) [DOE]

V-180: IBM Application Manager For Smart Business Multiple V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin 1640752 Secunia Advisory SA53844 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-2190 CVE-2012-2191 CVE-2012-2203 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4820 CVE-2012-4821 CVE-2012-4822 CVE-2012-4823 CVE-2012-5068 CVE-2012-5069 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

262

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Mozilla Firefox Multiple Vulnerabilities 4: Mozilla Firefox Multiple Vulnerabilities V-214: Mozilla Firefox Multiple Vulnerabilities August 8, 2013 - 2:16am Addthis PROBLEM: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. PLATFORM: Mozilla Firefox 22.x ABSTRACT: The vulnerabilities are reported in versions prior to 23.0. REFERENCE LINKS: Secunia Advisory SA54418 CVE-2013-1701 CVE-2013-1702 CVE-2013-1704 CVE-2013-1705 CVE-2013-1706 CVE-2013-1707 CVE-2013-1709 CVE-2013-1710 CVE-2013-1711 CVE-2013-1713 CVE-2013-1714 CVE-2013-1717 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Mozilla Firefox, which can

263

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

264

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

265

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

266

V-111: Multiple vulnerabilities have been reported in Puppet | Department  

Broader source: Energy.gov (indexed) [DOE]

1: Multiple vulnerabilities have been reported in Puppet 1: Multiple vulnerabilities have been reported in Puppet V-111: Multiple vulnerabilities have been reported in Puppet March 14, 2013 - 12:12am Addthis PROBLEM: Multiple vulnerabilities have been reported in Puppet PLATFORM: Puppet 2.x Puppet 3.x Puppet Enterprise 1.x Puppet Enterprise 2.x ABSTRACT: Puppet Multiple Vulnerabilities REFERENCE LINKS: Puppet Blog Secunia Advisory SA52596 CVE-2013-1640 CVE-2013-1652 CVE-2013-1653 CVE-2013-1654 CVE-2013-1655 CVE-2013-2274 CVE-2013-2275 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error exists when invoking the "template" or "inline_template" functions while responding to a catalog request and can be exploited to execute arbitrary code via a specially crafted catalog request. 2) An input validation error exists in the application and can be exploited

267

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

268

V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8: IBM Lotus Domino Multiple Vulnerabilities 8: IBM Lotus Domino Multiple Vulnerabilities V-118: IBM Lotus Domino Multiple Vulnerabilities March 25, 2013 - 12:40am Addthis PROBLEM: IBM Lotus Domino Multiple Vulnerabilities PLATFORM: IBM Domino 8.x ABSTRACT: Multiple vulnerabilities have been reported in IBM Lotus Domino REFERENCE LINKS: IBM Reference #:1627597 Secunia Advisory SA52753 CVE-2012-6277 CVE-2013-0486 CVE-2013-0487 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error can be exploited to disclose time-limited authentication credentials via the Domino Java Console and subsequently gain otherwise restricted access. Successful exploitation may require certain knowledge of Domino server configuration. 2) An unspecified error in the HTTP server component can be exploited to cause a memory leak and subsequently crash the server.

269

V-097: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Vulnerabilities 7: Google Chrome Multiple Vulnerabilities V-097: Google Chrome Multiple Vulnerabilities February 22, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome PLATFORM: The vulnerabilities are reported in versions prior to Google Chrome 24.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52320 Chrome Stable Channel Update CVE-2013-0879 CVE-2013-0880 CVE-2013-0881 CVE-2013-0882 CVE-2013-0883 CVE-2013-0884 CVE-2013-0885 CVE-2013-0886 CVE-2013-0887 CVE-2013-0888 CVE-2013-0889 CVE-2013-0890 CVE-2013-0891 CVE-2013-0892 CVE-2013-0893

270

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

271

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Broader source: Energy.gov (indexed) [DOE]

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

272

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

273

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

274

U-013: HP Data Protector Multiple Unspecified Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

3: HP Data Protector Multiple Unspecified Vulnerabilities 3: HP Data Protector Multiple Unspecified Vulnerabilities U-013: HP Data Protector Multiple Unspecified Vulnerabilities October 18, 2011 - 9:00am Addthis PROBLEM: HP Data Protector Multiple Unspecified Vulnerabilities. PLATFORM: HP Data Protector Notebook Extension 6.20; HP Data Protector for Personal Computers 7.0 ABSTRACT: Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Document ID: c03054543 SecurityTracker Alert ID: 1026195 Secunia Advisory: SA46468 CVE-2011-3156 CVE-2011-3157 CVE-2011-3158 CVE-2011-3159 CVE-2011-3160 CVE-2011-3161 CVE-2011-3162 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities has been identified with HP Data Protector Notebook Extension. These vulnerabilities could be remotely

275

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

62: Drupal Multiple Vulnerabilities 62: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

276

Multiple pass and multiple layer friction stir welding and material enhancement processes  

DOE Patents [OSTI]

Processes for friction stir welding, typically for comparatively thick plate materials using multiple passes and multiple layers of a friction stir welding tool. In some embodiments a first portion of a fabrication preform and a second portion of the fabrication preform are placed adjacent to each other to form a joint, and there may be a groove adjacent the joint. The joint is welded and then, where a groove exists, a filler may be disposed in the groove, and the seams between the filler and the first and second portions of the fabrication preform may be friction stir welded. In some embodiments two portions of a fabrication preform are abutted to form a joint, where the joint may, for example, be a lap joint, a bevel joint or a butt joint. In some embodiments a plurality of passes of a friction stir welding tool may be used, with some passes welding from one side of a fabrication preform and other passes welding from the other side of the fabrication preform.

Feng, Zhili (Knoxville, TN) [Knoxville, TN; David, Stan A. (Knoxville, TN) [Knoxville, TN; Frederick, David Alan (Harriman, TN) [Harriman, TN

2010-07-27T23:59:59.000Z

277

Midwest Independent System Operator (Multiple States) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Independent System Operator (Multiple States) Independent System Operator (Multiple States) Midwest Independent System Operator (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Montana Program Type Interconnection Provider Midwest Independent System Operator Midwest Independent Transmission System Operator (MISO) is a Regional Transmission Organization, which administers wholesale electricity markets in all or parts of 11 U.S. states and the Canadian province of Manitoba. MISO administers electricity transmission grids across the Midwest and into Canada, and provides tools, transmission planning strategies, and integration for utilities in those markets.

278

Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) |  

Broader source: Energy.gov (indexed) [DOE]

Western Interstate Nuclear Compact State Nuclear Policy (Multiple Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor Industrial Institutional Investor-Owned Utility Local Government Municipal/Public Utility Nonprofit Retail Supplier Rural Electric Cooperative State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Arizona Program Type Siting and Permitting Provider Western Interstate Energy Board Legislation authorizes states' entrance into the Western Interstate Nuclear Compact, which aims to undertake the cooperation of participating states in

279

Southern States Energy Compact (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Alabama Program Type Environmental Regulations Industry Recruitment/Support Provider Southern States Energy Board

280

Delaware River Basin Commission (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) < Back Eligibility Utility Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Tribal Government Systems Integrator Savings Category Water Buying & Making Electricity Home Weatherization Program Info Start Date 1961 State Delaware Program Type Environmental Regulations Siting and Permitting Provider Project Review Section The Delaware River Basin Commission (DRBC) is a federal-interstate compact government agency that was formed by concurrent legislation enacted in 1961 by the United States and the four basin states (Pennsylvania, New York, New

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Exceeding the Limit in Solar Energy Conversion with Multiple Excitons  

Science Journals Connector (OSTI)

The former comes from the transparence of the semiconductor material to solar radiation with photon energies below the bandgap (Eg), while the latter results from the cooling of hot carriers, initially generated by photon energies above Eg, to the band edges before they are extracted to do work. ... Carrier multiplication or singlet fission can be used to decrease the thermalization loss by converting part of the excess photon energy to multiple electron–hole pairs, thus increasing photocurrent. ... (9) However, such enhancement has little effect on the power conversion efficiency because significant carrier multiplication only occurs at photon energies as high as 4Eg. ...

Xiaoyang Zhu

2013-06-18T23:59:59.000Z

282

Interstate Commission on the Potomac River Basin (Multiple States) |  

Broader source: Energy.gov (indexed) [DOE]

Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) < Back Eligibility Commercial Construction Industrial Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative Systems Integrator Tribal Government Utility Savings Category Water Buying & Making Electricity Home Weatherization Program Info State District of Columbia Program Type Environmental Regulations Siting and Permitting Provider Interstate Commission on the Potomac River Basin The Interstate Commission on the Potomac River Basin's (ICPRB) mission is to enhance, protect, and conserve the water and associated land resources of the Potomac River and its tributaries through regional and interstate

283

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

284

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

91: Oracle Java Multiple Vulnerabilities 91: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.

285

U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

35: Adobe Flash Player Multiple Vulnerabilities 35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should

286

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

287

V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Mozilla Firefox Multiple Vulnerabilities 7: Mozilla Firefox Multiple Vulnerabilities V-187: Mozilla Firefox Multiple Vulnerabilities June 27, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Mozilla Firefox PLATFORM: Mozilla Firefox 21.x ABSTRACT: These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53970 Secunia Advisory SA53953 Mozilla Advisory mfsa2013-49 Mozilla Advisory mfsa2013-50 Mozilla Advisory mfsa2013-51 Mozilla Advisory mfsa2013-53 Mozilla Advisory mfsa2013-55 Mozilla Advisory mfsa2013-56 Mozilla Advisory mfsa2013-59 CVE-2013-1682 CVE-2013-1683 CVE-2013-1684 CVE-2013-1685

288

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8: Google Chrome Multiple Vulnerabilities 8: Google Chrome Multiple Vulnerabilities V-208: Google Chrome Multiple Vulnerabilities August 1, 2013 - 2:32am Addthis PROBLEM: Multiple unspecified vulnerabilities in Google Chrome before 28.0.1500.95 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. PLATFORM: Google Chrome 28.x ABSTRACT: Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA54325 CVE-2013-2881 CVE-2013-2882 CVE-2013-2883 CVE-2013-2884 CVE-2013-2885 CVE-2013-2886 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to

289

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Symantec Web Gateway Multiple Vulnerabilities 3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple Vulnerabilities PLATFORM: 5.0.x prior to 5.0.3 ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system. Reference Links: SecurityTracker Alert ID: 1027078 CVE-2012-0296 CVE-2012-0297 CVE-2012-0298 CVE-2012-0299 IMPACT ASSESSMENT: Medium Discussion: The management interface does not properly authenticate remote users and does not properly validate user-supplied input. A remote user can cause arbitrary scripting code to be executed by the

290

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

291

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

292

T-540: Sybase EAServer Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

40: Sybase EAServer Multiple Vulnerabilities 40: Sybase EAServer Multiple Vulnerabilities T-540: Sybase EAServer Multiple Vulnerabilities January 24, 2011 - 6:16am Addthis PROBLEM: Sybase EAServer Multiple Vulnerabilities PLATFORM: Sybase EAServer versions 6.3 and prior ABSTRACT: Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information. Sybase EAServer versions 6.3 and prior are affected. reference LINKS: Bugtraq ID: 45809 SyBase Advisory IMPACT ASSESSMENT: Medium Discussion: Remote exploitation of a design vulnerability in Sybase EAServer could allow an attacker to install arbitrary web services, this condition can result in arbitrary code execution allowing attacker to gain control over

293

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Shockwave Player Multiple Vulnerabilities 1: Adobe Shockwave Player Multiple Vulnerabilities V-131: Adobe Shockwave Player Multiple Vulnerabilities April 11, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Shockwave Player PLATFORM: The vulnerabilities are reported in versions 12.0.0.112 and prior ABSTRACT: This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system REFERENCE LINKS: Secunia Advisory: SA52981 Adobe Security Bulletin CVE-2013-1383 CVE-2013-1384 CVE-2013-1385 CVE-2013-1386 IMPACT ASSESSMENT: High DISCUSSION: This update resolves : 1) A buffer overflow vulnerability that could lead to code execution 2) Memory corruption vulnerabilities that could lead to code execution 3) Memory leakage vulnerability that could be exploited to reduce the

294

V-125: Cisco Connected Grid Network Management System Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

295

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

296

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco Unified Customer Voice Portal (CVP) Multiple 2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT: Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device. REFERENCE LINKS: Secunia Advisory SA53306 Cisco Advisory ID cisco-sa-20130508-cvp Cisco Applied Mitigation Bulletin CVE-2013-1220 CVE-2013-1221 CVE-2013-1222 CVE-2013-1223 CVE-2013-1224 CVE-2013-1225 IMPACT ASSESSMENT: Medium DISCUSSION:

297

U-187: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe Flash Player Multiple Vulnerabilities 7: Adobe Flash Player Multiple Vulnerabilities U-187: Adobe Flash Player Multiple Vulnerabilities June 11, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Flash Player PLATFORM: Adobe Flash Player 11.2.202.235 and earlier for Windows, Macintosh and Linux Adobe Flash Player 11.1.115.8 and earlier for Android 4.x Adobe Flash Player 11.1.111.9 and earlier for Android 3.x and 2.x Adobe AIR 3.2.0.2070 and earlier for Windows, Macintosh and Android ABSTRACT: Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates

298

V-125: Cisco Connected Grid Network Management System Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

299

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

02:Adobe Photoshop Elements Multiple Memory Corruption 02:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities October 4, 2011 - 11:00am Addthis PROBLEM: Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities. PLATFORM: Adobe Photoshop Elements 8.0 and earlier versions for Windows. ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Adobe Advisory: APSA11-03 SecurityTracker Alert ID: 1026132 SecurityFocus: CVE-2011-2443 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop Elements. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted '.grd' or '.abr' file that,

300

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Broader source: Energy.gov (indexed) [DOE]

4: IBM Tivoli Federated Identity Manager Products Multiple 4: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

302

Multiple time scale based reduction scheme for nonlinear chemical dynamics  

Science Journals Connector (OSTI)

A chemical reaction is often characterized by multiple time scales governing the kinetics of reactants, products and intermediates. We eliminate the fast relaxing intermediates in autocatalytic reaction by tra...

D. Das; D. S. Ray

2013-07-01T23:59:59.000Z

303

Probabilistic Multiple-Linear Regression Modeling for Tropical Cyclone Intensity  

Science Journals Connector (OSTI)

The authors describe the development and verification of a statistical model relating tropical cyclone intensity to the local large-scale environment. A multiple linear regression framework is used to estimate the expected intensity of a tropical ...

Chia-Ying Lee; Michael K. Tippett; Suzana J. Camargo; Adam H. Sobel

304

The Effects of Multiple Green Factors on Condominium Prices  

Science Journals Connector (OSTI)

This paper analyzes the transaction prices of green buildings assessed on the basis of multiple green factors. Our theoretical model demonstrates that the initial green premium can be negative but becomes positiv...

Jiro Yoshida; Ayako Sugiura

2014-04-01T23:59:59.000Z

305

Development of neutron multiplicity counters for safeguards assay  

SciTech Connect (OSTI)

This paper reports on the development of a new generation of neutron multiplicity counters for assaying impure plutonium. The new counters will be able to obtain three measured parameters from the neutron multiplicity distribution and will be able to determine sample mass, multiplication, and (..cap alpha..,n) reaction rate, making it possible to obtain a more matrix-independent assay of moist or impure materials. This paper describes the existing prototype multiplicity counters and evaluates their performance using assay variance as a figure of merit. The best performance to date is obtained with a high-efficiency, low die-away-time thermal neutron counter with shift-register electronics. 10 refs., 2 figs., 4 tabs.

Ensslin, N.

1989-01-01T23:59:59.000Z

306

Depression during exacerbations in multiple sclerosis: the importance of uncertainty  

E-Print Network [OSTI]

The following correlates of depression were examined in a sample of 166 patients with clinically definite relapsing-remitting (n=140) or secondary progressive (n=26) multiple sclerosis: (a) the present state of the patients' ...

Kroencke, Dawn C.; Denney, Douglas R.; Lynch, Sharon G.

2001-08-01T23:59:59.000Z

307

Energy and Isotope Dependence of Neutron Multiplicity Distributions  

E-Print Network [OSTI]

Fission neutron multiplicity distributions are known to be well reproduced by simple Gaussian distributions. Many previous evaluations of multiplicity distributions have adjusted the widths of Gaussian distributions to best fit the measured multiplicity distributions Pn. However, many observables do not depend on the detailed shape of Pn, but depend on the first three factorial moments of the distributions. In the present evaluation, the widths of Gaussians are adjusted to fit the measured 2nd and 3rd factorial moments. The relationships between the first three factorial moments are estimated assuming that the widths of the multiplicity distributions are independent of the initial excitation energy of the fissioning system. These simple calculations are in good agreement with experimental neutron induced fission data up to an incoming neutron energy of 10 MeV.

Lestone, J P

2014-01-01T23:59:59.000Z

308

Identification of critical locations across multiple infrastructures for terrorist actions  

E-Print Network [OSTI]

This paper discusses a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their ...

Patterson, Sean A. (Sean Albert), 1981-

2005-01-01T23:59:59.000Z

309

Robust Optimization with Multiple Ranges: Theory and Application ...  

E-Print Network [OSTI]

While Metan and Thiele [25] introduces multiple ranges for product demand in a simple two-stage robust ..... the market response to the new product. ...... certainty sets. Technical report, Massachusetts Institute of Technology, Cambridge, MA,.

2010-09-23T23:59:59.000Z

310

Competitive behavior of airlines at multiple airport systems  

E-Print Network [OSTI]

The way passenger traffic is distributed at multiple airport systems continues to intrigue air transportation planners, urban planners, and policy-makers as researchers attempt to unravel how airlines, air travelers and ...

Chen, Edmund

1995-01-01T23:59:59.000Z

311

A simulation environment for multiple project resource optimization  

E-Print Network [OSTI]

This thesis develops a numerical simulation environment as a management support tool applicable to the selection and scheduling of multiple, concurrent research and development projects under conditions of constrained ...

Sharkey, John Patrick, 1954-

2004-01-01T23:59:59.000Z

312

Correspondence Clustering: An Approach to Cluster Multiple Related Spatial Datasets  

E-Print Network [OSTI]

Correspondence Clustering: An Approach to Cluster Multiple Related Spatial Datasets Vadeerat spatial datasets. This capability is important for change analysis and contrast mining. In this paper spatial datasets by maximizing cluster interestingness and correspondence between clusters derived from

Eick, Christoph F.

313

A Bayesian hierarchical method for multiple-event seismic location  

Science Journals Connector (OSTI)

......demonstrate BAYHLoc using the set of Nevada Test Site nuclear explosions, for which...location|multiple-event|Nevada Test Site|seismic|stochastic| INTRODUCTION...The Walter (2004) data set of Nevada Test Site (NTS) explosions (Fig. 2a......

Stephen C. Myers; Gardar Johannesson; William Hanley

2007-12-01T23:59:59.000Z

314

Energy and Isotope Dependence of Neutron Multiplicity Distributions  

E-Print Network [OSTI]

Fission neutron multiplicity distributions are known to be well reproduced by simple Gaussian distributions. Many previous evaluations of multiplicity distributions have adjusted the widths of Gaussian distributions to best fit the measured multiplicity distributions Pn. However, many observables do not depend on the detailed shape of Pn, but depend on the first three factorial moments of the distributions. In the present evaluation, the widths of Gaussians are adjusted to fit the measured 2nd and 3rd factorial moments. The relationships between the first three factorial moments are estimated assuming that the widths of the multiplicity distributions are independent of the initial excitation energy of the fissioning system. These simple calculations are in good agreement with experimental neutron induced fission data up to an incoming neutron energy of 10 MeV.

J. P. Lestone

2014-09-17T23:59:59.000Z

315

Effects of Single versus Multiple Warnings on Driver Performance  

E-Print Network [OSTI]

Objective: To explore how a single master alarm system affects drivers’ responses when compared to multiple, distinct warnings. Background: Advanced driver warning systems are intended to improve safety, yet inappropriate ...

Cummings, M. L.

2007-01-01T23:59:59.000Z

316

Wind Power Forecasting Error Distributions over Multiple Timescales: Preprint  

SciTech Connect (OSTI)

In this paper, we examine the shape of the persistence model error distribution for ten different wind plants in the ERCOT system over multiple timescales. Comparisons are made between the experimental distribution shape and that of the normal distribution.

Hodge, B. M.; Milligan, M.

2011-03-01T23:59:59.000Z

317

Volume Visualization of Multiple Alignment of Large Genomic DNA  

E-Print Network [OSTI]

. Another approach to understanding genetic code is through comparison of genomes, or parts of genomes/conservation between positions (http://www.cryst.bbk.ac.uk/BCD/bcdgloss.html). Figure 1 shows an example of a multiple

Utah, University of

318

V-025: Bugzilla Multiple Cross Site Scripting and Information...  

Broader source: Energy.gov (indexed) [DOE]

to version 3.6.12, 4.0.9, or 4.2.4 or apply patches. Addthis Related Articles V-080: Apple iOS Multiple Vulnerabilities T-568: Mozilla Firefox Bugs Let Remote Users Conduct...

319

An instruction issue mechanism for superscalar processors supporting multiple threads  

E-Print Network [OSTI]

An instruction issue mechanism for superscalar processors supporting multiple threads is presented. This mechanism offers the advantages of two of the most popular dynamic scheduling mechanisms: Tomasulo's algorithm and the Dispatch Stack scheme...

Kumar, Salil

1994-01-01T23:59:59.000Z

320

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Broader source: Energy.gov (indexed) [DOE]

94: IBM Tivoli Federated Identity Manager Products Multiple 94: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

322

Multiple Motivations Institutional Change Principle | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle October 8, 2013 - 11:02am Addthis The multiple motivations principle suggests that a portfolio approach-rather than a single strategy-may be required to achieve change. Research demonstrates that people and institutions adopt new behaviors for many reasons. They likely need more than one reason for changing their current behavior. Therefore, people may shift to more sustainable, energy-efficient behaviors in the workplace because those actions are part of the agency's mission, lower costs, make work life easier or healthier, and are the "right thing to do." Methods Because individuals have different motivations, a variety of approaches should be used to change behavior. Such approaches can range widely, from

323

Lenalidomide plus Dexamethasone for High-Risk Smoldering Multiple Myeloma  

Science Journals Connector (OSTI)

...with lenalidomide, in patients with high-risk smoldering multiple myeloma significantly delayed the time to progression to symptomatic disease and resulted in an overall survival benefit. The orally administered treatment regimen was associated with an acceptable toxicity profile. Certain clinical features predict progression from smoldering to overt multiple myeloma. Patients with high-risk features who were treated with lenalidomide and dexamethasone were less likely to have disease progression and had a higher rate of survival than untreated patients.

Mateos M.-V.; Hernández M.-T.; Giraldo P.

2013-08-01T23:59:59.000Z

324

Jaloro': A New Multiple Virus Resistant Hot Yellow Jalapeno Pepper.  

E-Print Network [OSTI]

, with four replications, separated by Duncan's Multiple Range Test, 5% level. 2 Pungency rating: 10 = super hot,S = mild, 1 = nonpungent. Table 7. Comparative performance test of 'Jaloro' compared with other jalapenos, spring 1990, TAES-Weslaco, Texas..., with four replications, separated by Duncan's Multiple Range Test, 5% level. 2 Pungency rating: 10 = super hot,S = mild, 1 = nonpungent. Table 7. Comparative performance test of 'Jaloro' compared with other jalapenos, spring 1990, TAES-Weslaco, Texas...

Villalon, Benigno

1992-01-01T23:59:59.000Z

325

Analysis of Wind Power and Load Data at Multiple Time Scales  

E-Print Network [OSTI]

Analysis of Wind Power and Load Data at Multiple Time ScalesAnalysis of Wind Power and Load Data at Multiple Time ScalesAnalysis of Wind Power and Load Data at Multiple Time Scales

Coughlin, Katie

2011-01-01T23:59:59.000Z

326

Analysis of Wind Power and Load Data at Multiple Time Scales  

E-Print Network [OSTI]

2007. Analysis of Wind Power and Load Data at Multiple Timesd- Analysis of Wind Power and Load Data at Multiple Time35   v Analysis of Wind Power and Load Data at Multiple Time

Coughlin, Katie

2011-01-01T23:59:59.000Z

327

MATLAB Quick Guide Name Description Example  

E-Print Network [OSTI]

MATLAB Quick Guide Symbol/ Command Name Description Example help help Help menu for any command or symbol in MATLAB Help : Help sum % comment MATLAB comment symbol; MATLAB will skip any line beginning for multiplication a = 5 * 5 ; / divide Symbol for division b = 5 / 1 ; ; semi-colon (1) Tells MATLAB to suppress

Smith-Konter, Bridget

328

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection...  

Broader source: Energy.gov (indexed) [DOE]

28: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML Injection Vulnerabilities T-528: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML Injection Vulnerabilities January 5,...

329

Combining frequency and time domain approaches to systems with multiple spike train input and output  

E-Print Network [OSTI]

between neuronal spike trains. Prog Biophys Mol Biol Vapnikto systems with multiple spike train input and output D. R.Keywords Multiple spike trains · Neural coding · Maximum

Brillinger, D. R.; Lindsay, K. A.; Rosenberg, J. R.

2009-01-01T23:59:59.000Z

330

V-099: Honeywell Multiple Products ActiveX Control Remote Code...  

Broader source: Energy.gov (indexed) [DOE]

9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February...

331

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

332

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

333

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

334

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

335

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Oracle Solaris Java Multiple Vulnerabilities 1: Oracle Solaris Java Multiple Vulnerabilities V-051: Oracle Solaris Java Multiple Vulnerabilities December 20, 2012 - 12:15am Addthis PROBLEM: Oracle Solaris Java Multiple Vulnerabilities PLATFORM: Oracle Solaris 11.x ABSTRACT: Oracle has acknowledged multiple vulnerabilities in Java included in Solaris REFERENCE LINKS: Secunia Advisory: SA51618 Secunia Advisory: SA50949 Third Party Vulnerability Resolution Blog in Java 7U9 Third Party Vulnerability Resolution Blog in Java 6U37 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4416 CVE-2012-5067 CVE-2012-5068 CVE-2012-5069 CVE-2012-5070 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5074 CVE-2012-5075 CVE-2012-5076 CVE-2012-5077 CVE-2012-5079 CVE-2012-5081 CVE-2012-5083 CVE-2012-5084

336

CHOS in Production - Multiple Linux Environments on PDSF at NERSC  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CHOS CHOS in Production Multiple Linux Environments on PDSF at NERSC Larry Pezzaglia National Energy Research Scientific Computing Center Lawrence Berkeley National Laboratory April 2012 A commodity Linux cluster at NERSC serving HEP and NS projects 1GbE and 10GbE interconnect In continuous operation since 1996 ~1500 compute cores on ~200 nodes Over 750 TB shared GPFS storage in 17 filesystems Over 650 TB of XRootD storage Supports SL5 and SL6 environments Projects "buy in" to PDSF and the UGE share tree is adjusted accordingly PDSF at NERSC 2 PDSF has a broad user base (including non-CERN and non-LHC projects) Current projects include ALICE, ATLAS, CUORE, Daya Bay, IceCube, KamLAND, Majorana, and STAR Prior projects include BaBaR, CDF, Planck, SNO, and SNFactory PDSF Workloads 3 PDSF must support multiple applications for multiple projects Many are only tested

337

Chesapeake Bay Preservation Programs (Multiple States) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maryland Program Type Siting and Permitting Provider Chesapeake Bay Program The Chesapeake Bay Program is a unique regional partnership that has led

338

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic  

Open Energy Info (EERE)

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Details Activities (1) Areas (1) Regions (0) Abstract: Despite several episodes of ground deformation and intense seismic activity starting in 1978, the Long Valley, California, volcanic area has not produced clearly recognized volcanic tremor. Instead, a variety of atypical microearthquakes have been recorded during these episodes, including events dominated by low-frequency (long-period) or mixed high and low-frequency (hybrid) signals. During a 1997 episode, a number of unusual microearthquakes occurred within a temporary 40-station

339

New England Power Pool (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

England Power Pool (Multiple States) England Power Pool (Multiple States) New England Power Pool (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maine Program Type Interconnection Independent System Operator (ISO) New England helps protect the health of New England's economy and the well-being of its people by ensuring the constant availability of electricity, today and for future generations. ISO New England meets this obligation in three ways: by ensuring the day-to-day reliable operation of New England's bulk power generation and transmission system, by overseeing and ensuring the fair administration of the region's wholesale electricity markets, and by managing comprehensive, regional

340

T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Drupal Prepopulate - Multiple vulnerabilities 7: Drupal Prepopulate - Multiple vulnerabilities T-657: Drupal Prepopulate - Multiple vulnerabilities June 29, 2011 - 3:34pm Addthis PROBLEM: Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. PLATFORM: Prepopulate module for Drupal 6.x versions prior to 6.x-2.2 ABSTRACT: The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. reference LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2011-023 Prepopulate module Prepopulate 6.x-2.2 Update IMPACT ASSESSMENT: High Discussion: The Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. Users privileged to

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

North American Renewables Registry (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

American Renewables Registry (Multiple States) American Renewables Registry (Multiple States) North American Renewables Registry (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State North Carolina Program Type Green Power Purchasing Provider APX The North American Renewables Registry (NAR) provides a Web-based platform trusted to create, track, and manage renewable energy certificate (REC) origination for clean generation facilities and states not covered by one of the existing APX-powered, regional systems. All market participants are able to take advantage of a trusted infrastructure to help manage their role in the market. With the ability to create unique, serialized records

342

Interstate Oil and Gas Conservation Compact (Multiple States) | Department  

Broader source: Energy.gov (indexed) [DOE]

Interstate Oil and Gas Conservation Compact (Multiple States) Interstate Oil and Gas Conservation Compact (Multiple States) Interstate Oil and Gas Conservation Compact (Multiple States) < Back Eligibility Commercial Developer Industrial Investor-Owned Utility Municipal/Public Utility Utility Program Info State Alabama Program Type Environmental Regulations Provider Interstate Oil and Gas Compact Commission The Interstate Oil and Gas Compact Commission assists member states efficiently maximize oil and natural gas resources through sound regulatory practices while protecting the nation's health, safety and the environment. The Commission serves as the collective voice of member governors on oil and gas issues and advocates states' rights to govern petroleum resources within their borders. The Commission formed the Geological CO2 Sequestration Task Force, which

343

Midwest Renewable Energy Tracking System (Multiple States) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Renewable Energy Tracking System (Multiple States) Renewable Energy Tracking System (Multiple States) Midwest Renewable Energy Tracking System (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Illinois Program Type Green Power Purchasing Provider MidWest ISO The Midwest Renewable Energy Tracking System (M-RETS®) tracks renewable energy generation in participating States and Provinces and assists in verifying compliance with individual state/provincial or voluntary Renewable Portfolio Standards (RPS) and objectives. M-RETS® is a tool to keep track of all relevant information about renewable energy produced and delivered in the region. Currently, several States and Provinces participate in M-RETS®: Illinois,

344

Sabine River Compact (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Sabine River Compact (Multiple States) Sabine River Compact (Multiple States) Sabine River Compact (Multiple States) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Savings Category Water Buying & Making Electricity Home Weatherization Program Info State Texas Program Type Siting and Permitting Provider Sabine River Compact Commission The Sabine River Compact Commission administers the Sabine River Compact to ensure that Texas receives its equitable share of quality water from the

345

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

V-205: IBM Tivoli System Automation for Multiplatforms Java V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013 - 4:20am Addthis PROBLEM: IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. PLATFORM: The weakness and the vulnerabilities are reported in versions 3.1 through 3.2.2 running on AIX, Linux, Solaris, and Windows.

346

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

347

Tunable Multiple Layered Dirac Cones in Optical Lattices  

SciTech Connect (OSTI)

We show that multiple layered Dirac cones can emerge in the band structure of properly addressed multicomponent cold fermionic gases in optical lattices. The layered Dirac cones contain multiple copies of massless spin-1/2 Dirac fermions at the same location in momentum space, whose different Fermi velocity can be tuned at will. On-site microwave Raman transitions can further be used to mix the different Dirac species, resulting in either splitting of or preserving the Dirac point (depending on the symmetry of the on-site term). The tunability of the multiple layered Dirac cones allows us to simulate a number of fundamental phenomena in modern physics, such as neutrino oscillations and exotic particle dispersions with E{approx}p{sup N} for arbitrary integer N.

Lan, Z.; Lu, W.; Oehberg, P. [SUPA, Department of Physics, Heriot-Watt University, EH14 4AS, Edinburgh (United Kingdom); Celi, A. [ICFO - Institute of Photonic Sciences Av. Carl Friedrich Gauss, num. 3, E-08860 Castelldefels, Barcelona (Spain); Lewenstein, M. [ICFO - The Institute of Photonic Sciences Av. Carl Friedrich Gauss, num. 3, E-08860 Castelldefels, Barcelona (Spain); ICREA-Institucio Catalana de Recerca i Estudis Avancats, 08010 Barcelona (Spain)

2011-12-16T23:59:59.000Z

348

Multiple X-ray reflection from ionized slabs  

E-Print Network [OSTI]

Multiple reflection of X-rays may be important when an accretion disc and its hot corona have a complicated geometry, or if returning radiation due to gravitational light bending is important, or in emission from a funnel such as proposed in some gamma-ray burst models. We simulate the effects of multiple reflection by modifying the boundary condition for an X-ray illuminated slab. Multiple reflection makes the soft X-ray spectrum steeper (softer) and strengthens broad emission and absorption features, especially the K-shell features of iron. This may be important in explaining the spectra of sources such as the Narrow-Line Seyfert 1 galaxy 1H0707-495.

R. R. Ross; A. C. Fabian; D. R. Ballantyne

2002-06-11T23:59:59.000Z

349

Multiple mobile robots system with network-based subsumption architecture  

Science Journals Connector (OSTI)

In this paper, a unique multiple mobile robots system is proposed to enable engineering students and engineers in the field to efficiently learn subsumption architecture and develop swarm intelligence. The subsumption architecture is known as one of the behaviour-based artificial intelligence. Each of multiple mobile robots within the system has three wheels driven by DC motors and six position sensitive detector (PSD) sensors. Network-based subsumption architecture is considered to realise a schooling behaviour by using only information from the PSD sensors. Further, a server supervisory control is introduced for poor hardware platforms with limitations of software development, i.e., the mobile robots can only behave based on the most simply subdivided reaction behaviours, i.e., reflex actions, generated from agents. Experimental results show interesting behaviour among the multiple mobile robots, such as following, avoidance and schooling.

Fusaomi Nagata; Akimasa Otsuka; Keigo Watanabe; Maki K. Habib

2013-01-01T23:59:59.000Z

350

Effect of multiple scattering on Cerenkov radiation from energetic electrons  

SciTech Connect (OSTI)

Cerenkov radiation can be used as a diagnostic tool to study energetic electrons generated in ultra-intense laser matter interactions. However, electrons suffer scattering with nuclei as they move in a medium. In this article, we theoretically study the effect of multiple scattering on Cerenkov radiation, and obtain analytical formulas under some circumstances. The results show that when the speed of an energetic electron is not close to the light speed in the medium, Cerenkov radiation is just slightly decreased due to multiple scattering. In the case that the electron speed is very close to the light speed in the medium, the effect of multiple scattering becomes significant, and the radiation is dominated by bremsstrahlung.

Zheng Jian [CAS Key Laboratory of Basic Plasma Physics and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China)

2013-01-15T23:59:59.000Z

351

Dynamic force spectroscopy on multiple bonds: experiments and model  

E-Print Network [OSTI]

We probe the dynamic strength of multiple biotin-streptavidin adhesion bonds under linear loading using the biomembrane force probe setup for dynamic force spectroscopy. Measured rupture force histograms are compared to results from a master equation model for the stochastic dynamics of bond rupture under load. This allows us to extract the distribution of the number of initially closed bonds. We also extract the molecular parameters of the adhesion bonds, in good agreement with earlier results from single bond experiments. Our analysis shows that the peaks in the measured histograms are not simple multiples of the single bond values, but follow from a superposition procedure which generates different peak positions.

T. Erdmann; S. Pierrat; P. Nassoy; U. S. Schwarz

2007-12-18T23:59:59.000Z

352

RECORD OF CATEGORICAL EXCLUSION DETERMINATION Project ID No. Multiple  

Broader source: Energy.gov (indexed) [DOE]

Multiple Multiple Title: Third Party Services for SPR Workovers Description: Subcontractor shall furnish all labor, supervision, tools, materials, equipment, supplies, transportation and facilities required to perform remediation workovers of SPR cavern wellbores and brine disposal wells. Typical remediation workovers include cementing a steel liner inside existing cased wellbore, and permanently plugging and abandoning wells. Regulatory Requirements: NEPA Implementing Procedures (10 CFR 1021) 10 CFR 1021.410 (Application of Categorical Exclusions) (a) The actions listed in Appendices A and B of Subpart D are classes of actions that DOE has determined do not individually or cumulatively have a significant effect on the human environment ( categorical exclusions).

353

Influence of Multiple Scattering on High-energy Deuteron Quasi-optical Birefringence Effect  

E-Print Network [OSTI]

Influence of multiple scattering on high-energy deuteron quasi-optical birefringence effect is discussed.

V. G. Baryshevsky; A. R. Shyrvel

2011-01-12T23:59:59.000Z

354

A Hash-based Scalable IP lookup using Bloom and Fingerprint Filters  

E-Print Network [OSTI]

, a Lulea bitmap with our hash scheme supports a prefix lookup without inflating the numbers of prefixes

Bhuyan, Laxmi N.

355

T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Xen Multiple Buffer Overflow and Integer Overflow 6: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities May 19, 2011 - 3:05pm Addthis PROBLEM: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities PLATFORM: XenSource Xen 3.3.1, XenSource Xen 3.3, XenSource Xen 3.2, XenSource Xen 3.1.2, XenSource Xen 3.1.1, XenSource Xen 3.0.3, XenSource Xen 4.0, XenSource Xen 3.0, RedHat Enterprise Linux Virtualization 5 server, RedHat Enterprise Linux Desktop Multi OS 5 client ,RedHat Enterprise Linux 5 server, Red Hat Fedora 15 ,and Red Hat Enterprise Linux Desktop 5 client ABSTRACT: It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the

356

Acceleration of the matrix multiplication of Radiance three phase  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Acceleration of the matrix multiplication of Radiance three phase Acceleration of the matrix multiplication of Radiance three phase daylighting simulations with parallel computing on heterogeneous hardware of personal computer Title Acceleration of the matrix multiplication of Radiance three phase daylighting simulations with parallel computing on heterogeneous hardware of personal computer Publication Type Journal Article LBNL Report Number LBNL-6461E Year of Publication 2013 Authors Zuo, Wangda, Andrew McNeil, Michael Wetter, and Eleanor S. Lee Journal Journal of Building Performance Simulation Keywords daylighting simulation, graphics processing unit, multicore central processing unit, OpenCL, parallel computing Abstract Building designers are increasingly relying on complex fenestration systems to reduce energy consumed for lighting and HVAC in low energy buildings. Radiance, a lighting simulation program, has been used to conduct daylighting simulations for complex fenestration systems. Depending on the configurations, the simulation can take hours or even days using a personal computer. This paper describes how to accelerate the matrix multiplication portion of a Radiance three-phase daylight simulation by conducting parallel computing on heterogeneous hardware of a personal computer. The algorithm was optimized and the computational part was implemented in parallel using OpenCL. The speed of new approach was evaluated using various daylighting simulation cases on a multicore central processing unit and a graphics processing unit. Based on the measurements and analysis of the time usage for the Radiance daylighting simulation, further speedups can be achieved by using fast I/O devices and storing the data in a binary format.

357

SIC (MUltiple SIgnal Classification) CSP (Cross-power Spectrum Phase)  

E-Print Network [OSTI]

2ch CSP ( ) 1 MU- SIC (MUltiple SIgnal Classification) CSP (Cross- power Spectrum Phase) [1, 2, 3, 4] [5, 6] [7, 8, 9, 10] [7] CSP CSP [8] [9] CSP [10] Estimation of talker's head orientation based (Kobe univ.) [11] 2ch CSP CSP CSP CSP 2 CSP GCC-PHAT (Generalized Cross- Correlation PHAse Transform

Takiguchi, Tetsuya

358

RESEARCH PAPER RACK1 mediates multiple hormone responsiveness and  

E-Print Network [OSTI]

RESEARCH PAPER RACK1 mediates multiple hormone responsiveness and developmental processes China Received 26 January 2006; Accepted 20 April 2006 Abstract The scaffold protein RACK1 (Receptor. The Arabidopsis ge- nome contains three RACK1 orthologues, however, little is known about their functions

Jones, Alan M.

359

MULTIPLE CLASSIFIERS FOR ELECTRONIC NOSE DATA M. Pardo, G. Sberveglieri  

E-Print Network [OSTI]

of two groups of coffees (blends and monovarieties). The main idea of boosting is to produce a sequence for combining the predictions of multiple classifiers (briefly called ensembles) to produce a single classifier Certified Espresso (ICE)) and of 6 single varieties (SV) plus the ICE. The food manufacturing sector is one

Masulli, Francesco

360

Multiple Non-Thermal Reaction Steps for the Photooxidation CO...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Non-Thermal Reaction Steps for the Photooxidation CO to CO2 on Reduced TiO2(110). Multiple Non-Thermal Reaction Steps for the Photooxidation CO to CO2 on Reduced TiO2(110)....

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL  

E-Print Network [OSTI]

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL Jon Hutchins, Alexander Ihler a probabilistic model for predict- ing the occupancy of a building using networks of people-counting sensors-sensor probabilistic model for building occupancy. Inference for the oc- cupancy model follows in Section 4

Smyth, Padhraic

362

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL  

E-Print Network [OSTI]

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL Jon Hutchins, Alexander Ihler a probabilistic model for predict­ ing the occupancy of a building using networks of people­counting sensors­sensor probabilistic model for building occupancy. Inference for the oc­ cupancy model follows in Section 4

Ihler, Alexander

363

Instability of single-phase natural circulation under multiple loops  

SciTech Connect (OSTI)

Natural circulation loop passively conveys heat from heat sources to heat sinks without mechanical pump. Various plants have natural circulation systems, e.g., solar heaters, Light Water Reactor (LWR) and Liquid Metal Fast Breeder Reactor (LMFBR). The core of LMFBR is cooled by forced convection of single-phase liquid sodium in normal operation. After the accident, the decay heat of the core is designed to be cooled by the natural circulation of the liquid sodium. The natural circulation cooling is very important from a viewpoint of passive safety concept. Here, the natural circulation in single loop system had been studied by many researchers. In a multiple loop system, the instability of natural circulation was more complicated because of the interaction between the loops. In this study, the effects of the multiple loop on the natural circulation instability were investigated numerically. The multiple loops system with one heating tube and two cooling tubes were evaluated. The one-dimensional energy and momentum equations were solved using Finite Difference Method. The flow regimes of the instability were evaluated with varying the heat flux. In multiple loop system, the observed flow was classified into five regimes including chaotic regime. The flow regimes were qualitatively explained by the stability of the attractor in the phase space.

Satoh, A.; Okamoto, K.; Madarame, H. [Univ. of Tokyo, Tokai, Ibaraki (Japan). Nuclear Engineering Research Lab.

1996-08-01T23:59:59.000Z

364

Distributed event notification in VANET with multiple service providers  

Science Journals Connector (OSTI)

Many future applications in vehicular networks will be event-driven and will require events generated at different parts of a city to be delivered to moving vehicles in time. We propose a distributed framework for efficient event dissemination with multiple ... Keywords: VANET, distributed event notification, publish-subscribe

Joy Chandra Mukherjee, Saurabh Agarwal, Arobinda Gupta

2014-05-01T23:59:59.000Z

365

Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs  

E-Print Network [OSTI]

Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs Kiran Kumar Matam, prasanna}@usc.edu Abstract--Energy efficiency has emerged as one of the key performance metrics in scientific computing. In this work, we evaluate the energy efficiency of floating point matrix multipli

Prasanna, Viktor K.

366

Boredom and Distraction in Multiple Unmanned Vehicle Supervisory Control  

Science Journals Connector (OSTI)

......Officers' Training Corps experience...unmanned vehicle operating environments...multiple personnel responsible...impact of training on boredom...domains, personnel selection is of practical...personnel selection considerations...stimulate personnel, such as...on-the-job training or possibly......

M.L. Cummings; C. Mastracchio; K.M. Thornburg; A. Mkrtchyan

2013-01-01T23:59:59.000Z

367

Tunnel junction multiple wavelength light-emitting diodes  

DOE Patents [OSTI]

A multiple wavelength LED having a monolithic cascade cell structure comprising at least two p-n junctions, wherein each of said at least two p-n junctions have substantially different band gaps, and electrical connector means by which said at least two p-n junctions may be collectively energized; and wherein said diode comprises a tunnel junction or interconnect. 5 figs.

Olson, J.M.; Kurtz, S.R.

1992-11-24T23:59:59.000Z

368

Multiple Sequence Alignments of Partially Coding Nucleic Acid Sequences  

E-Print Network [OSTI]

Multiple Sequence Alignments of Partially Coding Nucleic Acid Sequences Roman R. Stocsits1 , Ivo L Fe Institute, 1399 Hyde Park Rd., Santa Fe NM 87501, USA Email: Roman R. Stocsits - roman of the available sequence data was pre- sented very recently [12]. SARGLSSTVSLGQFEHWSPR NARNLSDTVS

Stadler, Peter F.

369

Fast Machine Code for Modular Multiplication Michael Scott  

E-Print Network [OSTI]

Fast Machine Code for Modular Multiplication Michael Scott School of Computer Applications Dublin, that is the calculation of a = b e mod n where for acceptable levels of security a, b, e, and n are large multiprecision will be not much larger than the number of bits in the binary representation of e. Therefore fast modular

Bernstein, Daniel

370

Predicting Operator Capacity for Supervisory Control of Multiple UAVs  

E-Print Network [OSTI]

Predicting Operator Capacity for Supervisory Control of Multiple UAVs M.L. Cummings, C. E. Nehme, J, uninhabited (also known as unmanned) ae- rial vehicles (UAVs) have become indispensable assets to militarized forces. UAVs require human guidance to varying degrees and often through several operators. However

Cummings, Mary "Missy"

371

Cooperative Vision Based Estimation and Tracking Using Multiple UAVs  

E-Print Network [OSTI]

Cooperative Vision Based Estimation and Tracking Using Multiple UAVs Brett Bethke, Mario Valenti. Unmanned aerial vehicles (UAVs) are excellent platforms for detecting and tracking objects of interest to give better results than could be achieved with a single UAV, while being robust to failures. In addi

How, Jonathan P.

372

Multiple Field of View MR Fluoroscopy Pelin Aksit,1  

E-Print Network [OSTI]

Multiple Field of View MR Fluoroscopy Pelin Aksit,1 J. Andrew Derbyshire,2 Jean-Michel Serfaty,1 by several investigators (1� 8). Intravascular MR compares favorably with other clini- cal diagnostic methods and Ergin Atalar1* This work describes a real-time imaging and visualization tech- nique that allows

Atalar, Ergin

373

Coordination of multiple appendages in drag-based swimming  

Science Journals Connector (OSTI)

...appendages for multi-oared propulsion. The typical Reynolds number...another example of drag-based propulsion with multiple appendages...of Bill Peterson, Hatfield Marine Center, Newport, OR...of a body with drag-based propulsion. The model provides a quantitative...

2010-01-01T23:59:59.000Z

374

Non-Adaptive Complex Group Testing with Multiple Positive Sets  

E-Print Network [OSTI]

Non-Adaptive Complex Group Testing with Multiple Positive Sets Francis Y.L. Chin, Henry C.M. Leung Given n items with at most d of them having a particular property (referred as positive items), a test-adaptive group testing problem is to design how to group the items to minimize the number of tests required

Chin, Francis Y.L.

375

Demo Abstract: MARVEL: Multiple Antenna based Relative Vehicle Localizer  

E-Print Network [OSTI]

to install especially on existing vehicles and exhibit a tradeoff between accuracy and cost. Similarly, usingDemo Abstract: MARVEL: Multiple Antenna based Relative Vehicle Localizer Dong Li , Tarun Bansal , Zhixue Lu and Prasun Sinha Department of Computer Science and Engineering The Ohio State University

Sinha, Prasun

376

Method and system of integrating information from multiple sources  

DOE Patents [OSTI]

A system and method of integrating information from multiple sources in a document centric application system. A plurality of application systems are connected through an object request broker to a central repository. The information may then be posted on a webpage. An example of an implementation of the method and system is an online procurement system.

Alford, Francine A. (Livermore, CA); Brinkerhoff, David L. (Antioch, CA)

2006-08-15T23:59:59.000Z

377

Multiple copy distillation and purification of phase diffused squeezed states  

E-Print Network [OSTI]

We provide a detailed theoretical analysis of multiple copy purification and distillation protocols for phase diffused squeezed states of light. The standard iterative distillation protocol is generalized to a collective purification of an arbitrary number of N copies. We also derive a semi-analytical expression for the asymptotic limit of the iterative distillation and purification protocol and discuss its properties.

Petr Marek; Jaromir Fiurasek; Boris Hage; Alexander Franzen; James DiGugliemo; Roman Schnabel

2007-08-10T23:59:59.000Z

378

Quantitative crystal structure descriptors from multiplicative congruential generators  

Science Journals Connector (OSTI)

Certain number-theoretic relations, known as multiplicative congruential generators, are developed into quantitative crystal structure descriptors, facilitating a linearization procedure that eventually allows for a concise, fully reconstructable representation of structural information. Potential applications are related to the computational storage, retrieval and analysis of crystal structures, their algorithmic generation in the first place, and their combinatorial enumeration and classification.

Hornfeck, W.

2012-01-12T23:59:59.000Z

379

Multiple Whole Genome Alignments Without a Reference Organism  

SciTech Connect (OSTI)

Multiple sequence alignments have become one of the most commonly used resources in genomics research. Most algorithms for multiple alignment of whole genomes rely either on a reference genome, against which all of the other sequences are laid out, or require a one-to-one mapping between the nucleotides of the genomes, preventing the alignment of recently duplicated regions. Both approaches have drawbacks for whole-genome comparisons. In this paper we present a novel symmetric alignment algorithm. The resulting alignments not only represent all of the genomes equally well, but also include all relevant duplications that occurred since the divergence from the last common ancestor. Our algorithm, implemented as a part of the VISTA Genome Pipeline (VGP), was used to align seven vertebrate and sixDrosophila genomes. The resulting whole-genome alignments demonstrate a higher sensitivity and specificity than the pairwise alignments previously available through the VGP and have higher exon alignment accuracy than comparable public whole-genome alignments. Of the multiple alignment methods tested, ours performed the best at aligning genes from multigene families?perhaps the most challenging test for whole-genome alignments. Our whole-genome multiple alignments are available through the VISTA Browser at http://genome.lbl.gov/vista/index.shtml.

Dubchak, Inna; Poliakov, Alexander; Kislyuk, Andrey; Brudno, Michael

2009-01-16T23:59:59.000Z

380

Robust Retrospective Multiple Change-point for Multivariate Data  

E-Print Network [OSTI]

on a test statistic that generalizes the well- known Kruskal-Wallis procedure to the multivariate setting noise levels and/or high-dimensional data. Keywords: Change-point estimation, multivariate data, Kruskal-Wallis as to deal with multiple change-points (in analogy with the way the classical Kruskal-Wallis test generalizes

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Anatomy of High-Performance Many-Threaded Matrix Multiplication  

Science Journals Connector (OSTI)

BLIS is a new framework for rapid instantiation of the BLAS. We describe how BLIS extends the "GotoBLAS approach" to implementing matrix multiplication (GEMM). While GEMM was previously implemented as three loops around an inner kernel, BLIS exposes ... Keywords: linear algebra, libraries, high-performance, matrix, BLAS, multicore

Tyler M. Smith, Robert van de Geijn, Mikhail Smelyanskiy, Jeff R. Hammond, Field G. Van Zee

2014-05-01T23:59:59.000Z

382

A simple model of multiple climate regimes Kerry Emanuel  

E-Print Network [OSTI]

, and Climate, Massachusetts Institute of Technology, Cambridge, Massachusetts, USA Received 28 June 2001 to a roughly 30% increase in solar insolation over the life of the planet. To this enigma may be added to produce multiple equilibrium states for the same solar forcing. Here we present a simple model

Emanuel, Kerry A.

383

Climate determinism revisited: multiple equilibria in a complex climate model  

E-Print Network [OSTI]

Marshall and Brian Rose Department of Earth, Atmospheric and Planetary Science, Massachusetts Institute of Technology, Cambridge, Massachusetts June 17th, 2010 Submitted to Journal of Climate Corresponding author by incoming solar radiation at the top of the atmosphere. We demonstrate that the multiple equilibria owe

Marshall, John

384

Computationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary  

E-Print Network [OSTI]

windings occurs at the level of individual turns, the method could be applied, but its advantages are lessComputationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary Waveforms and Two- or Three-Dimensional Field Geometry C. R. Sullivan From IEEE Transactions on Power Electronics

385

Extending wordnets by learning from multiple resources Benot Sagot+  

E-Print Network [OSTI]

Extending wordnets by learning from multiple resources Benoît Sagot+ , Darja Fiser* + Alpage, INRIA In this paper we present an automatic, language-independent approach to extend an existing wordnet by recycling existing freely available bilingual resources, such as machine-readable dictionaries and on

Paris-Sud XI, Université de

386

A TEMPORAL MODEL FOR PITCH MULTIPLICITY AND TONAL CONSONANCE  

E-Print Network [OSTI]

A TEMPORAL MODEL FOR PITCH MULTIPLICITY AND TONAL CONSONANCE Peter Cariani Eaton Peabody Laboratory@epl.meei.harvard.edu; www.cariani.com ABSTRACT One aspect of tonal consonance relevant to the pitch stability of chords and harmonic tension concerns the degree to which a collection of notes produces a unified, strong low pitch

Cariani, Peter

387

Social Choice Theory Decision Models with Multiple Criteria  

E-Print Network [OSTI]

Social Choice Theory Decision Models with Multiple Criteria Elise Bonzon 2013-2014 LIPADE / 39 Social Choice Theory #12;Social choice theory Social choice theory Research of a mechanism Choice Theory #12;Social choice theory Social choice theory Research of a mechanism (electoral system

Bonzon, Elise

388

Gary Feldman 1 Fermilab Workshop Multiple Measurements and  

E-Print Network [OSTI]

Gary Feldman 1 Fermilab Workshop Multiple Measurements and Parameters in the Unified Approach Gary Feldman Workshop on Confidence Limits Fermilab March 28, 2000 #12;Gary Feldman 2 Fermilab Workshop Origins Feldman 3 Fermilab Workshop Lack of Uniformly Most Powerful Test · Error of the first kind: Rejecting

Feldman, Gary

389

An Evolutionary Reduction Principle for Mutation Rates at Multiple Loci  

E-Print Network [OSTI]

An Evolutionary Reduction Principle for Mutation Rates at Multiple Loci Lee Altenberg altenber of the reduction principle is found: reduction results at individual loci combine topologically to produce to the reduction principle, and under fine tuning of mutation rates would be expected to have higher mutation rates

Altenberg, Lee

390

Development of a Public Key Infrastructure across Multiple Enterprises  

Science Journals Connector (OSTI)

Main-stream applications are beginning to incorporate public key cryptography. It can be difficult to deploy this technology without a robust infrastructure to support it. It can also be difficult to deploy a public key infra-structure among multiple ...

B. J. Desind; T. M. Sharick; J. P. Long; B. J. Wood

1997-06-01T23:59:59.000Z

391

Nonlinear voltages in multiple-lead coherent conductors  

Science Journals Connector (OSTI)

We use the generalized S-matrix approach to study multiple-lead coherent conductors in the case of finite applied voltages. In this framework we discuss the transverse voltage arising in a four-lead conductor with two symmetric biased leads.

Gordey B. Lesovik and Carlo Presilla

1993-01-15T23:59:59.000Z

392

Boredom and Distraction in Multiple Unmanned Vehicle Supervisory Control  

Science Journals Connector (OSTI)

......Impact in Multiple Unmanned Vehicle Supervisory Control. IEEE...Inverting the Operator/Vehicle Ratio: Approaches to Next...the Association for Unmanned Vehicle Systems International and Flight...592-600. Gibson J.J. The Ecological Approach to Visual Perception......

M.L. Cummings; C. Mastracchio; K.M. Thornburg; A. Mkrtchyan

2013-01-01T23:59:59.000Z

393

Environmental Boundary Tracking and Estimation Using Multiple Autonomous Vehicles  

E-Print Network [OSTI]

and Andrea L. Bertozzi Abstract-- In this paper, we develop a framework for envi- ronmental boundary tracking from multiple sensing vehicles. For each vehicle, a tracking algorithm is developed based on Page, harmful algae blooms, wild fire spreading, temperature and salinity distribution in the ocean

Soatto, Stefano

394

RECENT FIELD EXPERIENCE WITH MULTIPLE COOPERATING SOLAR-POWERED AUVS  

E-Print Network [OSTI]

, the operator would typically observe which SAUV had the most energy reserve based on its acoustic status packets and decide to employ the one with the most energy reserve. The operator would then go through a set of enabling tools and technologies which allow us to test and evaluate multiple cooperating AUVs

395

Fast Implementation of Multiple Oriented Filters Jeffrey E. Boyd  

E-Print Network [OSTI]

Fast Implementation of Multiple Oriented Filters Jeffrey E. Boyd Dept. of Computer Science University of Calgary Calgary AB T2N 1N4 boyd@cpsc.ucalgary.ca Jean Meloche Department of StatisticsDonald and Owen [8] and Hall and Tit­ terington [6]. Similarly, Meloche and Zamar [9] and Boyd and Meloche [3

Boyd, Jeffrey E.

396

Digital Sun Sensor Using Multiple Pinholes Charlie Hersom  

E-Print Network [OSTI]

Digital Sun Sensor Using Multiple Pinholes Charlie Hersom President Spectral Applied Research (905 with CRESTech and the University of Waterloo, has developed a low-cost digital sun sensor for satellite attitude each field-of-view. The Sun is a nearly collimated source and produces a spot on the array via

Hornsey, Richard

397

Optimal sequencing of a cooling tower with multiple cells  

E-Print Network [OSTI]

This paper evaluates the energy savings potential of multi-cell cooling tower optimal sequencing control methods. Annual tower fan energy usage is calculated for a counter-flow tower with multiple variable-speed fans. Effectiveness-NTU tower model...

Zhang, Z.; Liu, J.

2012-01-01T23:59:59.000Z

398

THE PRESENTATION OF MULTIPLE EARCONS IN A SPATIALISED AUDIO SPACE  

E-Print Network [OSTI]

THE PRESENTATION OF MULTIPLE EARCONS IN A SPATIALISED AUDIO SPACE David K McGookin Department://www.dcs.gla.ac.uk/~mcgookdk ABSTRACT In this paper work to improve upon the design of structured audio messages called Earcons for use in a concurrent spatialised audio environment is described. Issues involving the limitations of current Earcon

McGookin, David

399

ENERGY EFFICIENT INTERNET INFRASTRUCTURE  

E-Print Network [OSTI]

. D R A F T October 27, 2010, 11:34pm D R A F T #12;2 ENERGY EFFICIENT INTERNET INFRASTRUCTURE FigureCHAPTER 1 ENERGY EFFICIENT INTERNET INFRASTRUCTURE Weirong Jiang, Ph.D.1 , and Viktor K. Prasanna]. In other words, an IP address may match multiple prefixes, but only the longest D R A F T October 27, 2010

Prasanna, Viktor K.

400

ARM - Publications: Science Team Meeting Documents: Single and Multiple  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Single and Multiple scattering in optically thick multifractal clouds Single and Multiple scattering in optically thick multifractal clouds Grosdidier, Yves McGill University Lovejoy, Shaun McGill University Watson, Brian St. Lawrence University, Physics Department Schertzer, Daniel Ecole Nationale des Ponts et Chauss'es Satellite studies have shown that cloud radiances (at both visible and infra red wavelengths) are scale invariant over scales spanning much of the meteorologically significant range, and airborne lidar data have shown that vertical cross sections of passive scalar clouds are also scaling but with quite different exponents in the horizontal and vertical directions (quantified by an "elliptical dimension" = Del-23/9 close to the empirical value 2.55±0.02). This multifractality is the result of huge

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams (504) Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams (504) Richard Parker,. Parker Geoscience Consulting, LLC, Arvada, Colorado, USA; Zhiyue Xu and Claude Reed, Argonne National Laboratory, Argonne, Illinois, USA; Ramona Graves, Department of Petroleum Engineering, Colorado School of Mines, Golden, Colorado, USA; Brian Gahan and Samih Batarseh, Gas Technology Institute, Des Plaines, Illinois, USA ABSTRACT Studies on drilling petroleum reservoir rocks with lasers show that modern infrared lasers have the capability to spall (thermally fragment), melt and vaporize natural earth materials with the thermal spallation being the most efficient rock removal mechanism. Although laser irradiance as low as 1000 W/cm 2 is sufficient to spall rock, firing the

402

RECORD OF CATEGORICAL EXCLUSION DETERMINATION Project ID No. Multiple  

Broader source: Energy.gov (indexed) [DOE]

Multiple Multiple Title: ADAS System Life Cycle Support, 2012-2015 Description: Subcontractor shall provide annual telephone support and hardware/software update support for the ARINC AIM alarm display and annunciation system (ADAS) security systems used at the SPR from 2012-2015. Regulatory Requirements: NEPA Implementing Procedures (10 CFR 1021) 10 CFR 1021.410 (Application of Categorical Exclusions) (a) The actions listed in Appendices A and B of Subpart D are classes of actions that DOE has determined do not individually or cumulatively have a significant effect on the human environment (categorical exclusions). (b) To find that a proposal is categorically excluded, DOE shall determine the following: (1) The proposed action fits within a class of actions that is listed in Appendix A or B of Subpart D;

403

Benefits of the Multiple Echo Technique for Ultrasonic Thickness Testing  

SciTech Connect (OSTI)

Much effort has been put into determining methods to make accurate thickness measurements, especially at elevated temperatures. An accuracy of +/- 0.001 inches is typically noted for commercial ultrasonic thickness gauges and ultrasonic thickness techniques. Codes and standards put limitations on many inspection factors including equipment, calibration tolerance and temperature variations. These factors are important and should be controlled, but unfortunately do not guarantee accurate and repeatable measurements in the field. Most technicians long for a single technique that is best for every situation, unfortunately, there are no 'silver bullets' when it comes to nondestructive testing. This paper will describe and discuss some of the major contributors to measurement error as well as some advantages and limitations of multiple echo techniques and why multiple echo techniques should be more widely utilized for ultrasonic thickness measurements.

Elder, J.; Vandekamp, R.

2011-02-10T23:59:59.000Z

404

Phenomenology from SIDIS and $e^+e^-$ multiplicities  

E-Print Network [OSTI]

This study is part of a project to investigate the transverse momentum dependence in parton distribution and fragmentation functions, analyzing (semi-)inclusive high-energy processes within a proper QCD framework. We calculate the transverse-momentum-dependent (TMD) multiplicities for $e^+e^-$ annihilation into two hadrons (considering different combinations of pions and kaons) aiming to investigate the impact of intrinsic and radiative partonic transverse momentum and their mixing with flavor. Different descriptions of the non-perturbative evolution kernel are available on the market and there are 200 sets of flavor configurations for the unpolarized TMD fragmentation functions (FFs) resulting from a Monte Carlo fit of Semi-Inclusive Deep-Inelastic Scattering (SIDIS) data at Hermes. We build our predictions of $e^+e^-$ multiplicities relying on this rich phenomenology. The comparison of these calculations with future experimental data (from Belle and Babar collaborations) will shed light on non-perturbative ...

Bacchetta, Alessandro; Radici, Marco; Signori, Andrea

2014-01-01T23:59:59.000Z

405

Self-organizing traffic lights at multiple-street intersections  

E-Print Network [OSTI]

Summary: Traffic light coordination is a complex problem. In this paper, we extend previous work on an abstract model of city traffic to allow for multiple street intersections. We test a self-organizing method in our model, showing that it is close to theoretical optima and superior to a traditional method of traffic light coordination. Abstract: The elementary cellular automaton following rule 184 can mimic particles flowing in one direction at a constant speed. This automaton can therefore model highway traffic. In a recent paper, we have incorporated intersections regulated by traffic lights to this model using exclusively elementary cellular automata. In such a paper, however, we only explored a rectangular grid. We now extend our model to more complex scenarios employing an hexagonal grid. This extension shows first that our model can readily incorporate multiple-way intersections and hence simulate complex scenarios. In addition, the current extension allows us to study and evaluate the behavior of two...

Gershenson, Carlos

2011-01-01T23:59:59.000Z

406

Grouping Parts for Multiple Parts Production in Additive Manufacturing  

Science Journals Connector (OSTI)

Abstract Rapid prototyping (RP) has evolved to Additive Manufacturing (AM) in recent years. It can produce functional or end-use parts with small or even medium quantities. And further, due to its unique layer-by-layer construction principle, it can produce different parts at the same time in a same AM machine. To improve the productivity and machine utilization of AM processes under multiple parts production context, this paper propose the conception of ‘Grouping parts’. Based on the Group Technology (GT) used in traditional processing technologies, a modified Group Technology for AM under multiple parts manufacturing context is presented. To group parts, a set of key attributes affecting the AM production time, cost, quality and work preparation are identified to represent the parts, and then a Grey Clustering method is adopted to conduct the similarity analysis. A simple case study is presented in the end to illustrate the proposed conception and its methodology.

Yicha Zhang; Alain Bernard

2014-01-01T23:59:59.000Z

407

An efficient parallel algorithm for matrix-vector multiplication  

SciTech Connect (OSTI)

The multiplication of a vector by a matrix is the kernel computation of many algorithms in scientific computation. A fast parallel algorithm for this calculation is therefore necessary if one is to make full use of the new generation of parallel supercomputers. This paper presents a high performance, parallel matrix-vector multiplication algorithm that is particularly well suited to hypercube multiprocessors. For an n x n matrix on p processors, the communication cost of this algorithm is O(n/[radical]p + log(p)), independent of the matrix sparsity pattern. The performance of the algorithm is demonstrated by employing it as the kernel in the well-known NAS conjugate gradient benchmark, where a run time of 6.09 seconds was observed. This is the best published performance on this benchmark achieved to date using a massively parallel supercomputer.

Hendrickson, B.; Leland, R.; Plimpton, S.

1993-03-01T23:59:59.000Z

408

Herbig AeBe stars: Multiplicity and consequences  

E-Print Network [OSTI]

By virtue of their young age and intermediate mass, Herbig AeBe stars represent a cornerstone for our understanding of the mass-dependency of both the stellar and planetary formation processes. In this contribution, I review the current state-of-the-art multiplicity surveys of Herbig AeBe stars to assess both the overall frequency of companions and the distribution of key orbital parameters (separation, mass ratio and eccentricity). In a second part, I focus on the interplay between the multiplicity of Herbig AeBe stars and the presence and properties of their protoplanetary disks. Overall, it appears that both star and planet formation in the context of intermediate-mass stars proceeds following similar mechanisms as lower-mass stars.

Duchene, Gaspard

2014-01-01T23:59:59.000Z

409

Dynamic evolutions of multiple toroidal Alfvén eigenmodes with energetic particles  

SciTech Connect (OSTI)

Kinetic simulations based on a reduced model are carried out to study dynamic evolutions of multiple toroidicity-induced shear Alfvén eigenmodes driven by energetic particles. It is found that passing and trapped particles play quite different roles on the mode evolution. For cases without background damping, passing particles lead to a longer linear growth phase and subsequent enhancement of the nonlinear saturation level when resonant regions with two modes are closely overlapped. On the other hand, trapped particles are mainly responsible for the persistent mode growth in the nonlinear phase. By comparing the results from anisotropic and isotropic simulations, it is suggested that passing particles have a negative impact on the mode development in the nonlinear phase. For the near marginal stability cases with large background damping, the upward and downward frequency chirping in multiple branches are significantly affected by the multi-mode interaction due to overlapping of hole and clump in the distribution function.

Zhu, J.; Ma, Z. W. [Institute for Fusion Theory and Simulation, Zhejiang University, Hangzhou, Zhejiang 310027 (China)] [Institute for Fusion Theory and Simulation, Zhejiang University, Hangzhou, Zhejiang 310027 (China); Fu, G. Y. [Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543-0451 (United States)] [Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543-0451 (United States)

2013-12-15T23:59:59.000Z

410

Identification of Severe Multiple Contingencies in Electric PowerSystems  

SciTech Connect (OSTI)

In this work, we propose a computationally feasible approachtodetect severe multiple contingencies. We pose a contingency analysisproblem using a nonlinear optimization framework, which enables ustodetect the fewest possible transmission line outages resulting ina systemfailure of specified severity, and the most severe system failure causedby removing a specified number of transmission lines from service.Illustrations using a three bus system and the IEEE ~;30 bus system aimto exhibit the effectiveness of the proposed approach.

Donde, Vaibhav; Lopez, Vanessa; Lesieutre, Bernard; Pinar, Ali; Yang, Chao; Meza, Juan

2006-06-14T23:59:59.000Z

411

Multiple-state quantum Otto engine, 1D box system  

SciTech Connect (OSTI)

Quantum heat engines produce work using quantum matter as their working substance. We studied adiabatic and isochoric processes and defined the general force according to quantum system. The processes and general force are used to evaluate a quantum Otto engine based on multiple-state of one dimensional box system and calculate the efficiency. As a result, the efficiency depends on the ratio of initial and final width of system under adiabatic processes.

Latifah, E., E-mail: enylatifah@um.ac.id [Laboratory of Theoretical Physics and Natural Philosophy, Physics Department, Institut Teknologi Sepuluh Nopember, ITS, Surabaya, Indonesia and Physics Department, Malang State University (Indonesia); Purwanto, A. [Laboratory of Theoretical Physics and Natural Philosophy, Physics Department, Institut Teknologi Sepuluh Nopember, ITS, Surabaya (Indonesia)

2014-03-24T23:59:59.000Z

412

Code division multiple access signaling for modulated reflector technology  

DOE Patents [OSTI]

A method and apparatus for utilizing code division multiple access in modulated reflectance transmissions comprises the steps of generating a phase-modulated reflectance data bit stream; modifying the modulated reflectance data bit stream; providing the modified modulated reflectance data bit stream to a switch that connects an antenna to an infinite impedance in the event a "+1" is to be sent, or connects the antenna to ground in the event a "0" or a "-1" is to be sent.

Briles, Scott D. (Los Alamos, NM)

2012-05-01T23:59:59.000Z

413

Multiple-well testing in low permeability gas sands  

SciTech Connect (OSTI)

The purpose of this work was to determine the effect of various reservoir and well parameters in order to design a multiple-well pressure transient test to be conducted in low permeability, porosity, gas saturation, net pay thickness and well spacing. Long test times were found to be required for interference or pulse testing in low permeability gas reservoirs; however, the well spacing has been optimized. These calculations were made using two techniques: interference testing and pulse testing.

Bixel, H.; Carroll, H.B. Jr.; Crawley, A.

1980-10-01T23:59:59.000Z

414

Lenalidomide after Stem-Cell Transplantation for Multiple Myeloma  

Science Journals Connector (OSTI)

...survival. Lenalidomide maintenance may increase the time to progression in patients who do not have complete remission after induction therapy and transplantation, thus generating outcomes similar to those for patients with complete remission. Although the response criteria of the International Myeloma... A goal of therapy for multiple myeloma, to induce complete remission and prolong survival, is usually accomplished with combination therapy.1,2 Autologous hematopoietic stem-cell transplantation is often used after induction chemotherapy to improve the ...

McCarthy P.L.; Owzar K.; Hofmeister C.C.

2012-05-10T23:59:59.000Z

415

Multiple-scattering effects on smooth neutron-scattering spectra  

Science Journals Connector (OSTI)

Elastic and inelastic incoherent neutron-scattering experiments are simulated for simple models: a rigid solid (as used for normalization), a glass (with a smooth distribution of harmonic vibrations), and a viscous liquid (described by schematic mode-coupling equations). In cases where the input scattering law factorizes into a wave-number-dependent amplitude and a frequency-dependent spectral distribution, the latter is only weakly affected by multiple scattering, whereas the former is severely distorted.

Joachim Wuttke

2000-11-01T23:59:59.000Z

416

Optimal Power Sharing for Microgrid with Multiple Distributed Generators  

Science Journals Connector (OSTI)

Abstract This paper describes the active power sharing of multiple distributed generators (DGs) in a microgrid. The operating modes of a microgrid are 1) a grid-connected mode and 2) an autonomous mode. During islanded operation, one DG unit should share its output power with other DG units in exact accordance with the load. Unit output power control (UPC) is introduced to control the active power of DGs. The viability of the proposed power control mode is simulated by MATLAB/SIMULINK.

V. Logeshwari; N. Chitra; A. Senthil Kumar; Josiah Munda

2013-01-01T23:59:59.000Z

417

Multiple Compressions in the Middle Energy Plasma Focus Device  

Science Journals Connector (OSTI)

This paper reports some of the results that are aimed to investigate the neutron emission from the middle energy Mather?type plasma focus. These results indicated that with increase the pressure compression time is increase but there is not any direct relation between the compression time and neutron yield. Also it seems that multiple compression regimes is occurred in low pressure and single compression is appeared at higher pressure where is the favorable to neutron production.

H. R. Yousefi; Y. Ejiri; H. Ito; K. Masugata

2006-01-01T23:59:59.000Z

418

Multiple-energy Techniques in Industrial Computerized Tomography  

DOE R&D Accomplishments [OSTI]

Considerable effort is being applied to develop multiple-energy industrial CT techniques for materials characterization. Multiple-energy CT can provide reliable estimates of effective Z (Z{sub eff}), weight fraction, and rigorous calculations of absolute density, all at the spatial resolution of the scanner. Currently, a wide variety of techniques exist for CT scanners, but each has certain problems and limitations. Ultimately, the best multi-energy CT technique would combine the qualities of accuracy, reliability, and wide range of application, and would require the smallest number of additional measurements. We have developed techniques for calculating material properties of industrial objects that differ somewhat from currently used methods. In this paper, we present our methods for calculating Z{sub eff}, weight fraction, and density. We begin with the simplest case -- methods for multiple-energy CT using isotopic sources -- and proceed to multiple-energy work with x-ray machine sources. The methods discussed here are illustrated on CT scans of PBX-9502 high explosives, a lexan-aluminum phantom, and a cylinder of glass beads used in a preliminary study to determine if CT can resolve three phases: air, water, and a high-Z oil. In the CT project at LLNL, we have constructed several CT scanners of varying scanning geometries using {gamma}- and x-ray sources. In our research, we employed two of these scanners: pencil-beam CAT for CT data using isotopic sources and video-CAT equipped with an IRT micro-focal x-ray machine source.

Schneberk, D.; Martz, H.; Azevedo, S.

1990-08-01T23:59:59.000Z

419

Multiple Reference Fourier Transform Holography: Five Images for the Price  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Multiple Reference Fourier Transform Multiple Reference Fourier Transform Holography: Five Images for the Price of One Improving the quality of a high magnification image on an optical microscope is simply a matter of cranking up the intensity of the illumination lamp. The same is true for x-ray microscopes, but complications arise when there just aren't enough x-rays or even worse when the sample is susceptible to damage caused by the intense x-ray beam. To address these challenges we have demonstrated a novel technique for improving the quality of a microscopic image without increasing the x-ray exposure to the specimen. This affords new opportunities to explore materials prone to soft x-ray damage, like polymer or biological samples. Our technique uses coherent x-ray scattering to simultaneously acquire multiple images of a specimen, which can easily be combined later to enhance the image quality. Applying our technique in the weak illumination limit we imaged a nanoscale test object by detecting only 2500 photons.

420

Multiple reheat helium Brayton cycles for sodium fast reactors  

SciTech Connect (OSTI)

Sodium fast reactors (SFR) traditionally adopt the steam Rankine cycle for power conversion. The resulting potential for water-sodium reaction remains a continuing concern which at least partly delays the SFR technology commercialization and is a contributor to higher capital cost. Supercritical CO2 provides an alternative, but is also capable of sustaining energetic chemical reactions with sodium. Recent development on advanced inert-gas Brayton cycles could potentially solve this compatibility issue, increase thermal efficiency, and bring down the capital cost close to light water reactors. In this paper, helium Brayton cycles with multiple reheat and intercooling states are presented for SFRs with reactor outlet temperatures in the range of 510°C to 650°C. The resulting thermal efficiencies range from 39% and 47%, which is comparable with supercritical recompression CO2 cycles (SCO2 cycle). A systematic comparison between multiple reheat helium Brayton cycle and the SCO2 cycle is given, considering compatibility issues, plant site cooling temperature effect on plant efficiency, full plant cost optimization, and other important factors. The study indicates that the multiple reheat helium cycle is the preferred choice over SCO2 cycle for sodium fast reactors.

Haihua Zhao; Per F. Peterson

2008-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

The Political Symbolism of Occupational Health Risks  

Science Journals Connector (OSTI)

In the space of a decade between the late 1960s and 1970s, coal mines and cotton mills in the U.S. were publicly acknowledged to be dangerous places to work because of the dusts in the air. Respiratory disease...

Janet M. Bronstein

1987-01-01T23:59:59.000Z

422

A visual approach to sketched symbol recognition  

E-Print Network [OSTI]

There is increasing interest in building systems that can automatically interpret hand-drawn sketches. However, many challenges remain in terms of recognition accuracy, robustness to different drawing styles, and ability ...

Davis, Randall

423

Accelerator Center: National symbol or white elephant?  

SciTech Connect (OSTI)

This article discusses the possible future of the National Accelerator Center facility in South Africa. This state of the art facility with a 200-megaelectrol-volt proton cyclotron, carries out important nuclear physics research but takes a huge part of South Africa`s total science research budget.

NONE

1995-06-02T23:59:59.000Z

424

Optimizing Symbolic Model Checking for Statecharts  

E-Print Network [OSTI]

on commercial aircraft. The techniques together reduce the time and space requirements by orders of magnitude of the TCAS II and the EPD analyses. Experi- mental results show orders-of-magnitude reduction in the time of the BDDs generated. We identify certain styles for synchronization in state- charts that are more efficient

Beame, Paul

425

Wavelets for waveform coding of digital symbols  

Science Journals Connector (OSTI)

A wavelet-based coder-decoder (codec) structure is defined for baseband waveform coding. Numerical results for bandwidth efficiency are given, and a comparison between several different wavelets is presented. Moreover, it is shown that wavelets obey ...

P.P. Gandhi; S.S. Rao; R.S. Pappu

1997-09-01T23:59:59.000Z

426

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls...

427

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

51: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities February 7, 2011 - 7:56am...

428

Modeling Multiple Ecosystem Services, Biodiversity Conservation, Commodity Production, and Tradeoffs at Landscape Scales  

E-Print Network [OSTI]

Modeling Multiple Ecosystem Services, Biodiversity Conservation, Commodity Production ECOSYSTEM SERVICES_ 4 o Modeling multiple ecosystem services, biodiversity conservation, commodity tradeoff between biodiversity conservation and J?l ecosystem services. Scenarios involving more development

Vermont, University of

429

Distribution of Four-Momentum Transfer in Multiple Meson Productions by High Energy Muons  

Science Journals Connector (OSTI)

......Multiple Meson Productions by High Energy Muons S. Higashi T. Kitamura Y. Mishima...Multiple Meson Productions by High Energy Muons S. Higashi, T. Kitamura, Y...production. Provided that the high energy muon-nucleon inter- actions occur......

S. Higashi; T. Kitamura; Y. Mishima; S. Miyamoto; H. Shibata; Y. Watase; K. Daiyasu; K. Kobayakawa; T. Murota; T. Nakano

1964-01-01T23:59:59.000Z

430

Analysis of oil-pipeline distribution of multiple products subject to delivery time-windows  

E-Print Network [OSTI]

This dissertation defines the operational problems of, and develops solution methodologies for, a distribution of multiple products into oil pipeline subject to delivery time-windows constraints. A multiple-product oil pipeline is a pipeline system...

Jittamai, Phongchai

2006-04-12T23:59:59.000Z

431

Supersymmetric and Kaluza-Klein Particles Multiple Scattering in the Earth  

E-Print Network [OSTI]

http://en.wikipedia.org/wiki/Earth#Chemical composition [12]Multiple Scattering in the Earth The IceCube CollaborationMultiple Scattering in the Earth Ivone F. M. Albuquerque

Albuquerque, Ivone

2009-01-01T23:59:59.000Z

432

Automated metal-free multiple-column nanoLC for improved phosphopeptid...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

metal-free multiple-column nanoLC for improved phosphopeptide analysis sensitivity and throughput. Automated metal-free multiple-column nanoLC for improved phosphopeptide analysis...

433

Propagation models for multiple-antenna systems : methodology, measurements and statistics  

E-Print Network [OSTI]

The trend in wireless communications is towards utilization of multiple antenna systems. While techniques such as beam-forming and spatial diversity have been implemented for some time, the emergence of Multiple-Input ...

Herring, Keith, 1981-

2008-01-01T23:59:59.000Z

434

Low-coherence doppler lidar with multiple time coherence of reference and probe waves  

Science Journals Connector (OSTI)

The notion of multiple time coherence of optical beams is introduced and mathematically ... pulses (MFPs), which exhibit multiple time coherence, and the possibility of their application for ... is based on nanos...

G. G. Matvienko; S. N. Polyakov; V. K. Oshlakov

2007-11-01T23:59:59.000Z

435

GenomeCons: a web server for manipulating multiple genome sequence alignments and their consensus sequences  

Science Journals Connector (OSTI)

......December 2014 brief-report Applications Note GenomeCons: a web server for manipulating multiple genome sequence alignments and...molecular biological processes. In this study, we developed a web server, GenomeCons, for manipulating multiple genome sequence......

Tetsuya Sato; Mikita Suyama

2014-12-01T23:59:59.000Z

436

Multiple Nuclear Localization Signals Mediate Nuclear Localization of the GATA Transcription Factor AreA  

Science Journals Connector (OSTI)

...Reserved. April 2014 research-article Articles Multiple Nuclear Localization Signals...multiple conserved nuclear localization signals...sequence was analyzed for nuclear localization signals using the PSORTII program (51), which identifies...

Cameron C. Hunter; Kendra S. Siebert; Damien J. Downes; Koon Ho Wong; Sara D. Kreutzberger; James A. Fraser; David F. Clarke; Michael J. Hynes; Meryl A. Davis; Richard B. Todd

2014-02-21T23:59:59.000Z

437

Multiple Nuclear Localization Signals Mediate Nuclear Localization of the GATA Transcription Factor AreA  

Science Journals Connector (OSTI)

...April 2014 research-article Articles Multiple Nuclear Localization Signals Mediate Nuclear Localization of the GATA Transcription Factor...Sequence analysis of AreA revealed multiple nuclear localization signals (NLSs), five putative...

Cameron C. Hunter; Kendra S. Siebert; Damien J. Downes; Koon Ho Wong; Sara D. Kreutzberger; James A. Fraser; David F. Clarke; Michael J. Hynes; Meryl A. Davis; Richard B. Todd

2014-02-21T23:59:59.000Z

438

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...  

Broader source: Energy.gov (indexed) [DOE]

6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

439

U.S. Scientific Team Draws on New Data, Multiple Scientific Methodolog...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Team Draws on New Data, Multiple Scientific Methodologies to Reach Updated Estimate of Oil Flows from BP's Well U.S. Scientific Team Draws on New Data, Multiple Scientific...

440

E-Print Network 3.0 - aplastic anaemia multiple Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

multiple organ systems, especially in immunosuppressed patients. We Source: Steinbach, Joe Henry - Washington University Pain Center & Department of Anesthesiology, Washington...

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Linear demultiple solution based on bottom-multiple generator (BMG) approximation: subsalt example  

E-Print Network [OSTI]

convolution of bpa with a0 ......................................... 29 3.7 An illustration of free-surface multiples not predicted in the two steps of the BMG demultiple technique. Note that these types of free-surface multiples are usually............................ 42 4.8 An example of the field of predicted free-surface multiples obtained from the multidimensional convolution of bpa with a 0...

Oladeinde, Abiola Omobolaji

2006-10-30T23:59:59.000Z

442

Microfluidic device for delivery of multiple inks for dip pen nanolithography  

E-Print Network [OSTI]

Microfluidic device for delivery of multiple inks for dip pen nanolithography Juan Alberto Rivas of a microfluidic ink delivery device for delivering multiple species of inks to an array of multiple pens, as well as for maximizing the number of inks for simulta- neous patterning by DPN. The microfluidic device called "Centiwell

Banerjee, Debjyoti

443

Fire-Balls in Pion Multiple Production: Brasil-Japan Collaboration of Chacaltaya Emulsion Chamber Experiment  

Science Journals Connector (OSTI)

......disc-shaped dense gas of mutually interacting...Fire-Balls zn Pion Multiple Production 3 dose not immediately...mechanism of multiple production of mesons is kept essentially...in comparison to its cost. Already in 1968...events of multiple pion production--into the two types......

Jose A. Chinellato; Carola Dobrigkeit; J. Bellandi Filho; Cesar M. G. Lattes; Marcio J. Menon; Carlos E. Navia O.; Ammiraju Pemmaraju; Kotaro Sawayanagi; Edison H. Shibuya; Armando Turtelli; Jr.; Neuza M. Amato; Naoyuki Arata; F. M. Oliveira Castro; Regina H. C. Maldonado; Hiroshi Aoki; Yoichi Fujimoto; Shunichi Hasegawa; Hiroshi Semba; Masanobu Tamada; Kojiro Tanaka; Seibun Yamashita; Toru Shibata; Kei Yokoi; Hiroshi Kumano; Akinori Ohsawa; Takaaki Tabuki

1983-03-01T23:59:59.000Z

444

DOE Designated User Facilities Multiple Laboratories * ARM Climate Research Facility  

Broader source: Energy.gov (indexed) [DOE]

Designated User Facilities Designated User Facilities Multiple Laboratories * ARM Climate Research Facility Argonne National Laboratory * Advanced Photon Source (APS) * Electron Microscopy Center for Materials Research * Argonne Tandem Linac Accelerator System (ATLAS) * Center for Nanoscale Materials (CNM) * Argonne Leadership Computing Facility (ALCF) * Brookhaven National Laboratory * National Synchrotron Light Source (NSLS) * Accelerator Test Facility (ATF) * Relativistic Heavy Ion Collider (RHIC) * Center for Functional Nanomaterials (CFN) * National Synchrotron Light Source II (NSLS-II ) (under construction) Fermi National Accelerator Laboratory * Fermilab Accelerator Complex Idaho National Laboratory * Advanced Test Reactor ** * Wireless National User Facility (WNUF)

445

Multiple piece turbine engine airfoil with a structural spar  

DOE Patents [OSTI]

A multiple piece turbine airfoil having an outer shell with an airfoil tip that is attached to a root with an internal structural spar is disclosed. The root may be formed from first and second sections that include an internal cavity configured to receive and secure the one or more components forming the generally elongated airfoil. The internal structural spar may be attached to an airfoil tip and place the generally elongated airfoil in compression. The configuration enables each component to be formed from different materials to reduce the cost of the materials and to optimize the choice of material for each component.

Vance, Steven J. (Orlando, FL)

2011-10-11T23:59:59.000Z

446

Muon multiplicity at high energy proton-nuclei collisions  

E-Print Network [OSTI]

Estimation of multiplicity of muons and pions production at high energy proton-nuclei collisions is given. Both QED and QCD contributions are considered for peripheral kinematics of muon pair and $\\sigma$-meson production, keeping in mind it's final conversion to muons. An attempt to explain the excess of positive charged muons compared to negative one in cosmic muon showers is given. We derive the dependence of cross-section of $n$ pairs as a function of $n$ at large n as $d^n(n!n^2)^{-1}$.

E. A. Kuraev; S. Bakmaev; V. Bytev; E. Kokoulina

2007-06-29T23:59:59.000Z

447

Multiple thresholds in a model system of noisy ion channels  

Science Journals Connector (OSTI)

Voltage-activated ion channels vary randomly between open and closed states, influenced by the membrane potential and other factors. Signal transduction is enhanced by noise in a simple ion channel model. The enhancement occurs in a finite range of signals; the range can be extended using populations of channels. The range increases more rapidly in multiple-threshold channel populations than in single-threshold populations. The diversity of ion channels may thus be present as a strategy to reduce the metabolic costs of handling a broad class of electrochemical signals.

Michael J. Barber and Manfred L. Ristig

2006-10-19T23:59:59.000Z

448

Probing Aerogels by Multiple Quantum Filtered 131Xe NMR Spectroscopy  

Science Journals Connector (OSTI)

This is demonstrated in Figure 1 where four pulse sequences using multiple quantum filters are shown. ... Pyrex tube at 7.4 T, 1.2 MPa, and 298 K:? (a) double-quantum filtered pulse sequence, (b) magic-angle double-quantum filter which is a T2,±1 pulse sequence, (c) triple-quantum filtered sequence, and (d) triple-quantum filtered inversion recovery pulse sequence. ... 14-16 The tubes have been filled with aerogel fragments of a few millimeter diameter and were pressurized with xenon to about 6.9 MPa at 298 K to create supercritical conditions. ...

Thomas Meersmann; Michaël Deschamps; Geoffrey Bodenhausen

2001-01-13T23:59:59.000Z

449

Multiple Energy Exciton Shelves in Quantum-Dot–DNA Nanobioelectronics  

Science Journals Connector (OSTI)

The DNA molecules joining the QDs form an energetic bridge that provides an efficient conduction pathway for the different energy carriers, capturing the hot electron before it can cool to the bandedge via nonradiative relaxation. ... Interband optical excitation of PbSe NCs at low pump intensities, for which less than one exciton is initially generated per NC on average, results in the formation of two or more excitons (carrier multiplication) when pump photon energies are more than 3 times the NC band gap energy. ...

Samuel M. Goodman; Vivek Singh; Josep Casamada Ribot; Anushree Chatterjee; Prashant Nagpal

2014-10-24T23:59:59.000Z

450

Multiple scattering approach to one?dimensional potential problems  

Science Journals Connector (OSTI)

By calculating the reflection and transmission coefficients for a square potential barrier in terms of a series of scatterings at step potential discontinuities a multiple scattering approach to potential problems is presented. This approach is applied to WKB potential problems by interpreting the WKB connection formulas in terms of reflection and transmission coefficients at each turning point. An algorithm for the systematic construction of the energy Green’s function is given. The significance of complex coordinate turning points is demonstrated. The equivalence of this approach and that of the Gaussian approximation of the path integral is mentioned briefly.

Arlen Anderson

1989-01-01T23:59:59.000Z

451

Magazine system for multiple sample transport from air into UHV  

Science Journals Connector (OSTI)

The time required to exchange specimens in a UHV system can be reduced considerably by a sample airlock. A low-cost sample exchange system is described which was originally constructed for an Auger spectrometer, but may be applied to other UHV systems as well. The essential parts are a magnetically coupled transfer rod, a magazine for the simultaneous transport of six samples, a bayonet clip to fix the samples sequentially to a carousel sample holder and a tilting mechanism in the specimen stage to bring the transferred samples into an optimum position for the further experiment. The system can be adapted to the multiple sample transport between two completely separated UHV systems.

W Pamler; W Reill; S Dorfner; K Roll

1985-01-01T23:59:59.000Z

452

Subdiffusive fluctuations of “pulled” fronts with multiplicative noise  

Science Journals Connector (OSTI)

We study the propagation of a “pulled” front with multiplicative noise that is created by a local perturbation of an unstable state. Unlike a front propagating into a metastable state, where a separation of time scales for sufficiently large t creates a diffusive wandering of the front position about its mean, we predict that for so-called pulled fronts, the fluctuations are subdiffusive with root mean square wandering ?(t)?t1/4, not t1/2. The subdiffusive behavior is confirmed by numerical simulations: For t<~600, these yield an effective exponent slightly larger than 1/4.

Andrea Rocco, Ute Ebert, and Wim van Saarloos

2000-07-01T23:59:59.000Z

453

Fine and Ultrafine Particle Decay Rates in Multiple Homes  

Science Journals Connector (OSTI)

All homes exchange indoor air with outdoor air at a certain base rate dependent on the construction quality of the home and on indoor–outdoor temperature and pressure differences. ... A number of multiple-home studies have measured indoor particle concentrations, but few have been able to determine the rates of particle removal for individual homes under normal living conditions. ... Therefore continuous measurements from this study of FP and UFP in 74 homes in Edmonton Canada were analyzed to determine these rates of removal in each home during week-long measurement periods in summer and winter. ...

Lance Wallace; Warren Kindzierski; Jill Kearney; Morgan MacNeill; Marie-Ève Héroux; Amanda J. Wheeler

2013-10-21T23:59:59.000Z

454

Multiple Time Scales in Diffraction Measurements of Diffusive Surface Relaxation  

Science Journals Connector (OSTI)

We grew SrTiO3 on SrTiO3(001) by pulsed laser deposition, using x-ray scattering to monitor the growth in real time. The time-resolved small-angle scattering exhibits a well-defined length scale associated with the spacing between unit-cell high surface features. This length scale imposes a discrete spectrum of Fourier components and rate constants upon the diffusion equation solution, evident in multiple exponential relaxation of the “anti-Bragg” diffracted intensity. An Arrhenius analysis of measured rate constants confirms that they originate from a single activation energy.

Aaron Fleet; Darren Dale; A. R. Woll; Y. Suzuki; J. D. Brock

2006-02-09T23:59:59.000Z

455

Formation control of multiple mobile robots utilising synchronisation approach  

Science Journals Connector (OSTI)

In this paper, a new synchronous control rule is proposed for multiple mobile robot trajectories tracking while maintaining time varying formation. Each robot is controlled to track the desired path while its motion is synchronised with the two neighbouring robots to perform and maintain a desired time-varying formation. The dynamic model of the wheeled mobile robot is derived and divided into a translational and rotational dynamic model. A new synchronous translational controller is proposed to guarantee the asymptotic stability of both position and synchronisation errors. A simulation result of 20 robots has been conducted to validate the effectiveness of the proposed synchronous controller in the time-varying formation tasks.

Ibrahim M.H. Sanhoury; Shamsudin H.M. Amin; Abdul Rashid Husain

2013-01-01T23:59:59.000Z

456

Development of a public key infrastructure across multiple enterprises  

SciTech Connect (OSTI)

Main-stream applications are beginning to incorporate public key cryptography. It can be difficult to deploy this technology without a robust infrastructure to support it. It can also be difficult to deploy a public key infrastructure among multiple enterprises when different applications and standards must be supported. This discussion chronicles the efforts by a team within the US Department of Energy`s Nuclear Weapons Complex to build a public key infrastructure and deploy applications that use it. The emphasis of this talk will be on the lessons learned during this effort and an assessment of the overall impact of this technology.

Sharick, T.M.; Long, J.P.; Desind, B.J. [and others

1997-05-01T23:59:59.000Z

457

Multiple description transform codes with an application to packetized speech  

E-Print Network [OSTI]

) and for 8 = 3. Comparison of the simulation and the theoretical results. 25 10 Multiple Description Transform Coder. Er, Ez, . . . , Et are ECMDSQ encoders for the transform coefficients, Dr, Dz, . . . , Dc are ECMDSQ decoders. 27 12 Slope A... of the location at which 21 lies). 7 11 10 12 13 15 16 17 21 14 18 20 22 26 19 23 25 27 31 24 28 29 30 32 33 34 Fig. 2. Example of index assignment, 2k + 1 = 5, As previously stated, the central encoder is described by a vector of thresholds (tp, tr...

Batllo, Jean-Christophe Claude

2012-06-07T23:59:59.000Z

458

Effects of the Spatial Extent of Multiple Harmonic Layers  

SciTech Connect (OSTI)

An analytic model for single particle motion in the presence of a wave field and multiple cyclotron harmonics is developed and investigated. The model suggests that even in the absence of Doppler broadening, cyclotron harmonic layers have finite spatial extent. This allows for particles to interact with more than one harmonic layer simultaneously, provided the layers are tightly packed. The latter phenomenon is investigated in the context of the model using symplectic mapping techniques. Then the model behavior is compared with numerical simulations of neutral beam particle trajectories in NSTX using the full-orbit code SPIRAL.

Burby, J. W.; Kramer, G. J.; Phillips, C. K.; Valeo, E. J. [Princeton Plasma Physics Laboratory, Princeton University, Princeton, NJ 08543 (United States)

2011-12-23T23:59:59.000Z

459

Carfilzomib, Lenalidomide, and Dexamethasone for Relapsed Multiple Myeloma  

Science Journals Connector (OSTI)

...there was a significant between-group difference in progression-free survival at the interim analysis, secondary end points were to be sequentially tested in the order of overall survival, overall response rate, and health-related quality of life, each at a one-sided significance level of 0.025. Efficacy... Survival rates have improved for patients with multiple myeloma, yet relapse remains common,1 indicating an ongoing need for new therapeutic approaches. The immunomodulatory agent lenalidomide in combination with high-dose dexamethasone is approved for ...

2014-12-06T23:59:59.000Z

460

A computed tomography implementation of multiple-image radiography  

SciTech Connect (OSTI)

Conventional x-ray computed tomography (CT) produces a single volumetric image that represents the spatially variant linear x-ray attenuation coefficient of an object. However, in many situations, differences in the x-ray attenuation properties of soft tissues are very small and difficult to measure in conventional x-ray imaging. In this work, we investigate an analyzer-based imaging method, called computed tomography multiple-image radiography (CT-MIR), which is a tomographic implementation of the recently proposed multiple-image radiography method. The CT-MIR method reconstructs concurrently three physical properties of the object. In addition to x-ray attenuation, CT-MIR produces volumetric images that represent the refraction and ultrasmall-angle scattering properties of the object. These three images can provide a rich description of the object's physical properties that are revealed by the probing x-ray beam. An imaging model for CT-MIR that is based on the x-ray transform of the object properties is established. The CT-MIR method is demonstrated by use of experimental data acquired at a synchroton radiation imaging beamline, and is compared to the pre-existing diffraction-enhanced imaging CT method. We also investigate the merit of an iterative reconstruction method for use with future clinical implementations of CT-MIR, which we anticipate would be photon limited.

Brankov, Jovan G.; Wernick, Miles N.; Yang Yongyi; Li Jun; Muehleman, Carol; Zhong Zhong; Anastasio, Mark A. [Department of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, Illinois 60616 (United States); Department of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, Illinois 60616 and Department of Biomedical Engineering, Illinois Institute of Technology, Chicago, Illinois 60616 (United States); Rush University Medical Center, Chicago, Illinois 60616 (United States); National Synchrotron Light Source, Brookhaven National Laboratory, Upton, New York 11973 (United States); Department of Biomedical Engineering, Illinois Institute of Technology, Chicago, Illinois 60616 (United States)

2006-02-15T23:59:59.000Z

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Phenomenology from SIDIS and $e^+e^-$ multiplicities  

E-Print Network [OSTI]

This study is part of a project to investigate the transverse momentum dependence in parton distribution and fragmentation functions, analyzing (semi-)inclusive high-energy processes within a proper QCD framework. We calculate the transverse-momentum-dependent (TMD) multiplicities for $e^+e^-$ annihilation into two hadrons (considering different combinations of pions and kaons) aiming to investigate the impact of intrinsic and radiative partonic transverse momentum and their mixing with flavor. Different descriptions of the non-perturbative evolution kernel are available on the market and there are 200 sets of flavor configurations for the unpolarized TMD fragmentation functions (FFs) resulting from a Monte Carlo fit of Semi-Inclusive Deep-Inelastic Scattering (SIDIS) data at Hermes. We build our predictions of $e^+e^-$ multiplicities relying on this rich phenomenology. The comparison of these calculations with future experimental data (from Belle and Babar collaborations) will shed light on non-perturbative aspects of hadron structure, opening important insights into the physics of spin, flavor and momentum structure of hadrons.

Alessandro Bacchetta; Miguel G. Echevarria; Marco Radici; Andrea Signori

2014-09-25T23:59:59.000Z

462

Hanford Technical Basis for Multiple Dosimetry Effective Dose Methodology  

SciTech Connect (OSTI)

The current method at Hanford for dealing with the results from multiple dosimeters worn during non-uniform irradiation is to use a compartmentalization method to calculate the effective dose (E). The method, as documented in the current version of Section 6.9.3 in the 'Hanford External Dosimetry Technical Basis Manual, PNL-MA-842,' is based on the compartmentalization method presented in the 1997 ANSI/HPS N13.41 standard, 'Criteria for Performing Multiple Dosimetry.' With the adoption of the ICRP 60 methodology in the 2007 revision to 10 CFR 835 came changes that have a direct affect on the compartmentalization method described in the 1997 ANSI/HPS N13.41 standard, and, thus, to the method used at Hanford. The ANSI/HPS N13.41 standard committee is in the process of updating the standard, but the changes to the standard have not yet been approved. And, the drafts of the revision of the standard tend to align more with ICRP 60 than with the changes specified in the 2007 revision to 10 CFR 835. Therefore, a revised method for calculating effective dose from non-uniform external irradiation using a compartmental method was developed using the tissue weighting factors and remainder organs specified in 10 CFR 835 (2007).

Hill, Robin L.; Rathbone, Bruce A.

2010-08-01T23:59:59.000Z

463

Multiple time step integrators in ab initio molecular dynamics  

SciTech Connect (OSTI)

Multiple time-scale algorithms exploit the natural separation of time-scales in chemical systems to greatly accelerate the efficiency of molecular dynamics simulations. Although the utility of these methods in systems where the interactions are described by empirical potentials is now well established, their application to ab initio molecular dynamics calculations has been limited by difficulties associated with splitting the ab initio potential into fast and slowly varying components. Here we present two schemes that enable efficient time-scale separation in ab initio calculations: one based on fragment decomposition and the other on range separation of the Coulomb operator in the electronic Hamiltonian. We demonstrate for both water clusters and a solvated hydroxide ion that multiple time-scale molecular dynamics allows for outer time steps of 2.5 fs, which are as large as those obtained when such schemes are applied to empirical potentials, while still allowing for bonds to be broken and reformed throughout the dynamics. This permits computational speedups of up to 4.4x, compared to standard Born-Oppenheimer ab initio molecular dynamics with a 0.5 fs time step, while maintaining the same energy conservation and accuracy.

Luehr, Nathan; Martínez, Todd J. [Department of Chemistry, Stanford University, Stanford, California 94305 (United States) [Department of Chemistry, Stanford University, Stanford, California 94305 (United States); The PULSE Institute, Stanford University, Stanford, California 94305 (United States); SLAC National Accelerator Laboratory, Menlo Park, California 94025 (United States); Markland, Thomas E. [Department of Chemistry, Stanford University, Stanford, California 94305 (United States)] [Department of Chemistry, Stanford University, Stanford, California 94305 (United States)

2014-02-28T23:59:59.000Z

464

Energetics of Multiple-Ion Species Hohlraum Plasmas  

SciTech Connect (OSTI)

A study of the laser-plasma interaction processes in multiple-ion species plasmas has been performed in plasmas that are created to emulate the plasma conditions in indirect drive inertial confinement fusion targets. Gas-filled hohlraums with densities of xe22/cc are heated to Te=3keV and backscattered laser light is measured by a suite of absolutely calibrated backscatter diagnostics. Ion Landau damping is increased by adding hydrogen to the CO2/CF4 gas fill. We find that the backscatter from stimulated Brillouin scattering is reduced is monotonically reduced with increasing damping, demonstrating that Landau damping is the controlling damping mechanism in ICF relevant high-electron temperature plasmas. The reduction in backscatter is accompanied by a comparable increase in both transmission of a probe beam and an increased hohlraum radiation temperature, showing that multiple-ion species plasmas improve the overall hohlraum energetics/performance. Comparison of the experimental data to linear gain calculations as well as detailed full-scale 3D laser-plasma interaction simulations show quantitative agreement. Our findings confirm the importance of Landau damping in controlling backscatter from high-electron temperature hohlraum plasmas and have lead to the inclusion of multi-ion species plasmas in the hohlraum point design for upcoming ignition campaigns at the National Ignition Facility.

Neumayer, P; Berger, R; Callahan, D; Divol, L; Froula, D; London, R; MacGowan, B J; Meezan, N; Michel, P; Ross, J S; Sorce, C; Widmann, K; Suter, L; Glenzer, S H

2007-11-05T23:59:59.000Z

465

Multiple models decentralized coordinated control of doubly fed induction generator  

Science Journals Connector (OSTI)

Abstract In this paper, a multiple model optimal tracking control (MOTC) design method for the double fed induction generator (DFIG) using correlative measured technique is proposed. The DFIG is represented by a third-order model, where electro-magnetic transients of stator are neglected. By using the correlative measured technique, the correlative measured matrix (CMM) of wind power system is obtained firstly. Then, a nonstandard state space equation of DFIG is obtained with the correlative measured vectors (CMVs), which reflect interactions between the \\{DFIGs\\} and grid. In order to cope with nonlinearities and continuous variation in the operating points, a multiple model design method is proposed in the discrete domain. The obtained control law, synthesized by using Bayesian probability, only depends on the local measured parameters. Hence, the MOTC can be regarded as a decentralized coordinated control, which can simplify the control structure and improve the transient stability of DFIG. To illustrate the effectiveness of the proposed MOTC strategy, simulations on a hybrid wind thermal power (HWTP) system are performed. The results show that the proposed MOTC strategy can provide acceptable performance throughout the whole operating region. Comparing to the conventional PID control, transient stability, damping, and fault ride-through capability of DFIG with the proposed MOTC design method have been improved effectively.

Yu-guang Niu; Xiao-ming Li; Zhong-wei Lin; Ming-yang Li

2015-01-01T23:59:59.000Z

466

Quantum Dot Solar Cells: High Efficiency through Multiple Exciton Generation  

SciTech Connect (OSTI)

Impact ionization is a process in which absorbed photons in semiconductors that are at least twice the bandgap can produce multiple electron-hole pairs. For single-bandgap photovoltaic devices, this effect produces greatly enhanced theoretical thermodynamic conversion efficiencies that range from 45-85%, depending upon solar concentration, the cell temperature, and the number of electron-hole pairs produced per photon. For quantum dots (QDs), electron-hole pairs exist as excitons. We have observed astoundingly efficient multiple exciton generation (MEG) in QDs of PbSe (bulk Eg = 0.28 eV), ranging in diameter from 3.9 to 5.7nm (Eg = 0.73, 0.82, and 0.91 eV, respectively). The effective masses of electron and holes are about equal in PbSe, and the onset for efficient MEG occurs at about three times the QD HOMO-LUMO transition (its ''bandgap''). The quantum yield rises quickly after the onset and reaches 300% at 4 x Eg (3.64 eV) for the smallest QD; this means that every QD in the sample produces three electron-hole pairs/photon.

Hanna, M. C.; Ellingson, R. J.; Beard, M.; Yu, P.; Micic, O. I.; Nozik, A. J.; c.

2005-01-01T23:59:59.000Z

467

Extramedullary progression of multiple myeloma despite concomitant medullary response to multiple combination therapies and autologous transplant: a case report  

E-Print Network [OSTI]

-line JOURNAL OF MEDICAL CASE REPORTS Kasi Loknath Kumar et al. Journal of Medical Case Reports 2014, 8:299 http://www.jmedicalcasereports.com/content/8/1/299Kansas City, KS, USA Full list of author information is available at the end of the articlesetting..., University of Kansas Medical Center,transplant: a case report Anup Kasi Loknath Kumar1*, Christopher Dakhil2, Megha Teeka Satyan1 and Nisreen Haideri3 Abstract Introduction: Extramedullary myeloma that occurs during the clinical course of multiple myeloma...

Kumar, Anup Kasi Loknarth; Dakhil, Christopher; Satyan, Megha Teeka; Haideri, Nisreen

2014-09-08T23:59:59.000Z

468

Object Oriented Modeling of a Multiple-Input Multiple-Output Flyback Converter in Nicholas D. Benavides and Patrick L.Chapman  

E-Print Network [OSTI]

Object Oriented Modeling of a Multiple-Input Multiple-Output Flyback Converter in Dymola Nicholas D not lend itself to many traditional circuit simulators such as SPICE. The state equations of a converter dependent on the states, and cannot be determined prior to simulation, requiring the use of an iterative

Chapman, Patrick

469

16me Confrence Internationale des Linguistes, Paris, 21-25 Juillet 1997 PREFIX T-IN OLD CHINESE  

E-Print Network [OSTI]

reflexes of OC *t(h)- and words with MC initials reflecting other OC initials dan1 *a t-l^m > tom `sunk in initial N- is indicated by modern dialects: Hakka, Min); dan1 *a t-l^m > tom `sunk in, steeped in' (sc

Paris-Sud XI, Université de

470

Building Design Advisor: Automated integration of multiple simulation tools K. Papamichael, J. LaPorta, H. Chauvet  

E-Print Network [OSTI]

LBNL-40591 Preprint Building Design Advisor: Automated integration of multiple simulation tools K Design Advisor (BDA) is a software environment that supports the integrated use of multiple analysis

471

Alignement multiple Alignement multiple  

E-Print Network [OSTI]

GTTGGAGAAA AAGATCAATA TATTGCTTAT Borago CGATGCCGTT CCGGGAGAAG AAAATCAATA TATATGTTAT Heliotrop CGATCCCGTT

Csürös, Miklós

472

MULTIPLE LETTERS Mr. James Speir, Vice President Phosphate Operations  

Office of Legacy Management (LM)

52. 52. APR 9 1986 MULTIPLE LETTERS Mr. James Speir, Vice President Phosphate Operations International Minerals and Chemical Corporation P.O. Box 7047 Lakeland, Florida 33807 Dear Mr. Speir: The Department of Energy is evaluating the radiological condition of sites that were utilized by the Manhattan Engineer District and the Atomic Energy Commission (AEC) during the early years of nuclear energy development to determine whether they need remedial action and whether the Department has authority to perform such action. As you may be aware through previous correspondence, the International Minerals and Chemical Corporation facility in Mulberry, Florida, was identified as one such site, as a result of some research, development, and pilot plant work conducted at the

473

Quantum teleportation scheme by selecting one of multiple output ports  

E-Print Network [OSTI]

The scheme of quantum teleportation, where Bob has multiple (N) output ports and obtains the teleported state by simply selecting one of the N ports, is thoroughly studied. We consider both deterministic version and probabilistic version of the teleportation scheme aiming to teleport an unknown state of a qubit. Moreover, we consider two cases for each version: (i) the state employed for the teleportation is fixed to a maximally entangled state, and (ii) the state is also optimized as well as Alice's measurement. We analytically determine the optimal protocols for all the four cases, and show the corresponding optimal fidelity or optimal success probability. All these protocols can achieve the perfect teleportation in the asymptotic limit of $N\\to\\infty$. The entanglement properties of the teleportation scheme are also discussed.

Satoshi Ishizaka; Tohya Hiroshima

2009-04-06T23:59:59.000Z

474

High-Yield Secretion of Multiple Client Proteins in Aspergillus  

SciTech Connect (OSTI)

Production of pure and high-yield client proteins is an important technology that addresses the need for industrial applications of enzymes as well as scientific experiments in protein chemistry and crystallization. Fungi are utilized in industrial protein production because of their ability to secrete large quantities of proteins. In this study, we engineered a high-expression-secretion vector, pEXPYR that directs proteins towards the extracellular medium in two Aspergillii host strains, examine the effect of maltose-induced over-expression and protein secretion as well as time and pH-dependent protein stability in the medium. We describe five client proteins representing a core set of hemicellulose degrading enzymes that accumulated up to 50-100 mg/L of protein. Using a recyclable genetic marker that allows serial insertion of multiple genes, simultaneous hyper-secretion of three client proteins in a single host strain was accomplished.

Segato, F.; Damasio, A. R. L.; Goncalves, T. A.; de Lucas, R. C.; Squina, F. M.; Decker, S. R.; Prade, R. A.

2012-07-15T23:59:59.000Z

475

Will multiple probes of dark energy find modified gravity?  

SciTech Connect (OSTI)

One of the most pressing issues in cosmology is whether general relativity (GR) plus a dark sector is the underlying physical theory or whether a modified gravity model is needed. Upcoming dark energy experiments designed to probe dark energy with multiple methods can address this question by comparing the results of the different methods in constraining dark energy parameters. Disagreement would signal the breakdown of the assumed model (GR plus dark energy). We study the power of this consistency test by projecting constraints in the w{sub 0}-w{sub a} plane from the four different techniques of the Dark Energy Survey in the event that the underlying true model is modified gravity. We find that the standard technique of looking for overlap has some shortcomings, and we propose an alternative, more powerful Multidimensional Consistency Test. We introduce the methodology for projecting whether a given experiment will be able to use this test to distinguish a modified gravity model from GR.

Shapiro, Charles [Institute of Cosmology and Gravitation, Portsmouth, PO1 3FX (United Kingdom); Dodelson, Scott [Center for Particle Astrophysics, Fermi National Accelerator Laboratory, Batavia, Illinois 60510 (United States); Department of Astronomy and Astrophysics, University of Chicago, Chicago, Illinois 60637 (United States); Kavli Institute for Cosmological Physics, Chicago, Illinois 60637 (United States); Hoyle, Ben [Institut de Ciencies del Cosmos, Barcelona (Spain); Samushia, Lado [Institute of Cosmology and Gravitation, Portsmouth, PO1 3FX (United Kingdom); National Abastumani Astrophysical Observatory, Ilia State University, 2A Kazbegi Ave, GE-0160 Tbilisi (Georgia); Flaugher, Brenna [Center for Particle Astrophysics, Fermi National Accelerator Laboratory, Batavia, Illinois 60510 (United States)

2010-08-15T23:59:59.000Z

476

Non-invertibility of Multiple-Scattered QELSS Spectra  

E-Print Network [OSTI]

We consider the spectrum S(q,t) and field correlation function f(q,t) of light quasielastically scattered from diffusing optical probes in complex viscoelastic fluids. Relationships between the single-scattering f_1(q,t) and the multiple-scattering f_m(t) are examined. We show that it is fundamentally impossibly to invert f_m(t) to obtain f_1(q,t) or particle displacement moments , except with assumptions that are certainly not correct in complex, viscoelastic fluids. For diffusing dilute probes in viscoelastic fluids, f_1(q,t) is determined by all even moments , n > 0$, of the particle displacement X; this information is lost in f_m(t). In the special case of monodisperse probes in a true simple fluid, f_1(q,t) can be obtained from f_m(t), but only because the functional form of f_1(q,t) is already known.

George D. J. Phillies

2005-09-18T23:59:59.000Z

477

Multiple phase estimation for arbitrary pure states under white noise  

E-Print Network [OSTI]

In any realistic quantum metrology scenarios, the ultimate precision in the estimation of parameters is limited not only by the so-called Heisenberg scaling, but also the environmental noise encountered by the underlying system. In the context of quantum estimation theory, it is of great significance to carefully evaluate the impact of a specific type of noise on the corresponding quantum Fisher information (QFI) or quantum Fisher information matrix (QFIM). Here we investigate the multiple phase estimation problem for a natural parametrization of arbitrary pure states under white noise. We obtain the explicit expression of the symmetric logarithmic derivative (SLD) and hence the analytical formula of QFIM. Moreover, the attainability of the quantum Cram\\'{e}r-Rao bound (QCRB) is confirmed by the commutability of SLDs and the optimal estimators are elucidated for the experimental purpose. These findings generalize previously known partial results and highlight the role of white noise in quantum metrology.

Yao Yao; Li Ge; Xing Xiao; Xiaoguang Wang; C. P. Sun

2014-09-08T23:59:59.000Z

478

Multiple-Coincidence Active Neutron Interrogation of Fissionable Materials  

SciTech Connect (OSTI)

Using a beam of tagged 14.1 MeV neutrons to probe for the presence of fissionable materials, we have measured n-?-? coincidences from depleted uranium (DU). The multiple coincidence rate is substantially above that measured from lead, tungsten, and iron. The presence of coincidences involving delayed gammas in the DU time spectra provides a signature for fissionable materials that is distinct from non-fissionable ones. In addition, the information from the tagged neutron involved in the coincidence gives the position of the fissionable material in all three dimensions. The result is an imaging probe for fissionable materials that is more compact and that produces much less radiation than other solutions.

J.P. Hurley, R.P. Keegan, J.R. Tinsley, R. Trainham, and S.C. Wilde

2008-08-06T23:59:59.000Z

479

PLT scaling laws for thermonuclear fusion power multiplication  

SciTech Connect (OSTI)

While present experiments are evaluated on the basis of confinement time, it is the fusion power multiplication factor, Q, and the fusion power which will be the parameters that measure the performance of ignition experiments and fusion reactors. We have determined the relationship of Q to tau/sub E/ and the Lawson number, n tau/sub e/, for ohmically heated plasmas from the Princeton Large Tokamak (PLT). Q, tau/sub E/, and n tau/sub E/ all increase with density at low densities. Above anti n/sub e/ approx. = 4 x 10/sup 13/ cm/sup -3/, tau/sub Ee/ approx. = 30 msec, or anti n/sub e/ tau/sub Ee/ approx. = 1.5 x 10/sup 12/ cm/sup -3/s, Q saturates. Q scaling has also been obtained on PLT as a function of toroidal magnetic field, plasma current, and auxiliary heating power.

Grisham, L.R.; Strachan, J.D.

1982-11-01T23:59:59.000Z

480

Chapter 2 - Coal as Multiple Sources of Energy  

Science Journals Connector (OSTI)

Abstract Coal as multiple sources of energy is mined for its solid and gas-, oil-, and condensate-derived hydrocarbons as well as liquefied for synfuels. More than 50 countries mine coal as feedstock for power plants to generate electricity but only six of these countries monopolize 73% of the total recoverable coalbed gas resources of the world. Worldwide, about 30,000 coal mine explosions are caused by methane and carbon dioxide, and to prevent outbursts and emissions, underground, surface, and abandoned coalmine gases are exploited for industrial and commercial uses. Still, a large volume of unrecovered fugitive coalmine gases is released as global greenhouse gas emissions. An alternative source for foreign oil dependent countries is synfuels from coal liquefaction technology. Also, coal-derived hydrocarbons are a part of the conventional resources that is, gas, oil, and condensate sourced from coal but expelled into adjoining reservoirs, are attractive alternative energy sources.

Romeo M. Flores

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple prefix symbol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Charging system with galvanic isolation and multiple operating modes  

DOE Patents [OSTI]

Systems and methods are provided for operating a charging system with galvanic isolation adapted for multiple operating modes. A vehicle charging system comprises a DC interface, an AC interface, a first conversion module coupled to the DC interface, and a second conversion module coupled to the AC interface. An isolation module is coupled between the first conversion module and the second conversion module. The isolation module comprises a transformer and a switching element coupled between the transformer and the second conversion module. The transformer and the switching element are cooperatively configured for a plurality of operating modes, wherein each operating mode of the plurality of operating modes corresponds to a respective turns ratio of the transformer.

Kajouke, Lateef A.; Perisic, Milun; Ransom, Ray M.

2013-01-08T23:59:59.000Z

482

Multiple reentrant glass transitions in confined hard-sphere glasses  

E-Print Network [OSTI]

Glass forming liquids exhibit a rich phenomenology upon confinement. This is often related to the effects arising from wall-fluid interactions. Here we focus on the interesting limit where the separation of the confining walls becomes of the order of a few particle diameters. For a moderately polydisperse, densely packed hard-sphere fluid confined between two smooth hard walls, we show via event-driven molecular dynamics simulations the emergence of a multiple reentrant glass transition scenario upon a variation of the wall separation. Using thermodynamic relations, this reentrant phenomenon is shown to persist also under constant chemical potential. This allows straightforward experimental investigation and opens the way to a variety of applications in micro- and nanotechnology, where channel dimensions are comparable to the size of the contained particles. The results are in-line with theoretical predictions obtained by a combination of density functional theory and the mode-coupling theory of the glass transition.

S. Mandal; S. Lang; M. Gross; M. Oettel; D. Raabe; T. Franosch; F. Varnik

2014-06-20T23:59:59.000Z

483

Single transmission line interrogated multiple channel data acquisition system  

DOE Patents [OSTI]

A single transmission line interrogated multiple channel data acquisition system is provided in which a plurality of remote station/sensor circuits each monitors a specific process variable and each transmits measurement values over a single transmission line to a master interrogating station when addressed by said master interrogating station. Typically, as many as 330 remote stations may be parallel connected to the transmission line which may exceed 7,000 feet. The interrogation rate is typically 330 stations/second. The master interrogating station samples each station according to a shared, charging transmit-receive cycle. All remote station address signals, all data signals from the remote stations/sensors and all power for all of the remote station/sensors are transmitted via a single continuous terminated coaxial cable. A means is provided for periodically and remotely calibrating all remote sensors for zero and span. A provision is available to remotely disconnect any selected sensor station from the main transmission line.

Fasching, George E. (Morgantown, WV); Keech, Jr., Thomas W. (Morgantown, WV)

1980-01-01T23:59:59.000Z

484

Will multiple probes of dark energy find modified gravity?  

Science Journals Connector (OSTI)

One of the most pressing issues in cosmology is whether general relativity (GR) plus a dark sector is the underlying physical theory or whether a modified gravity model is needed. Upcoming dark energy experiments designed to probe dark energy with multiple methods can address this question by comparing the results of the different methods in constraining dark energy parameters. Disagreement would signal the breakdown of the assumed model (GR plus dark energy). We study the power of this consistency test by projecting constraints in the w0-wa plane from the four different techniques of the Dark Energy Survey in the event that the underlying true model is modified gravity. We find that the standard technique of looking for overlap has some shortcomings, and we propose an alternative, more powerful Multidimensional Consistency Test. We introduce the methodology for projecting whether a given experiment will be able to use this test to distinguish a modified gravity model from GR.

Charles Shapiro; Scott Dodelson; Ben Hoyle; Lado Samushia; Brenna Flaugher

2010-08-17T23:59:59.000Z

485

Influence of heavy modes on perturbations in multiple field inflation  

SciTech Connect (OSTI)

We investigate linear cosmological perturbations in multiple field inflationary models where some of the directions are light while others are heavy (with respect to the Hubble parameter). By integrating out the massive degrees of freedom, we determine the multi-dimensional effective theory for the light degrees of freedom and give explicitly the propagation matrix that replaces the effective sound speed of the one-dimensional case. We then examine in detail the consequences of a sudden turn along the inflationary trajectory, in particular the possible breakdown of the low energy effective theory in case the heavy modes are excited. Resorting to a new basis in field space, instead of the usual adiabatic/entropic basis, we study the evolution of the perturbations during the turn. In particular, we compute the power spectrum and compare with the result obtained from the low energy effective theory.

Gao, Xian; Langlois, David [Astroparticule et Cosmologie (APC), UMR 7164-CNRS, Université Denis Diderot-Paris 7, 10 rue Alice Domon et Léonie Duquet, 75205 Paris (France); Mizuno, Shuntaro, E-mail: xgao@apc.univ-paris7.fr, E-mail: langlois@apc.univ-paris7.fr, E-mail: shuntaro.mizuno@th.u-psud.fr [Laboratoire de Physique Théorique, Université Paris-Sud 11 et CNRS, Bâtiment 210, 91405 Orsay Cedex (France)

2012-10-01T23:59:59.000Z

486

MULTIPLE SCATTERING POLARIZATION OF SUBSTELLAR-MASS OBJECTS: T DWARFS  

SciTech Connect (OSTI)

While there have been multiple observational programs aimed at detecting linear polarization of optical radiation emitted by ultracool dwarfs, there has been comparatively less rigorous theoretical analysis of the problem. The general expectation has been that the atmospheres of those substellar-mass objects with condensate clouds would give rise to linear polarization due to scattering. Because of rotation-induced non-sphericity, there is expected to be incomplete cancellation of disk-integrated net polarization and thus a finite polarization. For cloudless objects, however, only molecular Rayleigh scattering will contribute to any net polarization and this limit has not been well studied. Hence in this paper we present a detailed multiple scattering analysis of the polarization expected from those T-dwarfs whose spectra show absence of condensates. For this, we develop and solve the full radiative transfer equations for linearly polarized radiation. Only atomic and molecular Rayleigh scattering are considered to be the sources of polarization. We compute the local polarization at different angular directions in a plane-parallel atmosphere calculated for the range of effective temperatures of T dwarfs and then average over the whole surface of the object. The effects of gravity and limb darkening as well as rotation induced non-sphericity are included. It is found that the amount of polarization decreases with the increase in effective temperature. It is also found that significant polarization at any local point in the atmosphere arises only in the optical (B band). However, the disk integrated polarization-even in the B band-is negligible. Hence we conclude that, unlike the case for cloudy L dwarfs, polarization of cloudless T dwarfs by atomic and molecular scattering may not be detectable. In the future we will extend this work to cloudy L and T dwarf atmospheres.

Sengupta, Sujan [Indian Institute of Astrophysics, Koramangala 2nd Block, Bangalore 560 034 (India); Marley, Mark S., E-mail: sujan@iiap.res.i, E-mail: Mark.S.Marley@NASA.go [NASA Ames Research Center, MS-245-3, Moffett Field, CA 94035 (United States)

2009-12-10T23:59:59.000Z

487

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities 3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities January 26, 2011 - 7:35am Addthis PROBLEM: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. PLATFORM: Wireshark 0.8.20 through 1.2.8. ABSTRACT: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application. reference LINKS: Securityfocus IMPACT ASSESSMENT: Medium Discussion: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities.Exploiting these issues may allow attackers to crash the

488

U-158: HP NonStop Server Java Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

8: HP NonStop Server Java Multiple Vulnerabilities 8: HP NonStop Server Java Multiple Vulnerabilities U-158: HP NonStop Server Java Multiple Vulnerabilities April 30, 2012 - 7:00am Addthis PROBLEM: HP NonStop Server Java Multiple Vulnerabilities PLATFORM: HP NonStop Server 6.x ABSTRACT: Multiple vulnerabilities have been reported in HP NonStop Server Reference links: Secunia Advisory SA48977 CVE-2011-3547 CVE-2011-3551 CVE-2011-3553 IMPACT ASSESSMENT: High Discussion: HP has acknowledged multiple vulnerabilities in HP NonStop Server, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Impact: Successful exploitation of this vulnerability may allow remote manipulation

489

U-224: ISC DHCP Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

4: ISC DHCP Multiple Denial of Service Vulnerabilities 4: ISC DHCP Multiple Denial of Service Vulnerabilities U-224: ISC DHCP Multiple Denial of Service Vulnerabilities July 31, 2012 - 7:00am Addthis PROBLEM: ISC DHCP Multiple Denial of Service Vulnerabilities PLATFORM: ISC DHCP before versions DHCP 4.1-ESV-R6 or DHCP 4.2.4-P1 ABSTRACT: ISC DHCP is prone to multiple denial-of-service vulnerabilities. reference LINKS: BIND and DHCP Security Updates Released Bugtraq ID: 54665 Secunia Advisory SA50018 CVE-2012-3571 CVE-2012-3570 CVE-2012-3954 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in ISC DHCP, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error when handling client identifiers can be exploited to trigger an endless loop and prevent the server from processing further client requests

490

V-028: Splunk Multiple Cross-Site Scripting and Denial of Service  

Broader source: Energy.gov (indexed) [DOE]

8: Splunk Multiple Cross-Site Scripting and Denial of Service 8: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities V-028: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities November 20, 2012 - 2:00am Addthis PROBLEM: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities PLATFORM: Splunk versions 4.3.5 and 5.0 ABSTRACT: Splunk is prone to multiple vulnerabilities REFERENCE LINKS: SecurityTracker Alert ID: 1027785 SecurityTracker Alert ID: 1027784 Bugtraq ID: 56581 Secunia Advisory SA51337 Secunia Advisory SA51351 Splunk Vulnerability Descriptions IMPACT ASSESSMENT: Medium DISCUSSION: Splunk is prone to multiple cross-site scripting vulnerabilities and a denial-of-service vulnerability because it fails to properly handle user-supplied input. An attacker may leverage these issues to cause denial-of-service conditions

491

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

42: Mac RealPlayer Multiple Vulnerabilities 42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

492

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection  

Broader source: Energy.gov (indexed) [DOE]

8: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML 8: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities January 5, 2011 - 2:28pm Addthis PROBLEM: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities PLATFORM: Mozilla Firefox 3.5.11 - 3.6.10, Mozilla SeaMonkey 2.0 - 2.0.9 Vulnerable Platforms Details ABSTRACT: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the

493

V-070: Apache CouchDB Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0: Apache CouchDB Multiple Vulnerabilities 0: Apache CouchDB Multiple Vulnerabilities V-070: Apache CouchDB Multiple Vulnerabilities January 16, 2013 - 1:00am Addthis PROBLEM: Apache CouchDB Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.0.4, 1.1.2, and 1.2.1. ABSTRACT: Multiple vulnerabilities have been reported in Apache CouchDB REFERENCE LINKS: Secunia Advisory SA51765 Seclists.org/fulldisclosure/2013/Jan/80 Seclists.org/fulldisclosure/2013/Jan/81 Seclists.org/fulldisclosure/2013/Jan/82 CVE-2012-5641 CVE-2012-5649 CVE-2012-5650 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Apache CouchDB, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information. 1) Input passed via the query parameters to browser-based test suite is not

494

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Mac RealPlayer Multiple Vulnerabilities 2: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

495

V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple  

Broader source: Energy.gov (indexed) [DOE]

9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple 9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities January 15, 2013 - 4:00am Addthis PROBLEM: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities PLATFORM: BlackBerry Tablet Software versions 2.1.0.1032 and prior. ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS REFERENCE LINKS: BlackBerry Knowledge Base Article ID: KB32019 BlackBerry Knowledge Base Article ID: KB32189 Secunia Advisory SA51830 CVE-2012-1182 CVE-2012-1535 CVE-2012-2034 CVE-2012-2037 CVE-2012-4163 CVE-2012-4165 CVE-2012-4166 CVE-2012-4167 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

496

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

497

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

498

Estimation of multi-particle correlation from multiplicity distribution observed in relativisitic heavy ion collisions  

E-Print Network [OSTI]

Analytical formula for multiplicity distribution is derived in the QO approach, where chaotic and coherent fields are contained. Observed charged multiplicity distributions in Au+Au collisions at $\\sqrt{s}=200$ AGeV and in pp collisions at $\\sqrt{s}=900$ GeV are analyzed by the formula. Chaoticity parameters in the inclusive events estimated from the analysis of multiplicity distributions are compared with those estimated from the analysis of observed two-particle inclusive identical particle correlations.

Naomichi Suzuki; Minoru Biyajima; Takuya Mizoguchi

2010-12-12T23:59:59.000Z

499

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct...

500

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Broader source: Energy.gov (indexed) [DOE]

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...