National Library of Energy BETA

Sample records for non-public key indicators

  1. November 2012 Key Performance Indicator (KPI): Carbon Management

    E-Print Network [OSTI]

    Evans, Paul

    November 2012 Key Performance Indicator (KPI): Carbon Management NTU report our carbon footprint provided. The carbon emissions are calculated using Carbon Trust conversion factors, as used in NTU's EMS.64 2011/2012 18,130 4.20 The recorded changes in emissions are a result of carbon management projects

  2. DRAFT LIST OF KEY INDICATORS IDENTIFIED BY THE SOCIOECONOMIC AND INSTITUTIONAL WORKING GROUP

    E-Print Network [OSTI]

    Per capita expenditures for: ­ room/board ­ recreation ­ gaming Average household income Ethnicity by economic sector Unemployment by season Per capita income by economic sector (correlated to census tract data) Cost of living indices ­ percent of income for housing ­ percent of income for recreation

  3. A Comprehensive System of Energy Intensity Indicators for the U.S.: Methods, Data and Key Trends

    SciTech Connect (OSTI)

    Belzer, David B.

    2014-08-31

    This report describes a comprehensive system of energy intensity indicators for the United States that has been developed for the Department of Energy’s Office of Energy Efficiency and Renewable Energy (EERE) over the past decade. This system of indicators is hierarchical in nature, beginning with detailed indexes of energy intensity for various sectors of the economy, which are ultimately aggregated to an overall energy intensity index for the economy as a whole. The aggregation of energy intensity indexes to higher levels in the hierarchy is performed with a version of the Log Mean Divisia Index (LMDI) method. Based upon the data and methods in the system of indicators, the economy-wide energy intensity index shows a decline of about 14% in 2010 relative to a 1985 base year. Discussion of energy intensity indicators for each of the broad end-use sectors of the economy—residential, commercial, industrial, and transportation—is presented in the report. An analysis of recent changes in the efficiency of electricity generation in the U.S. is also included. A detailed appendix describes the data sources and methodology behind the energy intensity indicators for each sector.

  4. Key performance indicators in humanitarian logistics

    E-Print Network [OSTI]

    Davidson, Anne Leslie

    2006-01-01

    Non-profit humanitarian relief organizations have typically been unable to measure the performance of their supply chains due to an inability to centrally capture data from operations. With the recent development and ...

  5. KEY PERSONNEL

    National Nuclear Security Administration (NNSA)

    KEY PERSONNEL 7062015 TITLE NAME President Christopher C. Gentile Vice President, Engineering Robin Stubenhofer Vice President, Integrated Supply Chain Rick Lavelock Director,...

  6. November 2012 Key Performance Indicator (KPI): Energy Consumption

    E-Print Network [OSTI]

    Evans, Paul

    and district heating scheme* data. Year Energy Consumption (KWh) Percentage Change 2005/06 65,916,243 N/A 2006 buildings are connected to the Nottingham District Heating Scheme. This service meets all the heating

  7. Using Key Performance Indicators to Manage Energy Costs 

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01

    ) and measurement and verification protocols (such as IPMVP 2001) often highlight the importance an information system has in maximizing results. The increasing adoption of energy information systems has led, however, to an interesting paradox: while it is now cost...

  8. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  9. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  10. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  11. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  12. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  13. Key Reference Agilent Technologies

    E-Print Network [OSTI]

    Anlage, Steven

    is provided "as is", and is subject to being changed, without notice, in future editions. Further with the User and should any of the contract terms conflict with these terms, the contract terms shall control enables you to define the number of points in a step sweep. When you press this key, the current value

  14. Key Research Results Achievement

    E-Print Network [OSTI]

    ) evaluated several common figures of merit used to compare the electrical and optical performance of TCsKey Research Results Achievement NREL research significantly contributed to inadequate existing not yet at performance levels of TCOs, demonstrate a much better combination of transmission

  15. Key Research Results Achievement

    E-Print Network [OSTI]

    % energy savings in new buildings and major renovations. Researchers at the National Renewable Energy%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvancedEnergy to use signifi- cantly less energy--reducing operating costs and greenhouse gas emissions. This new K-12

  16. Distribution and abundance of endangered Florida Key deer on outer islands 

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25

    -based survey data. All outer islands exhibited estimated abundances considerably below carrying capacities, with larger populations occurring closer to Big Pine Key. Results indicated that other islands and complexes such as Ramrod Key, Water Key...

  17. Thermal indicator for wells

    DOE Patents [OSTI]

    Gaven, Jr., Joseph V. (Oakton, VA); Bak, Chan S. (Newbury Park, CA)

    1983-01-01

    Minute durable plate-like thermal indicators are employed for precision measuring static and dynamic temperatures of well drilling fluids. The indicators are small enough and sufficiently durable to be circulated in the well with drilling fluids during the drilling operation. The indicators include a heat resistant indicating layer, a coacting meltable solid component and a retainer body which serves to unitize each indicator and which may carry permanent indicator identifying indicia. The indicators are recovered from the drilling fluid at ground level by known techniques.

  18. Key Management in Historical Context

    E-Print Network [OSTI]

    ;Rolling Keys Why change keys? --- cryptoperiod (intrinsic to cryptosystem) --- management issuesKey Management in Historical Context Whitfield Diffie Internet Corporation for Assigned Names to become the security or insecurity of the message. #12;Key management systems both reflect and shape

  19. SRR Ecological Assessment Indicators: Selection and

    E-Print Network [OSTI]

    Wyoming, University of

    , Soil aggregate stability · Water - Surface water frequency, Volume · Plants - Key species, Invasives, Pounds of domestic meat produced, Pounds of harvestable materials produced #12;Why these indicators? · Resource base and off-take · Long term trends, short term annual use · Harvest of products, kinds/ levels

  20. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

  1. Tamper indicating bolt

    DOE Patents [OSTI]

    Blagin, Sergei V.; Barkanov, Boris P.

    2004-09-14

    A tamper-indicating fastener has a cylindrical body with threads extending from one end along a portion of the body, and a tamper indicating having a transducer for converting physical properties of the body into electronic data; electronics for recording the electronic data; and means for communicating the recorded information to a remote location from said fastener. The electronics includes a capacitor that varies as a function of force applied by the fastener, and non-volatile memory for recording instances when the capacitance varies, providing an indication of unauthorized access.

  2. Federal Water Use Indices

    Broader source: Energy.gov [DOE]

    FEMP provides water use indices as a guide for Federal agencies. Note that each is a rough estimate of water usage at different types of sites. Your site may vary considerably.

  3. Industrial energy use indices 

    E-Print Network [OSTI]

    Hanegan, Andrew Aaron

    2009-05-15

    Energy use index (EUI) is an important measure of energy use which normalizes energy use by dividing by building area. Energy use indices and associated coefficients of variation are computed for major industry categories ...

  4. Industrial energy use indices 

    E-Print Network [OSTI]

    Hanegan, Andrew Aaron

    2008-10-10

    Energy use index (EUI) is an important measure of energy use which normalizes energy use by dividing by building area. Energy use indices and associated coefficients of variation are computed for major industry categories ...

  5. Policy on Keys and Keycards Policy on Keys and Keycards

    E-Print Network [OSTI]

    Sridhar, Srinivas

    department is responsible for the total cost of lock changes and new keys/cards to secure areas compromised has been compromised, and avoid potentially significant costs due to theft, vandalism, or excessive be given access to keys/cards that permit entry to buildings and locked spaces on the University campuses

  6. Triboluminescent indicator system

    DOE Patents [OSTI]

    Goods, Steven H. (Livermore, CA); Dentinger, Paul M. (Sunol, CA); Whinnery, Jr., Leroy L. (Danville, CA)

    2003-06-24

    There is provided a light emitting device comprising a plurality of triboluminescent particles dispersed throughout a low density, frangible body and activated by rapidly crushing the body in order to transfer mechanical energy to some portion of the particles. The light emitted by these mechanically excited particles is collected and directed into a light conduit and transmitted to a detector/indicator means.

  7. Residential market transformation: National and regional indicators

    SciTech Connect (OSTI)

    Van Wie McGrory, Laura L.; McNamara, Maureen; Suozzo, Margaret

    2000-06-01

    A variety of programs are underway to address market barriers to the adoption of energy-efficient residential technologies and practices. Most are administered by utilities, states, or regions that rely on the Energy Star as a consistent platform for program marketing and messaging. This paper reviews regional and national market transformation activities for three key residential end-uses -- air conditioning, clothes washing, and lighting -- characterizing current and ongoing programs; reporting on progress; identifying market indicators; and discussing implications.

  8. NAME GRAD'NG KEY .

    E-Print Network [OSTI]

    MA 165 EXAM 3 Fall 2002 Page 1/4. NAME GRAD'NG KEY . Page 1 / 18. STUDENT ID Page 2 / 32. Page 3 /18. RECITATION INSTRUCTOR. Page 4 / 32.

  9. Tamper-indicating seal

    DOE Patents [OSTI]

    Fiarman, S.; Degen, M.F.; Peters, H.F.

    1982-08-13

    There is disclosed a tamper-indicating seal that permits in the field inspection and detection of tampering. Said seal comprises a shrinkable tube having a visible pattern of markings which is shrunk over th item to be sealed, and a second transparent tube, having a second visible marking pattern, which is shrunk over the item and the first tube. The relationship between the first and second set of markings produces a pattern so that the seal may not be removed without detection. The seal is particularly applicable to UF/sub 6/ cylinder valves.

  10. Diversity & Flexibility Key to Sustainability | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Diversity & Flexibility Key to Sustainability Diversity & Flexibility Key to Sustainability Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting...

  11. Enhanced tamper indicator

    DOE Patents [OSTI]

    Garcia, Anthony R.; Johnston, Roger G.

    2003-07-08

    The present invention provides an apparatus and method whereby the reliability and tamper-resistance of tamper indicators can be improved. A flexible connector may be routed through a latch for an enclosure such as a door or container, and the free ends of the flexible connector may be passed through a first locking member and firmly attached to an insert through the use of one or more attachment members such as set screws. A second locking member may then be assembled in interlocking relation with the first locking member to form an interlocked assembly around the insert. The insert may have one or more sharp projections extending toward the first or second locking member so that any compressive force applied in an attempt to disassemble the interlocked assembly results in permanent, visible damage to the first or second locking member.

  12. Key China Energy Statistics 2012

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  13. Key China Energy Statistics 2011

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  14. Key Issues | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKey

  15. Key Steps | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKeyKey Steps

  16. Performance Indicators of Wind Energy Production

    E-Print Network [OSTI]

    D'Amico, G; Prattico, F

    2015-01-01

    Modeling wind speed is one of the key element when dealing with the production of energy through wind turbines. A good model can be used for forecasting, site evaluation, turbines design and many other purposes. In this work we are interested in the analysis of the future financial cash flows generated by selling the electrical energy produced. We apply an indexed semi-Markov model of wind speed that has been shown, in previous investigation, to reproduce accurately the statistical behavior of wind speed. The model is applied to the evaluation of financial indicators like the Internal Rate of Return, semi-Elasticity and relative Convexity that are widely used for the assessment of the profitability of an investment and for the measurement and analysis of interest rate risk. We compare the computation of these indicators for real and synthetic data. Moreover, we propose a new indicator that can be used to compare the degree of utilization of different power plants.

  17. Architecture BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Architecture BA (Hons) Key details Duration: 4 years (honours degree) Delivery type: Day Intake in the subject of Architecture, including a portfolio of Design, Technical and Theoretical courses covering all aspects of Architectural Theory and Practice. The course has been designed with reference to the RIBA

  18. INFORMATION: THE KEY TO SUSTAINABILITY

    E-Print Network [OSTI]

    Bateman, Ian J.

    of construction and demolition wastes and the introduction of demolition plans. Examples of information sources in the UK, Europe and the US are provided. Key words: waste management, construction, demolition, secondary sector so are concerned with re-use and recycling construction and demolition waste (C & D). However many

  19. From strategy to action: 20112013 A summary of key initiatives and performance indicators for UC

    E-Print Network [OSTI]

    Hickman, Mark

    Carr Deputy Vice-Chancellor Professor Ian Town Registrar Jeff Field Chief Financial Officer Dr Yvonne. (SS&I, CER, PVCs, AVC(A)) 2. RETAIN: Support student success through better monitoring

  20. Self-optimizing control: From key performance indicators to control of biological systems 1

    E-Print Network [OSTI]

    Skogestad, Sigurd

    Introduction The national economy, the goverment, companies and businesses, consumers, chemical process plants cost function (performance index) ¥§¦ which is to be minimized with respect to the available degrees SKOGESTAD Dept. of Chemical Engineering, Norwegian University of Science and Technology, N­7491 Trondheim

  1. Selfoptimizing control: From key performance indicators to control of biological systems 1

    E-Print Network [OSTI]

    Skogestad, Sigurd

    Introduction The national economy, the goverment, companies and businesses, consumers, chemical process plants cost function (performance index) J o which is to be minimized with respect to the available degrees SKOGESTAD Dept. of Chemical Engineering, Norwegian University of Science and Technology, N--7491 Trondheim

  2. The State of Our Health 2013: Key Health Indicators for Oregonians

    E-Print Network [OSTI]

    Chapman, Michael S.

    Tillamook Washington Yamhill Polk Benton Linn Lane DouglasCoos Curry Josephine Jackson Deschutes Je erson___________________________________________________________ 119 Multnomah County________________________________________________________ 123 Polk County

  3. An approach to predict operational performance of airline schedules using aircraft assignment key performance indicators

    E-Print Network [OSTI]

    Riedel, Robin

    2006-01-01

    This thesis presents an approach for predicting operational performance of airlines on the basis of flight schedules and aircraft assignments. The methodology uses aggregate measures of properties of aircraft assignments, ...

  4. NREL Policy Stacking Theory Correlates Key Indicators with Solar Market Success (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-11-01

    NREL's Integrated Applications Group evaluated the time-dependent relationships between policy implementation and the success of solar markets using historical data for installed capacity of solar photovoltaic energy systems. This Science and Technology Highlights fact sheet summarizes their research.

  5. Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD -

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a l De pEnergy Industrial LocalAprilstaff areVENTO:Units

  6. A New Collaborative Tool for Visually Understanding National Health Indicators

    SciTech Connect (OSTI)

    Xu, Songhua; Jewell, Brian C; Steed, Chad A; Schryver, Jack C

    2012-01-01

    The authors propose a new online collaborative tool for visually understanding national health indicators, which facilitates the full spectrum of investigation of indicators, from an overview of all the correlation coefficients between variables, to investigation of subsets of selected variables, and to individual data element analysis. this tool is publicly accessible at http://cda.ornl.gov/heat/heatmap.html. In this paper, they discuss the key issues regarding the interface design and implementation. They also illustrate how to use their interface for analyzing the health indicator dataset by showing some key system views. In the end, they introduce and discuss some ongoing research efforts extending this work.

  7. Few-key Text Entry Revisited: Mnemonic Gestures on Four Keys

    E-Print Network [OSTI]

    Wobbrock, Jacob O.

    of Roman letters for high learnability. We compare this new 4-key method to predominant 3-key and 5-key present a new 4-key method that relies on mnemonic gestures reminiscent of Roman letters. Our method-key methods rely on two keys to move a selector left and right and a third key to select a letter. Although

  8. Identify key design elements of desired function

    E-Print Network [OSTI]

    Nawroth, Janna C.

    DESIGN Identify key design elements of desired function Identify functionally equivalent implementation of key design elements (e.g. structure, physiology, kinematics etc.) Quantify functional and standardize fabrication for repeatability . Test phase: Quantify implementation of key design elements

  9. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key

  10. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

  11. Key Opportunities and Challenges for Program Sustainability ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  12. Key Activities | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey

  13. Key Terms | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | International NuclearKaren AtkinsonAbout the FuelKey

  14. MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS

    E-Print Network [OSTI]

    Gao, Shuhong

    MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS SHUHONG GAO AND RAYMOND HEINDL for multivariate public key cryptosystems, which combines ideas from both triangular and oil-vinegar schemes. We the framework. 1. Introduction 1.1. Multivariate Public Key Cryptography. Public key cryptography plays

  15. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  16. Energy Efficiency Indicators Methodology Booklet

    E-Print Network [OSTI]

    Sathaye, Jayant

    2010-01-01

    31   Indicator 2. Primary Energyenergy intensity. Primary Energy Energy is generallyor conversion of primary energy. Secondary energy products

  17. Energy Efficiency Indicators Methodology Booklet

    E-Print Network [OSTI]

    Sathaye, Jayant

    2010-01-01

    Intensity versus Efficiency Energy efficiency indicators areOffice for Energy Efficiency) energy efficiency index whichof Energy Use and Energy Efficiency. Understanding the Link

  18. Hash-based Multivariate Public Key Cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Hash-based Multivariate Public Key Cryptosystems WANG Hou-Zhen and ZHANG Huan-Guo The Key for the traditional multivariate public key cryp- tosystems. For example, the signature scheme SFLASH was broken. at ASIACRYPTO'09. Most multivariate schemes known so far are insecure, except maybe the sigature schemes UOV

  19. DEFINITION, PERFORMANCE GOALS AND KEY FINDINGS Photo Source: UBC Public Affairs

    E-Print Network [OSTI]

    passionate for sustainability. Performance Goals & Key Indicators for the University The following are ourDEFINITION, PERFORMANCE GOALS AND KEY FINDINGS Photo Source: UBC Public Affairs GEOGRAPHY 446 and implementing social sustainability at the University of British Columbia University of British Columbia

  20. Energy Efficiency Indicators Methodology Booklet

    SciTech Connect (OSTI)

    Sathaye, Jayant; Price, Lynn; McNeil, Michael; de la rue du Can, Stephane

    2010-05-01

    This Methodology Booklet provides a comprehensive review and methodology guiding principles for constructing energy efficiency indicators, with illustrative examples of application to individual countries. It reviews work done by international agencies and national government in constructing meaningful energy efficiency indicators that help policy makers to assess changes in energy efficiency over time. Building on past OECD experience and best practices, and the knowledge of these countries' institutions, relevant sources of information to construct an energy indicator database are identified. A framework based on levels of hierarchy of indicators -- spanning from aggregate, macro level to disaggregated end-use level metrics -- is presented to help shape the understanding of assessing energy efficiency. In each sector of activity: industry, commercial, residential, agriculture and transport, indicators are presented and recommendations to distinguish the different factors affecting energy use are highlighted. The methodology booklet addresses specifically issues that are relevant to developing indicators where activity is a major factor driving energy demand. A companion spreadsheet tool is available upon request.

  1. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  2. Wind Vision: Analysis Highlights and Key Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Highlights and Key Results Eric Lantz (NREL) Ryan Wiser (LBNL) July 15, 2015 2 | Wind and Water Power Technologies Office eere.energy.gov Presentation Overview Wind...

  3. Monroe County Extension Services Key West Office

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    potable water is pumped to the Keys from the mainland through a 130-mile long transmission line irrigation and fertilizer, and are more

  4. Operating Costs Estimates Cost Indices

    E-Print Network [OSTI]

    Boisvert, Jeff

    cost projections · Chemical Engineering (CE) Plant Construction Cost Index ­ Base value = 100 in 1957.0 in 2Q 2001 · Engineering News Record (ENR) · Nelson Refinery (NR) Construction Cost Index Cost Indices available for estimation are based upon the past · These data must be updated using cost indexes . · Cost

  5. Unifying classical and quantum key distillation

    E-Print Network [OSTI]

    Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

    2007-02-28

    Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

  6. On multivariate signatureonly public key cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On multivariate signature­only public key cryptosystems Nicolas T. Courtois 1,2 courtois we argument that the problem has many natural solutions within the framework of the multivariate cryptography. First of all it seems that virtually any non­injective multivariate public key is inherently

  7. Deniable Internet Key Exchange Andrew C. Yao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Deniable Internet Key Exchange Andrew C. Yao Frances F. Yao Yunlei Zhao§ Bin Zhu¶ Abstract In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following of privacy protection (especially for E-commerce over Internet), this work is naturally of practical interest

  8. Covariance propagation in spectral indices

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Griffin, P. J.

    2015-01-09

    The dosimetry community has a history of using spectral indices to support neutron spectrum characterization and cross section validation efforts. An important aspect to this type of analysis is the proper consideration of the contribution of the spectrum uncertainty to the total uncertainty in calculated spectral indices (SIs). This study identifies deficiencies in the traditional treatment of the SI uncertainty, provides simple bounds to the spectral component in the SI uncertainty estimates, verifies that these estimates are reflected in actual applications, details a methodology that rigorously captures the spectral contribution to the uncertainty in the SI, and provides quantified examplesmore »that demonstrate the importance of the proper treatment the spectral contribution to the uncertainty in the SI.« less

  9. Simplifying Tensor Polynomials with Indices

    E-Print Network [OSTI]

    A. Balfagon; X. Jaen

    1998-09-22

    We are presenting an algorithm capable of simplifying tensor polynomials with indices when the building tensors have index symmetry properties. These properties include simple symmetry, cyclicity and those due to the presence of partial and covariant derivatives. We are also including some examples using the Riemann tensor as a paradigm. The algorithm is part of a Mathematica package called Tools of Tensor Calculus (TTC) [web address: http://baldufa.upc.es/ttc

  10. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  11. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  12. STORMWATER MANAGEMENT MEASURES AND FECAL INDICATOR BACTERIA

    E-Print Network [OSTI]

    STORMWATER MANAGEMENT MEASURES AND FECAL INDICATOR BACTERIA BY ROBERT A. WILDEY BA, New College............................................................................................................. 1 Regulatory Limits for Indicator Bacteria................................................................ 2 Indicator Bacteria in the Environment

  13. Key Renewable Energy Opportunities for Oklahoma Tribes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKeyKEY

  14. Low latency counter event indication

    DOE Patents [OSTI]

    Gara, Alan G. (Mount Kisco, NY); Salapura, Valentina (Chappaqua, NY)

    2010-08-24

    A hybrid counter array device for counting events with interrupt indication includes a first counter portion comprising N counter devices, each for counting signals representing event occurrences and providing a first count value representing lower order bits. An overflow bit device associated with each respective counter device is additionally set in response to an overflow condition. The hybrid counter array includes a second counter portion comprising a memory array device having N addressable memory locations in correspondence with the N counter devices, each addressable memory location for storing a second count value representing higher order bits. An operatively coupled control device monitors each associated overflow bit device and initiates incrementing a second count value stored at a corresponding memory location in response to a respective overflow bit being set. The incremented second count value is compared to an interrupt threshold value stored in a threshold register, and, when the second counter value is equal to the interrupt threshold value, a corresponding "interrupt arm" bit is set to enable a fast interrupt indication. On a subsequent roll-over of the lower bits of that counter, the interrupt will be fired.

  15. Low latency counter event indication

    DOE Patents [OSTI]

    Gara, Alan G. (Mount Kisco, NY); Salapura, Valentina (Chappaqua, NY)

    2008-09-16

    A hybrid counter array device for counting events with interrupt indication includes a first counter portion comprising N counter devices, each for counting signals representing event occurrences and providing a first count value representing lower order bits. An overflow bit device associated with each respective counter device is additionally set in response to an overflow condition. The hybrid counter array includes a second counter portion comprising a memory array device having N addressable memory locations in correspondence with the N counter devices, each addressable memory location for storing a second count value representing higher order bits. An operatively coupled control device monitors each associated overflow bit device and initiates incrementing a second count value stored at a corresponding memory location in response to a respective overflow bit being set. The incremented second count value is compared to an interrupt threshold value stored in a threshold register, and, when the second counter value is equal to the interrupt threshold value, a corresponding "interrupt arm" bit is set to enable a fast interrupt indication. On a subsequent roll-over of the lower bits of that counter, the interrupt will be fired.

  16. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  17. Civil Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Civil Engineering BEng (Hons) Key details Duration: Full-time: 4 years (BEng Hons) Delivery type engineering disciplines of Structures, Geotechnics, Water Engineering and Transportation Engineering civil or structural engineers. After graduation, students are equipped to work for consultants

  18. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  19. Distance-based accessibility indices

    E-Print Network [OSTI]

    Csató, László

    2015-01-01

    The paper attempts to develop a suitable accessibility index for networks where each link has a value such that a smaller number is preferred like distance, cost, or travel time. A measure called distance sum is characterized by three independent properties: anonymity, an appropriately chosen independence axiom, and dominance preservation, which requires that a node not far to any other is at least as accessible. We argue for the need of eliminating the independence property in certain applications. Therefore generalized distance sum, a family of accessibility indices, will be suggested. It is linear, considers the accessibility of vertices besides their distances and depends on a parameter in order to control its deviation from distance sum. Generalized distance sum is anonymous and satisfies dominance preservation if its parameter meets a sufficient condition. Two detailed examples demonstrate its ability to reflect the vulnerability of accessibility to link disruptions.

  20. Tamper-indicating barcode and method

    DOE Patents [OSTI]

    Cummings, Eric B.; Even, Jr., William R.; Simmons, Blake A.; Dentinger, Paul Michael

    2005-03-22

    A novel tamper-indicating barcode methodology is disclosed that allows for detection of alteration to the barcode. The tamper-indicating methodology makes use of a tamper-indicating means that may be comprised of a particulate indicator, an optical indicator, a deformable substrate, and/or may be an integrated aspect of the barcode itself. This tamper-indicating information provides greater security for the contents of containers sealed with the tamper-indicating barcodes.

  1. BS IE Program Educational Outcomes, Key Abilities, and Performance Indicators for ABET assessment B. Gopalakrishnan, IMSE, 04/11/13

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    , manufacturing systems, computer programming and simulation, production systems, human factors and ergonomics feasible processes and then apply process performance evaluation to pick up the optimal process parts. Students will be able to apply Ashby Plots for materials evaluations comparing strength

  2. From Strategy to Action: 2011-2013 A summary of key initiatives and performance indicators for UC

    E-Print Network [OSTI]

    Reale, Marco

    Deputy Vice-Chancellor Professor Ian Town Registrar Jeff Field Chief Financial Officer Dr Yvonne Shanahan & effective processes, focused programmes, targeted & integrated communications. (SS&I, CER,PVCs, AVC (A),) 2

  3. Banking sector of the Russian Federation : study of the correlation between commodity prices and key safety, soundness and performance indicators

    E-Print Network [OSTI]

    Sinilov, Nikolay

    2010-01-01

    The purpose of this work is to provide a comprehensive overview of the state of banking system in Russia, and to understand its core dependencies and potential risks. The system, the way we find it now, has evolved though ...

  4. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  5. Mechanical Engineering BEng / BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Mechanical engineers play key roles in all industrial sectors, from aerospace and oil and gas, through food for Mechanical Engineering graduates in many sectors, including power production, oil and petrochemicals, manufacturing, power plant, medical engineering and many others l Whatever your final career path, developing

  6. Fashion Marketing & Retailing BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Fashion Marketing & Retailing BA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (BA Hons) Delivery type: Day Intake date: September Fees: 54000 AED per year Overview Our Fashion Marketing and Retailing programme confidently prepares students for a career within the marketing and retailing industry

  7. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Duren, Mike

    2012-01-01

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  8. Organisational Change -Key Steps LocalCollege/

    E-Print Network [OSTI]

    Botea, Adi

    Resources Division START Version 1.0 X:\\Employment Strategies\\Workplace Change & Innovation\\Change Management Frameworks\\Change Management - Key Steps 021111.vsd FINISH NOTES: * For information on formal vs informal change refer to the managing change clause in the ANU Enterprise Agreement and the managing change policy

  9. Chemical Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Chemical Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng Hons) Delivery type: Day Intake date: September Fees: 58000 AED per year Overview Chemical engineering successful and thriving types of business in the world. Chemical engineers play a vital role in achieving

  10. Management strategies for endangered Florida Key deer 

    E-Print Network [OSTI]

    Peterson, Markus Nils

    2004-09-30

    species. These data were used to address my study objectives. I found the most commonly cited FSR (2.67:1, male:female) for Florida Key deer to be inaccurate. A male biased FSR of 1.45:1 was more probable. Modified drop and drive nets were appropriate...

  11. Psychology with Management BSc (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Psychology with Management BSc (Hons) Key details Duration: Full-time: 4 years Delivery type: Day% Psychology with 25% Business and Management modules. Psychology modules cover a range of core approaches to psychology as well as research design and analysis and applied specialist topics. The curriculum is based

  12. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  13. Business Management BA / MA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Business Management BA / MA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (MSc Management degree programme follows a number of guiding principles that mirror the values of managers of leading organisations and reflect current business management thinking. In the first two years of all

  14. Vermont's Changing Forests Key Findings on the

    E-Print Network [OSTI]

    Keeton, William S.

    1 Vermont's Changing Forests Key Findings on the Health of Forested Ecosystems from the Vermont Members Anne Archie, USDA Forest Service Douglas Lantagne, University of Vermont Ed O'Leary, Vermont, USDA Farm Service Agency Charles Scott, USDA Forest Service Steven Sinclair, Vermont Agency of Natural

  15. Automotive Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Automotive Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng programme, but allows students in the later years to specialise in subjects relating to automotive technology. Automotive engineering continues to be a major employer of professional engineers, owing

  16. CAREER RESOURCES Canadian Key Business Directory

    E-Print Network [OSTI]

    Thompson, Michael

    CAREER RESOURCES BOOKS Canadian Key Business Directory - Includes the largest companies in Canada companies - Search by name, geography, SIC code and more! - Online version available through library: http://www.jobsetc.gc.ca/eng/ - Training, career and worker information - Career Exploration resources

  17. Energy Indicators for Sustainable Development: Guidelines and...

    Open Energy Info (EERE)

    Some indicators focus on the delivery of essential energy services for reducing poverty and improving living conditions, while other indicators focus on environmental...

  18. NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues

    E-Print Network [OSTI]

    NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues Cem Kaner, J.D., Ph.D., ASQ-CQE November 1999 Contact Information: kaner@kaner.com www.kaner.com (testing November 1999 Cem Kaner Page 2 UCITA? Huh?UCITA? Huh? · Uniform Computer Information Transactions Act

  19. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

  20. Identification of Key Barriers in Workforce Development

    SciTech Connect (OSTI)

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  1. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  2. Rapid Compression Machine ? A Key Experimental Device to Effectively...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compression Machine A Key Experimental Device to Effectively Collaborate with Basic Energy Sciences Rapid Compression Machine A Key Experimental Device to Effectively...

  3. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  4. Single, Key Gene Discovery Could Streamline Production of Biofuels...

    Energy Savers [EERE]

    Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

  5. Building America Expert Meeting: Key Innovations for Adding Energy...

    Energy Savers [EERE]

    Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance...

  6. Thailand-Key Results and Policy Recommendations for Future Bioenergy...

    Open Energy Info (EERE)

    Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future...

  7. Technology Key to Harnessing Natural Gas Potential | Department...

    Office of Environmental Management (EM)

    Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa...

  8. Key Energy-Saving Projects for Smaller Facilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Energy-Saving Projects for Smaller Facilities Key Energy-Saving Projects for Smaller Facilities This presentation discusses how smaller industrial facilities can save energy...

  9. Red Algae Lose Key Mitochondrial Genes in Response to Becoming Parasitic

    E-Print Network [OSTI]

    Lane, Chris

    Red Algae Lose Key Mitochondrial Genes in Response to Becoming Parasitic Lillian Hancock1 , Lynda independently evolved hundreds of times among the floridiophyte red algae. Much is known about the life history class of red algae, Plocamiocolax puvinata, has lost the atp8 gene entirely, indicating that this gene

  10. PROGRAMME GROUP RESEARCH UPDATE: Biodiversity indicators &

    E-Print Network [OSTI]

    operations and impacts, tree species type and site quality, observation and evidence of forest biological1 PROGRAMME GROUP RESEARCH UPDATE: Biodiversity indicators & knowledge management programme group Introduction Duncan Ray The programme group Biodiversity Indicators and Knowledge Management (BIKM

  11. An indicator energy of two close levels

    E-Print Network [OSTI]

    Alexander V. Shamanin

    2013-09-17

    In this paper, we introduce a concept of an indicator energy of two close levels in the perturbation.

  12. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  13. Another key Y-12 General Foreman remembered

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TAPropaneandAn319Another key Y-12 General Foreman

  14. Keyes, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLCKeyes,

  15. NERSC.COE.key.actions-4.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on77 PAGEMissionStressMoveMuncriefB ONERSCNERSC8 CoE Key Actions

  16. Composite keys? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlusComposite keys? Home >

  17. Fermilab | Science | Particle Physics | Key Discoveries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find whatGasEnergyfeature photo featureParticleDark matterKey

  18. Key Agency Targets Summary _FY 2012_.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5 B

  19. Key Actions for Optimizing for KNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin Morris Title:AnaKey

  20. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power, IncBio Centers Announcement at theproduceƈ GOAL:Key

  1. Fair Encryption of RSA Keys Guillaume Poupard and Jacques Stern

    E-Print Network [OSTI]

    Stern, Jacques

    based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs

  2. Session-Key Generation using Human Passwords Only Oded Goldreich

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session-Key Generation using Human Passwords Only Oded Goldreich Department of Computer Science present session-key generation protocols in a model where the legitimate parties share only a human assumptions. Keywords: Session-key generation (authenticated key-exchange), mutual authentication proto- cols

  3. SessionKey Generation using Human Passwords Only # Oded Goldreich +

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session­Key Generation using Human Passwords Only # Oded Goldreich + Department of Computer Science present session­key generation protocols in a model where the legitimate parties share only a human setup assumptions. Keywords: Session­key generation (authenticated key­exchange), mutual authentication

  4. The impacts of urbanization on endangered florida key deer 

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12

    of peninsular Florida. Key deer range is restricted to the Lower Florida Keys with approximately 60% residing on Big Pine Key and 15% residing on No Name Key which have undergone rapid human population growth and development over the past 30 years. Urban...

  5. STUDENT AGREEMENT Student should initial, indicating agreement

    E-Print Network [OSTI]

    Meyers, Steven D.

    STUDENT AGREEMENT Student should initial, indicating agreement: ____ I have met with my graduate dates: Master's Degree: Total Hours Master's Degree: Completion Date Instructions: Once the final

  6. Energy Intensity Indicators: Terminology and Definitions

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Energy Intensity Indicators website uses the following terms with their associated definitions. The terms related to various definitions of energy are discussed first.

  7. Natural skip oviposition of the mosquito Aedes aegypti indicated by codominant genetic markers

    E-Print Network [OSTI]

    Severson, David

    oviposit in more than one container. Key words. Aedes aegypti, container breeding, dengue vector, mosquito larvae, oviposition behaviour, relatedness, RFLP, skip-oviposition, vector biology, yellow fever mosquitoNatural skip oviposition of the mosquito Aedes aegypti indicated by codominant genetic markers Y. M

  8. FieldIndicators of Hydric Soils

    E-Print Network [OSTI]

    Gray, Matthew

    Soils, Version 5.01, 2003 Natural Resources Conservation Service Wetland Science Institute Soil on the right has mucky peat (hemic soil material) to a depth of about 8 cm. If indicator S2 (2.5 cm mucky peat or peat) or indicator S3 (5 cm mucky peat or peat) is not a concern, morphologies below 8 cm would

  9. Electricity and Development: Global Trends and Key Challenges

    E-Print Network [OSTI]

    ;3. Prospects for Electricity Development Electricity Access Projected Electrification Rates by Region globalElectricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12

  10. Energy Storage: The Key to a Reliable, Clean Electricity Supply...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy...

  11. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  12. SOW and Key Performance Parameters (KPP) Handbook Final Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 This handbook provides suggested...

  13. Could Solar Energy Storage be Key for Residential Solar? | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? October 26, 2010 - 4:52pm Addthis This is the silent power storage...

  14. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  15. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  16. The Utility Relationship to its Key Industries 

    E-Print Network [OSTI]

    Gilbert, J. S.

    1986-01-01

    then thpy promised never, ever to build another powerplant. Wi th that as a backdrop, let's takt' a closer look at the industrial-util ity relatiunship, 1 t is no di fffll'(,nt from any athel' relationship. Both parties must be honeR t and open... resistance heat against gas where it doesn't belong. Now let's get on the positive side of the picture. Utilities should indicate it pro-industrial posture. Start with your own employees. no they patronize their business. Do they buy their products...

  17. Master Thesis Group Key Agreement for Ad Hoc Networks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Master Thesis Group Key Agreement for Ad Hoc Networks Lijun Liao Date: 06 July 2005 Supervisor: M their financial support. #12;Abstract Over the last 30 years the study of group key agreement has stimulated much present a Tree-based group key agreement Framework for Ad-hoc Networks (TFAN). TFAN is especially suitable

  18. Distributed Key Generation in the Wild Aniket Kate1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distributed Key Generation in the Wild Aniket Kate1 Yizhou Huang2 Ian Goldberg2 1 Max Planck of Waterloo, Canada aniket@mpi-sws.org, {y226huan, iang}@uwaterloo.ca Abstract Distributed key generation (DKG communication model. computational setting. distributed key generation. uniform randomness. implementation 1

  19. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  20. Leakage-Resilient Cryptography with Key Derived from Sensitive Data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Leakage-Resilient Cryptography with Key Derived from Sensitive Data Konrad Durnoga , Tomasz Kazana subject to adversarial leakage. We propose a method to derive keys for such protocols on-the-fly from the actual keys are derived from. That is, an adversary can hardly gain any knowledge about the private data

  1. Environ. Impact Asses. Rev., Vol. 38, Jan. 2013, p. 35-43. Developing an indicator for the chronic health impact

    E-Print Network [OSTI]

    Boyer, Edmond

    of this study is to develop an emission based indicator for the health impact of the air pollution caused and reliability. Key words: Health impact, indicator, air pollution, traffic-related emissions 1. Introduction health impact of traffic-related pollutant emissions Véronique Lépicier a , Mireille Chiron b, 1 , Robert

  2. Economic and energy indicators. Monthly report

    SciTech Connect (OSTI)

    Not Available

    1994-01-01

    The Economic and Energy Indicator provides up-to-date information on changes since 1977 in economic and energy activities of major countries. It consists of tables only. They depict economic indicators (industrial production, unemployment, consumer price inflation, and exchange rate trends) for the Big Seven developed countries (United States, Japan, West Germany, France, United Kingdom, Italy, and Canada); foreign trade and foreign trade prices for the Big Seven; and monthly average prices for selected agricultural products and industrial materials. The energy indicators include tables on petroleum consumption, production, and imports for the Big Seven. A table and chart depict the movement of OPEC average crude oil sales prices since 1973.

  3. Scintillation probe with photomultiplier tube saturation indicator

    DOE Patents [OSTI]

    Ruch, Jeffrey F. (Bethel Park, PA); Urban, David J. (Glassport, PA)

    1996-01-01

    A photomultiplier tube saturation indicator is formed by supplying a supplemental light source, typically an light emitting diode (LED), adjacent to the photomultiplier tube. A switch allows the light source to be activated. The light is forwarded to the photomultiplier tube by an optical fiber. If the probe is properly light tight, then a meter attached to the indicator will register the light from the LED. If the probe is no longer light tight, and the saturation indicator is saturated, no signal will be registered when the LED is activated.

  4. Benchmarking Sustainability: the use of Indicators

    E-Print Network [OSTI]

    Zaferatos, Nicholas C.

    Benchmarking Sustainability: the use of Indicators Introduction The concept of sustainable development is both very popular and elusive. The overwhelming appeal of sustainability is situated to build a generally shared perception of sustainable development (Butler, 1998). For many people

  5. Off-label indications for imiquimod

    E-Print Network [OSTI]

    Ganjian, Shahrouz; Ourian, Ariel J; Shamtoub, GabrEal; Wu, Jashin J; Murase, Jenny E

    2009-01-01

    Off-label indications for imiquimod Shahrouz Ganjian 1 ,potential candidate for off-label use in over 60 conditionspotential candidate for off-label use in over 60 conditions

  6. Optical temperature indicator using thermochromic semiconductors

    DOE Patents [OSTI]

    Kronberg, J.W.

    1995-01-01

    A reversible optical temperature indicator utilizes thermochromic semiconductors which vary in color in response to various temperature levels. The thermochromic material is enclosed in an enamel which provides protection and prevents breakdown at higher temperatures. Cadmium sulfide is the preferred semiconductor material. The indicator may be utilized as a sign or in a striped arrangement to clearly provide a warning to a user. The various color responses provide multiple levels of alarm.

  7. State of charge indicators for a battery

    DOE Patents [OSTI]

    Rouhani, S. Zia (Idaho Falls, ID)

    1999-01-01

    The present invention relates to state of charge indicators for a battery. One aspect of the present invention utilizes expansion and contraction displacements of an electrode plate of a battery to gauge the state of charge in the battery. One embodiment of a battery of the present invention includes an anodic plate; a cathodic plate; an electrolyte in contact with the anodic and cathodic plates; plural terminals individually coupled with one of the anodic and cathodic plates; a separator intermediate the anodic and cathodic plates; an indicator configured to indicate an energy level of the battery responsive to movement of the separator; and a casing configured to house the anodic and cathodic plates, electrolyte, and separator.

  8. Lanthanide-halide based humidity indicators

    DOE Patents [OSTI]

    Beitz, James V. (Hinsdale, IL); Williams, Clayton W. (Chicago, IL)

    2008-01-01

    The present invention discloses a lanthanide-halide based humidity indicator and method of producing such indicator. The color of the present invention indicates the humidity of an atmosphere to which it is exposed. For example, impregnating an adsorbent support such as silica gel with an aqueous solution of the europium-containing reagent solution described herein, and dehydrating the support to dryness forms a substance with a yellow color. When this substance is exposed to a humid atmosphere the water vapor from the air is adsorbed into the coating on the pore surface of the silica gel. As the water content of the coating increases, the visual color of the coated silica gel changes from yellow to white. The color change is due to the water combining with the lanthanide-halide complex on the pores of the gel.

  9. Solids mass flow indication with radiation

    DOE Patents [OSTI]

    Macko, Joseph E. (Irwin, PA); Estriplet, Isnard (Irwin, PA)

    1985-06-04

    Method and apparatus for indicating mass flow of a solid particulate material through a rotary feeder. A radiation source and detector are positioned in a manner whereby radiation flux is directed through, and attenuated by, particulate material contained in rotating pockets. A Cesium-137 gamma source can be mounted within the shaft of the feeder, and one or more detectors can be mounted outside of the feeder housing. The detected signal is indicative of the mass of particulate material contained within a given pocket rotating within the feeder.

  10. Nondimensional Simplification of Tensor Polynomials with Indices

    E-Print Network [OSTI]

    X. Jaen; A. Balfagon

    1999-12-15

    We are presenting an algorithm capable of simplifying tensor polynomials with indices when the building tensors have index symmetry properties. These properties include simple symmetry, cyclicity and those due to the presence of covariant derivatives. The algorithm is part of a Mathematica package called Tools of Tensor Calculus (TTC) [web address: http://baldufa.upc.es/ttc

  11. Energy Intensity Indicators: Transportation Energy Consumption

    Broader source: Energy.gov [DOE]

    This section contains an overview of the aggregate transportation sector, combining both passenger and freight segments of this sector. The specific energy intensity indicators for passenger and freight can be obtained from the links, passenger transportation, or freight transportation. For further detail within the transportation sector, download the appropriate Trend Data worksheet containing detailed data and graphics for specific transportation modes.

  12. Experimentally Determining Passivity Indices: Theory and Simulation

    E-Print Network [OSTI]

    Antsaklis, Panos

    at the University of Notre Dame ISIS-2013-002 Abstract The passivity index framework is an alternative method of characterizing energy dissipation in systems. As an analysis tool, it can be used to assess the level. Particularly, we consider testing passivity indices for vehicle systems with the adaptive cruise control (ACC

  13. General Information 1. Indicate time spent

    E-Print Network [OSTI]

    Pittendrigh, Barry

    General Information 1. Indicate time spent: On a computer at work: ____ hours per day On a computer at home: ____ hours per day On a handheld computer (e.g., Blackberry): ____ hours per day 2. Desktop or laptop computer Use: (circle applicable) My work computer is a: desktop laptop My home computer is a

  14. Advanced Review Indices for monitoring changes

    E-Print Network [OSTI]

    Center of Excellence for Climate Change Research, King Abdulaziz University, Jeddah, Saudi Arabia 6 Royal Netherlands Meteorological Institute, De Bilt, Netherlands 7National Climate Data Center, NOAA, Asheville, NC to compare observations with climate model output. However, gridding indices from daily data are not always

  15. Updated distribution and reintroduction of the Lower Keys marsh rabbit 

    E-Print Network [OSTI]

    Faulhaber, Craig Alan

    2005-02-17

    , for their advice and interest in the project. Kim Rohrs of the Monroe County Department of Planning and Environmental Resources provided valuable spatial and tabular data on land ownership and land-use planning in the Keys. My interns, Josh Harris, Kyle........................ 29 3.1 The number of individual Lower Keys marsh rabbits captured in 13 occupied populations on 4 keys from October 2001?August 2002. Data are arranged according to sex and age class...

  16. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  17. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  18. Deputy Secretary Sherwood-Randall Meets Key Government Officials...

    Broader source: Energy.gov (indexed) [DOE]

    Pritzker and Deputy Secretary Sherwood-Randall had the opportunity to engage with key Chinese government officials while in Beijing. Both met with Premier Li Keqiang and Vice...

  19. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Climate Action Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment...

  20. California Energy Incentive Programs An Annual Update on Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Issues and Financial Opportunities for Federal Sites in California California Energy Incentive Programs An Annual Update on Key Energy Issues and Financial Opportunities...

  1. Intercropped silviculture systems, a key to achieving soil fungal...

    Office of Scientific and Technical Information (OSTI)

    Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations Citation Details In-Document Search Title: Intercropped...

  2. Strategic Energy Management.  Keys to Behavioral and Operational Change.

    E-Print Network [OSTI]

    Kroll, Ryan M; Willems, Phil; Rubado, Dan; Belkhayat, Kathleen

    2015-01-01

    Strategic Energy Management Keys to Behavioral andof Oregon’s Strategic Energy Management (SEM) initiative.Introduction Strategic energy management (SEM) is defined

  3. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  4. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  5. National Climate Assessment Indicators: Background, Development, & Examples

    SciTech Connect (OSTI)

    Janetos, Anthony C.; Chen, Robert; Arndt, Deke; Kenney, Melissa A.; Abbasi, Daniel; Armstrong, Tom; Bartuska, Ann; Blair, Maria; Buizer, Jim; Dietz, Tom; Easterling, Dave; Kaye, Jack; Kolian, Michael; McGeehin, Michael; O'Connor, Robert; Pulwarty, Roger; Running, Steve; Schmalensee, Dick; Webb, Robert; Weltzin, Jake; Baptista, Sandra; Enquist, Carolyn A.; Janetos, Anthony C.; Chen, Robert; Arndt, Deke; Hatfield, Jerry; Hayes, Mark L.; Jones, K. Burce; McNutt, Chad; Meier, Wayne R.; Schwartz, Mark D.; Svoboda, Mark

    2012-02-28

    Indicators are usually thought of as measurements or calculations that represent important features of the status, trend, or performance of a system of interest (e.g. the economy, agriculture, air quality). They are often used for the most practical of reasons – one cannot measure everything important about systems of interest, so there is a practical need to identify major features that can be reported periodically and used to guide both research and decisions (NRC 2000).

  6. Method of Indicators Binomial mean (again)

    E-Print Network [OSTI]

    Adler, Robert J.

    ' & $ % Lecture 15 Method of Indicators Binomial mean (again) Tail sum formula Boole's inequality{Tr} = r/p. 7 #12;' & $ % E{X} = n k=1 P{X k} Proof 1 (Algebra) E{X} = n k=0 kpk = p1 +p2 +p2 +p3 +p3 +p3}] + . . . + 6 [P{M 6} - P{M 7}] = 6 k=1 P{M k} 11 #12;' & $ % Boole's inequality: P{X 1} E{X}. (If X takes

  7. For realizing a robot working in human society, interaction with humans is the key issue. We have

    E-Print Network [OSTI]

    Kanda, Takayuki

    Abstract For realizing a robot working in human society, interaction with humans is the key issue. We have developed a robot that interacts with humans based on visual recognition. This robot has two and a binocular stereo vision system. The binocular vision system indicates what the robot is looking

  8. AES Flow Interception : Key Snooping Method on Virtual Machine.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES for snooping AES en- cryption key on Virtual Machine Monitor (VMM), and we present coun- termeasures against. In general, the virtualization technology composes two software parts: one is vir- tual machine (VM

  9. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  10. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  11. A Distributed Public Key Caching Scheme in Large Wireless Networks

    E-Print Network [OSTI]

    Deng, Jing

    -constrained, in terms of computational power, battery energy, and on-board memory space. For example, the prototypeA Distributed Public Key Caching Scheme in Large Wireless Networks Yuan Kong Jing Deng Stephen R in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate

  12. Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme P. Scholl and N.P. Smart scheme was the slow key generation process. Gentry and Halevi provided a fast technique for 2-power cyclo. In particular they focused on the field generated by the polynomial F(X) = X2n + 1, but they noted

  13. Zero-one laws for connectivity in random key graphs

    E-Print Network [OSTI]

    Yagan, Osman

    with the random key predistribution scheme of Eschenauer and Gligor for wireless sensor networks. For this class which are more realistic for applications to wireless sensor networks. Keywords: Wireless sensor- dom key predistribution for wireless sensor networks (WSNs) [6], [7], [9]. For the sake

  14. Baton: Key Agility for Android without a Centralized Certificate Infrastructure

    E-Print Network [OSTI]

    Van Oorschot, Paul

    Baton: Key Agility for Android without a Centralized Certificate Infrastructure David Barrera,dmccarney}@ccsl.carleton.ca {clark,paulv}@scs.carleton.ca ABSTRACT Android's trust-on-first-use application signing model asso transfer signing au- thority to a new signing key. Our proposal, Baton, modifies Android's app installation

  15. Comparative Analysis of Software Libraries for Public Key Cryptography

    E-Print Network [OSTI]

    Gaj, Krzysztof

    Comparative Analysis of Software Libraries for Public Key Cryptography Ashraf Abusharekh1 and Kris libraries implementing such operations exist both commercially and in the public domain, in this paper, we, using performance and support of public key primitive operations. The performance of all libraries

  16. k-Connectivity in Random Key Graphs with Unreliable Links

    E-Print Network [OSTI]

    Yagan, Osman

    of Eschenauer and Gligor for securing wireless sensor network (WSN) communications. Random key graphs have real-world networks; e.g., with secure WSN application in mind, link unreliability can be attributed for securing WSN communications is the random predistribution of cryptographic keys to sensor nodes

  17. Wireless sensor networks under the random pairwise key predistribution scheme

    E-Print Network [OSTI]

    Yagan, Osman

    Wireless sensor networks under the random pairwise key predistribution scheme: Can resiliency, College Park, MD 20742. Email: armand@isr.umd.edu Abstract--We investigate the resiliency of wireless the classical key predistribution scheme of Eschenauer and Gligor. Keywords: Wireless sensor networks, Security

  18. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  19. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  20. The advanced flame quality indicator system

    SciTech Connect (OSTI)

    Oman, R.; Rossi, M.J.; Calia, V.S.; Davis, F.L.; Rudin, A. [Insight Technologies, Inc., Bohemia, NY (United States)

    1997-09-01

    By combining oil tank monitoring, systems diagnostics and flame quality monitoring in an affordable system that communicates directly with dealers by telephone modem, Insight Technologies offers new revenue opportunities and the capability for a new order of customer relations to oil dealers. With co-sponsorship from New York State Energy Research and Development Authority, we have incorporated several valuable functions to a new product based on the original Flame Quality Indicator concept licensed from the US DOE`s Brookhaven National Laboratory. The new system is the Advanced Flame Quality Indicator, or AFQI. As before, the AFQI monitors and reports the intensity of the burner flame relative to a calibration established when the burner is set up at AFQI installation. Repairs or adjustments are summoned by late-night outgoing telephone calls when limits are exceeded in either direction, indicating an impending contamination or other malfunction. A independently, a pressure transducer for monitoring oil tank level and filter condition, safety lockout alarms and a temperature monitor; all reporting automatically at instructed intervals via an on-board modem to a central station PC computer (CSC). Firmware on each AFQI unit and Insight-supplied software on the CSC automatically interact to maintain a customer database for an oil dealer, an OEM, or a regional service contractor. In addition to ensuring continuously clean and efficient operation, the AFQI offers the oil industry a new set of immediate payoffs, among which are reduced outages and emergency service calls, shorter service calls from cleaner operation, larger oil delivery drops, the opportunity to stretch service intervals to as along as three years in some cases, new selling features to keep and attract customers, and greatly enhanced customer contact, quality and reliability.

  1. Analyzing intramolecular dynamics by Fast Lyapunov Indicators

    E-Print Network [OSTI]

    Elena Shchekinova; Cristel Chandre; Yueheng Lan; Turgay Uzer

    2009-04-23

    We report an analysis of intramolecular dynamics of the highly excited planar carbonyl sulfide (OCS) below and at the dissociation threshold by the Fast Lyapunov Indicator (FLI) method. By mapping out the variety of dynamical regimes in the phase space of this molecule, we obtain the degree of regularity of the system versus its energy. We combine this stability analysis with a periodic orbit search, which yields a family of elliptic periodic orbits in the regular part of phase space an a family of in-phase collinear hyperbolic orbits associated with the chaotic regime.

  2. Turbine airfoil with outer wall thickness indicators

    DOE Patents [OSTI]

    Marra, John J; James, Allister W; Merrill, Gary B

    2013-08-06

    A turbine airfoil usable in a turbine engine and including a depth indicator for determining outer wall blade thickness. The airfoil may include an outer wall having a plurality of grooves in the outer surface of the outer wall. The grooves may have a depth that represents a desired outer surface and wall thickness of the outer wall. The material forming an outer surface of the outer wall may be removed to be flush with an innermost point in each groove, thereby reducing the wall thickness and increasing efficiency. The plurality of grooves may be positioned in a radially outer region of the airfoil proximate to the tip.

  3. FIELD TEST OF THE FLAME QUALITY INDICATOR

    SciTech Connect (OSTI)

    Andrew M. Rudin; Thomas Butcher; Henry Troost

    2003-02-04

    The flame quality indicator concept was developed at BNL specifically to monitor the brightness of the flame in a small oil burner and to provide a ''call for service'' notification when the brightness has changed from its setpoint, either high or low. In prior development work BNL has explored the response of this system to operational upsets such as excess air changes, fouled atomizer nozzles, poor fuel quality, etc. Insight Technologies, Inc. and Honeywell, Inc. have licensed this technology from the U.S. Department of Energy and have been cooperating to develop product offerings which meet industry needs with an optimal combination of function and price. Honeywell has recently completed the development of the Flame Quality Monitor (FQM or Honeywell QS7100F). This is a small module which connects via a serial cable to the burners primary operating control. Primary advantages of this approach are simplicity, cost, and ease of installation. Call-for-service conditions are output in the form of front panel indicator lights and contact closure which can trigger a range of external communication options. Under this project a field test was conducted of the FQM in cooperation with service organizations in Virginia, Pennsylvania, New Jersey, New York, and Connecticut. At total of 83 field sites were included. At each site the FQM was installed in parallel with another embodiment of this concept--the Insight AFQI. The AFQI incorporates a modem and provides the ability to provide detailed information on the trends in the flame quality over the course of the two year test period. The test site population was comprised of 79.5% boilers, 13.7% warm air furnaces, and 6.8% water heaters. Nearly all were of residential size--with firing rates ranging from 0.6 gallons of oil per hour to 1.25. During the course of the test program the monitoring equipment successfully identified problems including: plugged fuel lines, fouled nozzles, collapsed combustion chambers, and poor fuel pump cut-off. Service organizations can use these early indications to reduce problems and service costs. There were also some ''call-for-service'' indications for which problems were not identified. The test program also showed that monitoring of the flame can provide information on burner run times and this can be used to estimate current oversize factors and to determine actual fuel usage, enabling more efficient fuel delivery procedures.

  4. Cosmological data and indications for new physics

    SciTech Connect (OSTI)

    Benetti, Micol; Gerbino, Martina; Melchiorri, Alessandro; Pagano, Luca; Kinney, William H.; Kolb, Edward W.; Lattanzi, Massimiliano; Riotto, Antonio E-mail: martina.gerbino@roma1.infn.it E-mail: Rocky.Kolb@uchicago.edu E-mail: alessandro.melchiorri@roma1.infn.it E-mail: antonio.riotto@unige.ch

    2013-10-01

    Data from the Atacama Cosmology Telescope (ACT) and the South Pole Telescope (SPT), combined with the nine-year data release from the WMAP satellite, provide very precise measurements of the cosmic microwave background (CMB) angular anisotropies down to very small angular scales. Augmented with measurements from Baryonic Acoustic Oscillations surveys and determinations of the Hubble constant, we investigate whether there are indications for new physics beyond a Harrison-Zel'dovich model for primordial perturbations and the standard number of relativistic degrees of freedom at primordial recombination. All combinations of datasets point to physics beyond the minimal Harrison-Zel'dovich model in the form of either a scalar spectral index different from unity or additional relativistic degrees of freedom at recombination (e.g., additional light neutrinos). Beyond that, the extended datasets including either ACT or SPT provide very different indications: while the extended-ACT (eACT) dataset is perfectly consistent with the predictions of standard slow-roll inflation, the extended-SPT (eSPT) dataset prefers a non-power-law scalar spectral index with a very large variation with scale of the spectral index. Both eACT and eSPT favor additional light degrees of freedom on top of the Harrison-Zel'dovich model. eACT is consistent with zero neutrino masses, while eSPT favors nonzero neutrino masses at more than 95% confidence.

  5. Key Facts about Argonne National Laboratory | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKeyKey

  6. Extracellular Signatures as Indicators of Processing Methods

    SciTech Connect (OSTI)

    Wahl, Karen L.

    2012-01-09

    As described in other chapters within this volume, many aspects of microbial cells vary with culture conditions and therefore can potentially be analyzed as forensic signatures of growth conditions. In addition to changes or variations in components of the microbes themselves, extracellular materials indicative of production processes may remain associated with the final bacterial product. It is well recognized that even with considerable effort to make pure products such as fine chemicals or pharmaceuticals, trace impurities from components or synthesis steps associated with production processes can be detected in the final product. These impurities can be used as indicators of production source or methods, such as to help connect drugs of abuse to supply chains. Extracellular residue associated with microbial cells could similarly help to characterize production processes. For successful growth of microorganisms on culture media there must be an available source of carbon, nitrogen, inorganic phosphate and sulfur, trace metals, water and vitamins. The pH, temperature, and a supply of oxygen or other gases must also be appropriate for a given organism for successful culture. The sources of these components and the range in temperature, pH and other variables has adapted over the years with currently a wide range of possible combinations of media components, recipes and parameters to choose from for a given organism. Because of this wide variability in components, mixtures of components, and other parameters, there is the potential for differentiation of cultured organisms based on changes in culture conditions. The challenge remains how to narrow the field of potential combinations and be able to attribute variations in the final bacterial product and extracellular signatures associated with the final product to information about the culture conditions or recipe used in the production of that product.

  7. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  8. OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts!

    E-Print Network [OSTI]

    OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts! Eyestalk mouth antenna cheliped CURRICULUM Name: _____________________ Fun Crab Facts! Eyestalk Mouth Antenna Cheliped Carapace Walking metamorphosis motorcycle exoskeleton omnivores butterfly pea #12;OIMB GK12 CURRICULUM Masked crab Fiddler crab

  9. EnergySmart Schools National Financing Roundtable - Key Outcomes

    SciTech Connect (OSTI)

    2009-04-01

    This document presents key outcomes from the EnergySmart Schools National Financing Roundtable as a follow-up to the release of its Guide to FInancing EnergySmart Schools

  10. LANL breaks ground on key sediment control project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and made of rocks...

  11. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all about turbulence....

  12. Refine the Concept of Public Key Encryption with Delegated Search

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    with the public key of Bob, but unfortunately, her computer is infected by some virus which embeds a malware contents. However, in this way, Bob's computer will be under the risk of infection by the malware

  13. A Key Review On Exergetic Analysis And Assessment Of Renewable...

    Open Energy Info (EERE)

    A Key Review On Exergetic Analysis And Assessment Of Renewable Energy Resources For A Sustainable Future Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal...

  14. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren students may want to (quietly) opt out of their friends' illicit file trading activities, but academics

  15. Practical Non-Interactive Key Distribution Based on Pairings

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , the Private Key Generator (PKG), who possesses additional privileged information in the form of a master in a non- interactive system is that the synchronous communication between Alice and Bob is replaced

  16. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  17. Reflective cracking of shear keys in multi-beam bridges 

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02

    strength to resist cracking from vehicular loads, but uneven temperature changes and shrinkage strains cause high tensile stresses in the shear key regions and lead to reflective cracking. The analyses showed the highest stresses were often times near...

  18. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  19. Darcy Q. Hou State Key Laboratory of Hydraulic

    E-Print Network [OSTI]

    Tijsseling, A.S.

    Darcy Q. Hou State Key Laboratory of Hydraulic Engineering Simulation and Safety, and School to severe dam- ages. Over 50 incidents have been attributed to this mechanism and an accident was reported

  20. Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the observed set of round subkeys in memory (computed via the cipher's key schedule operation), which were, for transparent en- cryption and decryption of data. One could apply the method from [9] to obtain the computer

  1. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  2. Room temperature single-photon detectors for high bit rate quantum key distribution

    SciTech Connect (OSTI)

    Comandar, L. C.; Patel, K. A.; Fröhlich, B. Lucamarini, M.; Sharpe, A. W.; Dynes, J. F.; Yuan, Z. L.; Shields, A. J.; Penty, R. V.

    2014-01-13

    We report room temperature operation of telecom wavelength single-photon detectors for high bit rate quantum key distribution (QKD). Room temperature operation is achieved using InGaAs avalanche photodiodes integrated with electronics based on the self-differencing technique that increases avalanche discrimination sensitivity. Despite using room temperature detectors, we demonstrate QKD with record secure bit rates over a range of fiber lengths (e.g., 1.26 Mbit/s over 50?km). Furthermore, our results indicate that operating the detectors at room temperature increases the secure bit rate for short distances.

  3. INEEL Radiological Control Performance Indicator Report - Quarterly

    SciTech Connect (OSTI)

    Hinckley, Frank Leroy

    1999-02-01

    This document provides a report of an analysis of the Radiological Control Program through the fourth quarter of Calendar Year (CY-98) and is the annual report for the Idaho National Engineering and Environmental Laboratory (INEEL). This Performance Indicator Report is provided in accordance with Article 133 of the INEEL Radiological Control Manual. The INEEL collective occupational radiation deep dose is 63.034 person-rem year to date, compared to a goal of 83.1 person-rem. During the fourth quarter, all areas experienced deletions of work resulting from the Maintenance Stand Down. This reduction in work is a primary factor in the difference in the year end dose and the ALARA goal. The work will be completed during CY-99. Beginning in CY-98, a numeric Radiological Performance Index (RPI) is being used to compare radiological performance. The RPI takes into consideration frequency and severity of events such as skin contaminations, clothing contaminations, spills, exposures to radiation exceeding limits, and positive internal dose. The RPI measures the cost of these events in cents per hour of radiological work performed. To make the RPI meaningful, tables have been prepared to show the facility that contributes to the values used. The data are compared on a quarterly basis to the prior year to show measurable performance.

  4. A tamper-indicating quantum seal

    E-Print Network [OSTI]

    Brian P. Williams; Keith A. Britt; Travis S. Humble

    2015-08-21

    Technical means for identifying when tampering occurs is a critical part of many containment and surveillance technologies. Conventional fiber optic seals provide methods for monitoring enclosed inventories, but they are vulnerable to spoofing attacks based on classical physics. We address these vulnerabilities with the development of a quantum seal that offers the ability to detect the intercept-resend attack using quantum integrity verification. Our approach represents an application of entanglement to provide guarantees in the authenticity of the seal state by verifying it was transmitted coherently. We implement these ideas using polarization-entangled photon pairs that are verified after passing through a fiber-optic channel testbed. Using binary detection theory, we find the probability of detecting inauthentic signals is greater than 0.9999 with a false alarm chance of 10$^{-9}$ for a 10 second sampling interval. In addition, we show how the Hong-Ou-Mandel effect concurrently provides a tight bound on redirection attack, in which tampering modifies the shape of the seal. Our measurements limit the tolerable path length change to sub-millimeter disturbances. These tamper-indicating features of the quantum seal offer unprecedented security for unattended monitoring systems.

  5. A tamper-indicating quantum seal

    E-Print Network [OSTI]

    Brian P. Williams; Keith A. Britt; Travis S. Humble

    2015-10-15

    Technical means for identifying when tampering occurs is a critical part of many containment and surveillance technologies. Conventional fiber optic seals provide methods for monitoring enclosed inventories, but they are vulnerable to spoofing attacks based on classical physics. We address these vulnerabilities with the development of a quantum seal that offers the ability to detect the intercept-resend attack using quantum integrity verification. Our approach represents an application of entanglement to provide guarantees in the authenticity of the seal state by verifying it was transmitted coherently. We implement these ideas using polarization-entangled photon pairs that are verified after passing through a fiber-optic channel testbed. Using binary detection theory, we find the probability of detecting inauthentic signals is greater than 0.9999 with a false alarm chance of $10^{-9}$ for a 10 second sampling interval. In addition, we show how the Hong-Ou-Mandel effect concurrently provides a tight bound on redirection attack, in which tampering modifies the shape of the seal. Our measurements limit the tolerable path length change to sub-millimeter disturbances. These tamper-indicating features of the quantum seal offer unprecedented security for unattended monitoring systems.

  6. Untappable key distribution system: a one-time-pad booster

    E-Print Network [OSTI]

    Geraldo A. Barbosa; Jeroen van de Graaf

    2015-07-08

    One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. This paper presents a solution for this problem providing a fast and unlimited renewal of secure keys: An untappable key distribution system is presented and detailed. This fast key distribution system utilizes two layers of confidentially protection: 1) Physical noise intrinsic to the optical channel that turn the coded signals into stealth signals and 2) Privacy amplification using a bit pool of refreshed entropy run after run, to eliminate any residual information. The resulting level of security is rigorously calculated and demonstrates that the level of information an eavesdropper could obtain is completely negligible. The random bit sequences, fast and securely distributed, can be used to encrypt text, data or voice.

  7. Systems Engineering Leading Indicators Guide, Version 1.0

    E-Print Network [OSTI]

    Lean Advancement Initiative

    2013-10-31

    The Systems Engineering Leading Indicators guide set reflects the initial subset of possible indicators that were considered to be the highest priority for evaluating effectiveness before the fact. A leading indicator is ...

  8. Continuous Variable Quantum Key Distribution with a Noisy Laser

    E-Print Network [OSTI]

    Christian S. Jacobsen; Tobias Gehring; Ulrik L. Andersen

    2015-07-06

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances large amounts of preparation noise can be tolerated in contrast to reverse reconciliation where the key rate quickly drops to zero. Our experiment thereby demonstrates that quantum key distribution with non-shot-noise limited laser diodes might be feasible.

  9. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  10. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  11. 110 Curtin university of teChnology annual report 2012 CertiFiCAtion oF KeY PerForMAnCe indiCAtors

    E-Print Network [OSTI]

    Mucina, Ladislav

    ($) Ranking Strengthen research capability and performance. Enhance capacity and financial sustainability. k and performance. Enhance capacity and financial sustainability. m Research Publication (weighted Higher Education research capability and performance. Enhance capacity and financial sustainability. o Weig

  12. A Comparison of Value-Added Accountability Systems with Accountability Systems that Use the Success of Economically Disadvantaged Students as a Key Accountability Indicator 

    E-Print Network [OSTI]

    Barlow, Kevin Lynn

    2014-12-12

    in education is continually in the news and is a major topic of discussion among legislators, policy makers, local school board members, school administrators, and the public in general (Nuttall, Goldstein, Prosser, & Rasbash, 1989; TEA, 2014; USDE, 2002.... Accountability in education has been discussed for several years in the United States (TEA, 2014; USDE, 2002). Texas entered the era of accountability when “the Texas Legislature in 1993 enacted statutes that mandated the creation of the Texas public school...

  13. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  14. Robust Shot Noise Measurement for Continuous Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Sébastien Kunz-Jacques; Paul Jouguet

    2015-01-17

    We study a practical method to measure the shot noise in real time in Continuous Variable Quantum Key Distribution (CVQKD) systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e. noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  15. Feasibility of underwater free space quantum key distribution

    E-Print Network [OSTI]

    Peng Shi; Shi-Cheng Zhao; Wen-Dong Li; Yong-Jian Gu

    2014-04-04

    We investigate the optical absorption and scattering properties of underwater media pertinent to our underwater free space quantum key distribution (QKD) channel model. With the vector radiative transfer theory and Monte Carlo method, we obtain the attenuation of photons, the fidelity of the scattered photons, the quantum bit error rate and the sifted key generation rate of underwater quantum communication. It can be observed from our simulations that the most secure single photon underwater free space QKD is feasible in the clearest ocean water.

  16. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKey

  17. Sustainability Indicators for Discrete Manufacturing Processes Applied to Grinding Technology

    E-Print Network [OSTI]

    Linke, Barbara S.; Corman, Gero J.; Dornfeld, David A.; Tönissen, Stefan

    2013-01-01

    the data into three sustainability indicators for eachor into one total sustainability indicator. The weighting isAn overview of sustainability assessment methodologies,

  18. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  19. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  20. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  1. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  2. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  3. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  4. Preparing Turkey Safely Turkey provides protein along with other key

    E-Print Network [OSTI]

    Preparing Turkey Safely Nutrition Turkey provides protein along with other key nutrients. A serving is 3 ounces cooked poultry (about the size of a deck of cards). One serving of roasted, skinless turkey protein; iron--8% daily value Right Size Turkey Use this chart as a helpful guide: Whole bird ­ 1 pound

  5. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  6. GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald

    E-Print Network [OSTI]

    Ma, Lena

    GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald Contact: Soil and Water information systems (GIS), geostatistical and statistical methods, space-time landscape modeling, remote laboratory. Available software include: MS Office Suite; MS SQL database; ArcGIS Suite (ESRI) including

  7. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  8. Experimental quantum key distribution without monitoring signal disturbance

    E-Print Network [OSTI]

    Hiroki Takesue; Toshihiko Sasaki; Kiyoshi Tamaki; Masato Koashi

    2015-05-29

    Since the invention of Bennett-Brassard 1984 (BB84) protocol, many quantum key distribution (QKD) protocols have been proposed and some protocols are operated even in field environments. One of the striking features of QKD is that QKD protocols are provably secure unlike cryptography based on computational complexity assumptions. It has been believed that, to guarantee the security of QKD, Alice and Bob have to monitor the statistics of the measurement outcomes which are used to determine the amount of the privacy amplification to generate a key. Recently a new type of QKD protocol, called round robin differential phase shift (RRDPS) protocol, was proposed, and remarkably this protocol can generate a key without monitoring any statistics of the measurement outcomes. Here we report an experimental realization of the RRDPS protocol. We used a setup in which Bob randomly chooses one from four interferometers with different pulse delays so that he could implement phase difference measurements for all possible combinations with five-pulse time-bin states. Using the setup, we successfully distributed keys over 30 km of fiber, making this the first QKD experiment that does not rely on signal disturbance monitoring.

  9. The Seven Keys to Success in Energy Management and Conservation 

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  10. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE­HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN­order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  11. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  12. Appendix 30 Fire Effects on Key Ecological Processes in Forested

    E-Print Network [OSTI]

    Appendix 30 Fire Effects on Key Ecological Processes in Forested Ecosystems The following paragraphs on fire effects on forest succession are from Stickney (1982) Forest Succession ...the severity of the pre-disturbance forest herb species also demonstrated the ability to survive fire, particularly those

  13. Outline Overview Design Principles Key Points Design Principles

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 12 #12-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least Common Mechanism Psychological Acceptability 3 Key Points Ahmad Almulhem - Network Security Engineering - 2008 2 / 12 #12;Outline

  14. Annual Report 2004 1 Key events during 2004

    E-Print Network [OSTI]

    Svenningsson, Josef

    Johansson studying the separation of carbon dioxide in a reactor system for two-stage combustion. #12;1 Key for innovation systems and entrepreneurship A year of anniversaries ­ the University, the Foundation, Chalmers are among those hardest struck,but many holidaying Swedes,especially in Thailand,fall victim to the tsunami

  15. MOLECULAR ENTOMOLOGY Molecular Identification Key for Pest Species of Scirtothrips

    E-Print Network [OSTI]

    Hoddle, Mark S.

    primers and determining the size of the products by using standard agarose gel electrophoresis, followed, Neohydatothrips, molecular identiÞcation key, exotic pests, nondestruc- tive DNA extraction The genus Scirtothrips, several species of Scirtothrips have (or have the potential to) spread from their natural habitats

  16. Introduction Adhesion complexes play key roles in many events, including

    E-Print Network [OSTI]

    Hardin, Jeff

    Introduction Adhesion complexes play key roles in many events, including cell migration cell adhesion are remarkably similar in Caenorhabditis elegans, Drosophila and humans (Hynes and Zhao to reveal much about the basic, conserved molecular mechanisms that mediate and regulate cell adhesion

  17. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  18. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  19. news and views A key issue for hydrogen storage materi-

    E-Print Network [OSTI]

    Palumbi, Stephen

    news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

  20. Key Directions and a Roadmap for Electrical Design for Manufacturability

    E-Print Network [OSTI]

    Kahng, Andrew B.

    Key Directions and a Roadmap for Electrical Design for Manufacturability (Invited Talk) Andrew B by design and design-for- manufacturability (DFM) techniques. This talk addresses trends and a roadmap assumptions come true? The second part will give a roadmap for electrical DFM technologies, motivated

  1. Key Title Marine Ecology www.wiley.com

    E-Print Network [OSTI]

    Wall, Diana

    Key Title Marine Ecology www.wiley.com Antarctic Ecosystems: An Extreme Environment in a Changing their genomes. Chapters address both Antarctic terrestrial and marine ecosystems, and the scientific and evolution Part II: Marine habitats and regions Chapter 4. The impact of regional climate change

  2. Key Facts About Hurricane Readiness Preparing for a Hurricane

    E-Print Network [OSTI]

    HURRICANES Key Facts About Hurricane Readiness Preparing for a Hurricane If you are under a hurricane watch or warning, here are some basic steps to take to prepare for the storm: · Learn about your. · Identify potential home hazards and know how to secure or protect them before the hurricane strikes

  3. Notes on the CRTDH Group Key Agreement Protocol Spyros Magliveras and Wandi Wei

    E-Print Network [OSTI]

    Magliveras, Spyros

    , the distributed schemes help in the uniform distribution of the work-load for key management and eliminate: xkzou@cs.iupui.edu Abstract Group key management (GKM) is one of the primary is- sues for secure group Key Management (GKM), Contributory Group Key Agreement, Chinese Remainder Theorem, Diffie-Hellman Key

  4. Tools: Sobol indices and stochastic orders Illustrations and conclusion

    E-Print Network [OSTI]

    Maume-Deschamps, Véronique

    Context Tools: Sobol indices and stochastic orders Results Illustrations and conclusion GlobalRisk à Grenoble 24 juin 2014. 1 / 47 #12;Context Tools: Sobol indices and stochastic orders Results Illustrations and conclusion Plan 1 Context 2 Tools: Sobol indices and stochastic orders Sobol indices

  5. Simple rate-adaptive LDPC coding for quantum key distribution

    E-Print Network [OSTI]

    Mo Li; Chun-Mei Zhang; Zhen-Qiang Yin; Wei Chen; Chuan Wang; Zheng-Fu Han

    2015-05-24

    Although quantum key distribution (QKD) comes from the development of quantum theory, the implementation of a practical QKD system does involve a lot of classical process, such as key reconciliation and privacy amplification, which is called post-processing. Post-processing has been a crucial element to high speed QKD systems, even the bottleneck of it because of its relatively high time consumption. Low density parity check (LDPC) is now becoming a promising approach of overcoming the bottleneck due to its good performance in processing throughput. In this article we propose and simulate an easily implemented but efficiently rate-adaptive LDPC coding approach of reconciliation, different from the previously proposed puncturing- and shortening-based approach. We also give a measure for choosing the optimal LDPC parameter for our rate-adaptive approach according to error rates.

  6. Quantum Hacking on Quantum Key Distribution using Homodyne Detection

    E-Print Network [OSTI]

    Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2014-02-27

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  7. No-signaling Quantum Key Distribution: Solution by Linear Programming

    E-Print Network [OSTI]

    Won-Young Hwang; Joonwoo Bae; Nathan Killoran

    2013-01-15

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csisz\\'ar-K\\"orner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  8. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  9. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  10. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  11. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIALU.S. DepartmentJeanKey Meeting Takeaways from 2014 Meeting

  12. Key Activities in Energy Efficiency | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore: ENERGYKevinKey

  13. Key Concepts in Project Development and Financing in Alaska

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: Project

  14. Vehicle Technologies Office: Key Activities in Vehicles | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-ScaleTechnology|Energy Key

  15. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  16. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  17. Building waste management core indicators through Spatial Material Flow Analysis: Net recovery and transport intensity indexes

    SciTech Connect (OSTI)

    Font Vivanco, David; Puig Ventosa, Ignasi; Gabarrell Durany, Xavier

    2012-12-15

    Highlights: Black-Right-Pointing-Pointer Sustainability and proximity principles have a key role in waste management. Black-Right-Pointing-Pointer Core indicators are needed in order to quantify and evaluate them. Black-Right-Pointing-Pointer A systematic, step-by-step approach is developed in this study for their development. Black-Right-Pointing-Pointer Transport may play a significant role in terms of environmental and economic costs. Black-Right-Pointing-Pointer Policy action is required in order to advance in the consecution of these principles. - Abstract: In this paper, the material and spatial characterization of the flows within a municipal solid waste (MSW) management system are combined through a Network-Based Spatial Material Flow Analysis. Using this information, two core indicators are developed for the bio-waste fraction, the Net Recovery Index (NRI) and the Transport Intensity Index (TII), which are aimed at assessing progress towards policy-related sustainable MSW management strategies and objectives. The NRI approaches the capacity of a MSW management system for converting waste into resources through a systematic metabolic approach, whereas the TII addresses efficiency in terms of the transport requirements to manage a specific waste flow throughout the entire MSW management life cycle. Therefore, both indicators could be useful in assessing key MSW management policy strategies, such as the consecution of higher recycling levels (sustainability principle) or the minimization of transport by locating treatment facilities closer to generation sources (proximity principle). To apply this methodological approach, the bio-waste management system of the region of Catalonia (Spain) has been chosen as a case study. Results show the adequacy of both indicators for identifying those points within the system with higher capacity to compromise its environmental, economic and social performance and therefore establishing clear targets for policy prioritization. Moreover, this methodological approach permits scenario building, which could be useful in assessing the outcomes of hypothetical scenarios, thus proving its adequacy for strategic planning.

  18. Energy efficiency indicators for high electric-load buildings

    SciTech Connect (OSTI)

    Aebischer, Bernard; Balmer, Markus A.; Kinney, Satkartar; Le Strat, Pascale; Shibata, Yoshiaki; Varone, Frederic

    2003-06-01

    Energy per unit of floor area is not an adequate indicator for energy efficiency in high electric-load buildings. For two activities, restaurants and computer centres, alternative indicators for energy efficiency are discussed.

  19. Analysis of Spatial Performance of Meteorological Drought Indices 

    E-Print Network [OSTI]

    Patil, Sandeep 1986-

    2013-01-14

    Meteorological drought indices are commonly calculated from climatic stations that have long-term historical data and then converted to a regular grid using spatial interpolation methods. The gridded drought indices are mapped to aid decision making...

  20. Identification of performance indicators for nuclear power plants

    E-Print Network [OSTI]

    Sui, Yu, 1973-

    2001-01-01

    Performance indicators have been assuming an increasingly important role in the nuclear industry. An integrated methodology is proposed in this research for the identification and validation of performance indicators for ...

  1. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  2. Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

    E-Print Network [OSTI]

    Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

    2014-12-19

    An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

  3. CERNA WORKING PAPER SERIES Assessing Indicators of Patent Quality

    E-Print Network [OSTI]

    1 CERNA WORKING PAPER SERIES Assessing Indicators of Patent Quality: Complex vs. Discrete-00488275,version1-1Jun2010 #12;2 Assessing Indicators of Patent Quality: Complex vs. Discrete Technologies indicators of patent quality in complex and discrete technologies using factor analysis and econometric

  4. Which solar EUV indices are best for reconstructing the solar EUV irradiance ?

    E-Print Network [OSTI]

    T. Dudok de Wit; M. Kretzschmar; J. Aboudarham; P. -O. Amblard; F. Auchere; J. Lilensten

    2007-02-02

    The solar EUV irradiance is of key importance for space weather. Most of the time, however, surrogate quantities such as EUV indices have to be used by lack of continuous and spectrally resolved measurements of the irradiance. The ability of such proxies to reproduce the irradiance from different solar atmospheric layers is usually investigated by comparing patterns of temporal correlations. We consider instead a statistical approach. The TIMED/SEE experiment, which has been continuously operating since Feb. 2002, allows for the first time to compare in a statistical manner the EUV spectral irradiance to five EUV proxies: the sunspot number, the f10.7, Ca K, and Mg II indices, and the He I equivalent width. Using multivariate statistical methods such as multidimensional scaling, we represent in a single graph the measure of relatedness between these indices and various strong spectral lines. The ability of each index to reproduce the EUV irradiance is discussed; it is shown why so few lines can be effectively reconstructed from them. All indices exhibit comparable performance, apart from the sunspot number, which is the least appropriate. No single index can satisfactorily describe both the level of variability on time scales beyond 27 days, and relative changes of irradiance on shorter time scales.

  5. 2014 CATEE: Collaboration is the Key- Public/Private Partnerships 

    E-Print Network [OSTI]

    Lin, L.

    2014-01-01

    stream_source_info ESL-KT-14-11-24.pdf.txt stream_content_type text/plain stream_size 9508 Content-Encoding UTF-8 stream_name ESL-KT-14-11-24.pdf.txt Content-Type text/plain; charset=UTF-8 2014 CATEE Collaboration... is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston Energy Efficiency Programs 2000...

  6. Upconversion based receivers for quantum hacking resistant quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Gregory S. Kanter

    2015-09-21

    We propose a novel upconversion (sum frequency generation) based quantum-optical setup that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  7. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLC Jump

  8. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to the

  9. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theA

  10. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theAA

  11. Florida Keys El Coop Assn, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpAFlex Fuels Energy Jump to:Flora HomeKeys El Coop

  12. SimTable key tool for preparing, responding to wildfire

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effect Photovoltaics -7541 UnlimitedShift EndShutdownSolar PhotovoltaicSimTable key

  13. Sandia Energy - The Brain: Key To a Better Computer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities General overview of theBrain: Key To a

  14. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecoveryplanning Career Planning for theFebruary 26, 2014andKEY

  15. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclear Physics (NP)aboutRio de Janeiro,theIs Key

  16. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5

  17. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey Dates

  18. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey

  19. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenryInhibitingInteractivePGAS andUniversity IonIron is the Key to

  20. Key Publications - Natural Gas Regulation | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKey

  1. Robotics Key to Subsea Exploration | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The Energy Materials CenterRobotics Key to Subsea

  2. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  3. A look at the PGP ecosystem through the key server data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    to be challenging. GnuPG does not provide library access to low level functions that would allow parsing the data-based encryption systems use a network of key servers to share public keys. These key server operate on an add only basis, thus the data gives us access to PGP public keys from over 20 years of PGP usage. Analyzing

  4. Implementing Performance-Based Sustainability Requirements for the Low Carbon Fuel Standard – Key Design Elements and Policy Considerations

    E-Print Network [OSTI]

    Yeh, Sonia; Sumner, Daniel A.; Kaffka, Stephen R.; Ogden, J; Jenkins, Bryan M.

    2009-01-01

    Standard – Key Design Elements and Policy ConsiderationsStandard ? Key Design Elements and Policy Considerations:Standard ? Key Design Elements and Policy Considerations:

  5. A passive transmitter for quantum key distribution with coherent light

    E-Print Network [OSTI]

    Marcos Curty; Marc Jofre; Valerio Pruneri; Morgan W. Mitchell

    2011-08-03

    Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, since no externally driven element is required. Typical passive transmitters involve parametric down-conversion. More recently, it has been shown that phase-randomized coherent pulses also allow passive generation of decoy states and Bennett-Brassard 1984 (BB84) polarization signals, though the combination of both setups in a single passive source is cumbersome. In this paper, we present a complete passive transmitter that prepares decoy-state BB84 signals using coherent light. Our method employs sum-frequency generation together with linear optical components and classical photodetectors. In the asymptotic limit of an infinite long experiment, the resulting secret key rate (per pulse) is comparable to the one delivered by an active decoy-state BB84 setup with an infinite number of decoy settings.

  6. The role of naturally occurring waterholes in determining the distribution of Florida Key Deer 

    E-Print Network [OSTI]

    Kim, Ji Yeon

    2009-05-15

    (Big Pine Key Inn Station, 1953) Data on Big Pine Key and the Volume of Daily Fresh Water Shortage on Big Pine Key (From the Result of 1-Year Base Line Simulation)................................................................................ 26...). I used two precipitation data sets to parameterize dv1, one consisting of daily precipitation (inches) from January 1 to December 31, 1953 from the Big Pine Key Inn weather station and one from January 1 to December 31, 2001 from the Key West...

  7. Passive Tamper Indicating Enclosures Incorporating Embedded Optical Fibre

    SciTech Connect (OSTI)

    Wynn, Paul; White, Helen; Allen, Keir; Simmons, Kevin L.; Sliva, Paul; Benz, Jacob M.; Tanner, Jennifer E.

    2011-08-14

    AWE and PNNL are engaged in a technical collaboration investigating techniques to enhance continuity of knowledge over Accountable Items within a verified nuclear weapons dismantlement process. Tamper Indicating Enclosures (TIE) will likely be deployed as part of a chain of custody regime to indicate an unauthorised attempt to access an Accountable Item. This paper looks at the use of passive TIEs incorporating embedded optical fibre; concepts relating to deployment, tamper indication and unique identification will be discussed.

  8. Surface Indicators of Geothermal Activity at Salt Wells, Nevada...

    Open Energy Info (EERE)

    Surface Indicators of Geothermal Activity at Salt Wells, Nevada, USA, Including Warm Ground, Borate Deposits, and Siliceous Alteration Jump to: navigation, search OpenEI Reference...

  9. Eco-efficiency Indicators: Measuring Resource-use Efficiency...

    Open Energy Info (EERE)

    Eco-efficiency Indicators: Measuring Resource-use Efficiency and the Impact of Economic Activities on the Environment Jump to: navigation, search Tool Summary LAUNCH TOOL Name:...

  10. DSOPilot project Automatic receipt of short circuiting indicators...

    Open Energy Info (EERE)

    DSOPilot project Automatic receipt of short circuiting indicators (Smart Grid Project) Jump to: navigation, search Project Name DSOPilot project Automatic receipt of short...

  11. Energy Price Indices and Discount Factors for Life Cycle Cost...

    Office of Environmental Management (EM)

    Life Cycle Cost Analysis, 2013 Energy Price Indices and Discount Factors for Life Cycle Cost Analysis, 2013 Handbook describes the annual supplements to the NIST Handbook 135 and...

  12. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  13. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  14. Modern hydrocracking is the key to upgrading processes

    SciTech Connect (OSTI)

    Corbett, R.A.

    1989-06-26

    Hydrocracking technology is the key to Canada's heavy oil and bitumen upgrading facilities that have recently started or are due to start up during the next few years. The upgrader at Consumers' Cooperative Refineries Ltd. in Regina Sask.; the capacity addition program (CAP) at Syncrude Canada Ltd.'s Fort McMurray, Alta., plant; Husky Oil Operations Ltd.'s Bi-Provincial upgrader to be built near Lloydminster, Sask.; and the OSLO project to be built near Fort McMurray, all rely on this modern technology for primary upgrading. All of the projects are designed to upgrade heavy oil and bitumen extracted from oil sands to a high-quality synthetic crude oil (SCO) that is a blend of high-quality naphtha and gas oil.

  15. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  16. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  17. Passive decoy state quantum key distribution with practical light sources

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Bing Qi; Tobias Moroder

    2009-11-14

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. While active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty {\\it et al.}, Opt. Lett. {\\bf 34}, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy state setup with an infinite number of decoy settings. In this paper we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photo-detectors. In particular, we consider sources emitting thermal states, phase randomized WCP, and strong coherent light in combination with several types of photo-detectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photo-detectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret ket rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  18. Dynamic Limit Growth Indices in Discrete Time Tomasz R. Bielecki

    E-Print Network [OSTI]

    Heller, Barbara

    Dynamic Limit Growth Indices in Discrete Time Tomasz R. Bielecki 1 bielecki@iit.edu Igor Cialenco 1, Illinois Institute of Technology, Chicago, 60616 IL, USA 2 Institute of Mathematics, Jagiellonian propose a new class of mappings, called Dynamic Limit Growth Indices, that are designed to measure

  19. Indices to detect Hopf bifurcation in Induction motor drives

    E-Print Network [OSTI]

    Krishnendu Chakrabarty; Urmila Kar

    2014-10-24

    The loss of stability of induction motor controlled by Indirect Field Oriented Control (IFOC) is a matter of great concern of operators and design engineers. This paper reports indices to detect and predict stability problem such as system oscillations. Oscillations as a result of loss of stability, due to Hopf bifurcation, for different parameter values of IFOC motor are studied using the proposed indices.

  20. PolisGnosis Project: Representing and Analysing City Indicators

    E-Print Network [OSTI]

    Sun, Yu

    cities, assuming they adhere to the standard. The goal of this research is to develop theories, embodiedGnosis Analysis Engine Indicator Theme Knowledge Indicator Theme Knowledge Semantic Web #12;The blue boxes focus data formats into a standard representation that can be published on the Semantic Web. The green boxes

  1. Environmental indicators for sustainable production of algal biofuels

    SciTech Connect (OSTI)

    Efroymson, Rebecca Ann; Dale, Virginia H

    2014-01-01

    For analyzing sustainability of algal biofuels, we identify 16 environmental indicators that fall into six categories: soil quality, water quality and quantity, air quality, greenhouse gas emissions, biodiversity, and productivity. Indicators are selected to be practical, widely applicable, predictable in response, anticipatory of future changes, independent of scale, and responsive to management. Major differences between algae and terrestrial plant feedstocks, as well as their supply chains for biofuel, are highlighted, for they influence the choice of appropriate sustainability indicators. Algae strain selection characteristics do not generally affect which indicators are selected. The use of water instead of soil as the growth medium for algae determines the higher priority of water- over soil-related indicators. The proposed set of environmental indicators provides an initial checklist for measures of biofuel sustainability but may need to be modified for particular contexts depending on data availability, goals of the stakeholders, and financial constraints. Use of these indicators entails defining sustainability goals and targets in relation to stakeholder values in a particular context and can lead to improved management practices.

  2. Nuclear Energy Readiness Indicator Index (NERI): A benchmarking tool for assessing nuclear capacity in developing countries

    SciTech Connect (OSTI)

    Saum-Manning,L.

    2008-07-13

    Declining natural resources, rising oil prices, looming climate change and the introduction of nuclear energy partnerships, such as GNEP, have reinvigorated global interest in nuclear energy. The convergence of such issues has prompted countries to move ahead quickly to deal with the challenges that lie ahead. However, developing countries, in particular, often lack the domestic infrastructure and public support needed to implement a nuclear energy program in a safe, secure, and nonproliferation-conscious environment. How might countries become ready for nuclear energy? What is needed is a framework for assessing a country's readiness for nuclear energy. This paper suggests that a Nuclear Energy Readiness Indicator (NERI) Index might serve as a meaningful basis for assessing a country's status in terms of progress toward nuclear energy utilization under appropriate conditions. The NERI Index is a benchmarking tool that measures a country's level of 'readiness' for nonproliferation-conscious nuclear energy development. NERI first identifies 8 key indicators that have been recognized by the International Atomic Energy Agency as key nonproliferation and security milestones to achieve prior to establishing a nuclear energy program. It then measures a country's progress in each of these areas on a 1-5 point scale. In doing so NERI illuminates gaps or underdeveloped areas in a country's nuclear infrastructure with a view to enable stakeholders to prioritize the allocation of resources toward programs and policies supporting international nonproliferation goals through responsible nuclear energy development. On a preliminary basis, the indicators selected include: (1) demonstrated need; (2) expressed political support; (3) participation in nonproliferation and nuclear security treaties, international terrorism conventions, and export and border control arrangements; (4) national nuclear-related legal and regulatory mechanisms; (5) nuclear infrastructure; (6) the utilization of IAEA technical assistance; (7) participation in regional arrangements; and (8) public support for nuclear power. In this paper, the Index aggregates the indicators and evaluates and compares the level of readiness in seven countries that have recently expressed various degrees of interest in establishing a nuclear energy program. The NERI Index could be a valuable tool to be utilized by: (1) country officials who are considering nuclear power; (2) the international community, desiring reassurance of a country's capacity for the peaceful, safe, and secure use of nuclear energy; (3) foreign governments/NGO's, seeking to prioritize and direct resources toward developing countries; and (4) private stakeholders interested in nuclear infrastructure investment opportunities.

  3. Economic and energy indicators. Bi-weekly report

    SciTech Connect (OSTI)

    Not Available

    1989-01-01

    The Economic and Energy Indicator provides up-to-date information on changes since 1977 in economic and energy activities of major countries. It consists of tables only. They depict economic indicators (industrial production, unemployment, consumer price inflation, and exchange rate trends) for the Big Seven developed countries (United States, Japan, West Germany, France, United Kingdom, Italy, and Canada); foreign trade and foreign trade prices for the Big Seven; and monthly average prices for selected agricultural products and industrial materials. The energy indicators include tables on petroleum consumption, production, and imports for the Big Seven. A table and chart depict the movement of OPEC average crude oil sales prices since 1973.

  4. Economic and Energy Indicators. Bi-weekly report

    SciTech Connect (OSTI)

    Not Available

    1992-01-01

    The Economic and Energy Indicator provides up-to-date information on changes since 1977 in economic and energy activities of major countries. It consists of tables only. They depict economic indicators (industrial production, unemployment, consumer price inflation, and exchange rate trends) for the Big Seven developed countries (United States, Japan, West Germany, France, United Kingdom, Italy, and Canada); foreign trade and foreign trade prices for the Big Seven; and monthly average prices for selected agricultural products and industrial materials. The energy indicators include tables on petroleum consumption, production, and imports for the Big Seven. A table and chart depict the movement of OPEC average crude oil sales prices since 1973.

  5. Spectral indices in Eddington-inspired Born-Infeld inflation

    E-Print Network [OSTI]

    Inyong Cho; Jinn-Ouk Gong

    2015-06-23

    We investigate the scalar and the tensor spectral indices of the quadratic inflation model in Eddington-inspired Born-Infeld (EiBI) gravity. We find the EiBI corrections to the spectral indices are of second and first order in the slow-roll approximation for the scalar and the tensor perturbations respectively. This is very promising since the quadratic inflation model in general relativity provides a very nice fit for the spectral indices. Together with the suppression of the tensor-to-scalar ratio EiBI inflation is well along with the observational data.

  6. High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors

    E-Print Network [OSTI]

    Spellmeyer, Neal W.

    We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

  7. Blast furnace key to earth's birth P11 Balancing the body clock P14

    E-Print Network [OSTI]

    Liley, David

    Newage Blast furnace key to earth's birth P11 Balancing the body clock P14 Research readies to the stars Julian criBB 11 blast furnace holds key to earth's birth Julian criBB 12 agency audit raises

  8. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  9. The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks #

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks # Johann Großsch, Security. Keywords Wireless networking, security protocols, cryptography, key establishment, energy Inffeldgasse 16a, A--8010 Graz, Austria ABSTRACT Wireless sensor nodes generally face serious limitations

  10. A World Wide Web key to the grass genera of Texas 

    E-Print Network [OSTI]

    Dawson, John Edward

    2001-01-01

    An illustrated dichotomous key to the grass genera of Texas is presented in hypertext markup language (HTML) format. The key combines scanned images of inflorescences, digitized images of dissected spikelets, text descriptions ...

  11. ASTROPHYSICS Thesaurus of key words used in the annual subject indexes

    E-Print Network [OSTI]

    Xu, Ren-Xin

    ASTRONOMY AND ASTROPHYSICS Thesaurus of key words used in the annual subject indexes (valid from processing 03.20.2 Techniques: interferometric 03.20.3 Techniques: miscellaneous #12;2 Thesaurus of key words

  12. Large trees-key climate influencers-die first in drought

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Large trees-key climate influencers-die first in drought Large trees-key climate influencers-die first in drought A team of researchers studied forests worldwide, ranging from...

  13. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  14. Key issues of ultraviolet radiation of OH at high altitudes

    SciTech Connect (OSTI)

    Zhang, Yuhuai; Wan, Tian; Jiang, Jianzheng; Fan, Jing

    2014-12-09

    Ultraviolet (UV) emissions radiated by hydroxyl (OH) is one of the fundamental elements in the prediction of radiation signature of high-altitude and high-speed vehicle. In this work, the OH A{sup 2}?{sup +}?X{sup 2}? ultraviolet emission band behind the bow shock is computed under the experimental condition of the second bow-shock ultraviolet flight (BSUV-2). Four related key issues are discussed, namely, the source of hydrogen element in the high-altitude atmosphere, the formation mechanism of OH species, efficient computational algorithm of trace species in rarefied flows, and accurate calculation of OH emission spectra. Firstly, by analyzing the typical atmospheric model, the vertical distributions of the number densities of different species containing hydrogen element are given. According to the different dominating species containing hydrogen element, the atmosphere is divided into three zones, and the formation mechanism of OH species is analyzed in the different zones. The direct simulation Monte Carlo (DSMC) method and the Navier-Stokes equations are employed to compute the number densities of the different OH electronically and vibrationally excited states. Different to the previous work, the trace species separation (TSS) algorithm is applied twice in order to accurately calculate the densities of OH species and its excited states. Using a non-equilibrium radiation model, the OH ultraviolet emission spectra and intensity at different altitudes are computed, and good agreement is obtained with the flight measured data.

  15. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  16. Do myoepithelial cells hold the key for breast tumorprogression?

    SciTech Connect (OSTI)

    Polyak, Kornelia; Hu, Min

    2005-11-18

    Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

  17. Time-cost analysis of a quantum key distribution system clocked at 100 MHz

    E-Print Network [OSTI]

    Xiaofan Mo; Itzel Lucio Martinez; Philip Chan; Chris Healey; Steve Hosier; Wolfgang Tittel

    2011-05-18

    We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

  18. Assessment Of Potential Indicator Species For Monitoring Environmental Contamination

    E-Print Network [OSTI]

    #12;Assessment Of Potential Indicator Species For Monitoring Environmental Contamination contamination in the aquatic component of the Fraser River Basin, British Columbia. A list of criterion were species for laboratory study; and 5) knowledge availability pertaining to contaminant research

  19. Biological Cluster Validity Indices Based on the Gene Ontology

    E-Print Network [OSTI]

    Zell, Andreas

    Biological Cluster Validity Indices Based on the Gene Ontology Nora Speer, Christian Spieth 3646, pp. 429­439, 2005. c Springer-Verlag Berlin Heidelberg 2005 #12;430 N. Speer, C. Spieth, and A

  20. Developing Process Safety Indicators for Organizational Factors in Petrochemical Industries 

    E-Print Network [OSTI]

    Alnashwan, Mohammed

    2015-07-09

    Most major process safety incidents are preventable and can be avoided as shown in several incident investigation reports. Moreover, these reports indicated that these incidents were certain to occur as shown from the related near-misses and safety...

  1. Discovery of Climate Indices using Clustering Michael Steinbach

    E-Print Network [OSTI]

    Kumar, Vipin

    predictive power for some land areas; and still other indices may represent potentially new Earth science temperature anomaly in a region off the coast of Peru, is a climate index that is associated with the El Nino

  2. Type Ia Supernova Spectral Line Ratios as LuminosityIndicators

    SciTech Connect (OSTI)

    Bongard, Sebastien; Baron, E.; Smadja, G.; Branch, David; Hauschildt, Peter H.

    2005-12-07

    Type Ia supernovae have played a crucial role in thediscovery of the dark energy, via the measurement of their light curvesand the determination of the peak brightness via fitting templates to theobserved lightcurve shape. Two spectroscopic indicators are also known tobe well correlated with peak luminosity. Since the spectroscopicluminosity indicators are obtained directly from observed spectra, theywill have different systematic errors than do measurements usingphotometry. Additionally, these spectroscopic indicators may be usefulfor studies of effects of evolution or age of the SNe~;Ia progenitorpopulation. We present several new variants of such spectroscopicindicators which are easy to automate and which minimize the effects ofnoise. We show that these spectroscopic indicators can be measured byproposed JDEM missions such as snap and JEDI.

  3. Descriptive Quality Indicators Rating Scale for Single-case Design 

    E-Print Network [OSTI]

    Boles, Margot

    2015-04-08

    This table presents a rating scale for descriptive quality indicators in single-case research. This table is adapted from CEC (2014), Horner et al. (2005), and Reichow (2008)

  4. Integrating Social & Economic Indicators for Sustainable Rangeland Management

    E-Print Network [OSTI]

    Wyoming, University of

    Unconventional Energy Resources on US Rangelands Urs P. Kreuter Dept. Ecosystem Science & Management Texas A. Framework for comparing ecosystem impacts of developing unconventional energy resources on western USIntegrating Social & Economic Indicators for Sustainable Rangeland Management Developing

  5. Indicators that matter : measuring transportation performance in Ahmedabad

    E-Print Network [OSTI]

    Osborne, James Clark, M.C.P. Massachusetts Institute of Technology

    2012-01-01

    In light of the growing challenges of planning for transportation in India, this thesis proposes that a set of indicators, sensitive to local conditions, developed, implemented and managed through a collaborative partnership ...

  6. Forecasting potential project risks through leading indicators to project outcome 

    E-Print Network [OSTI]

    Choi, Ji Won

    2007-09-17

    for the degree of MASTER OF SCIENCE May 2007 Major Subject: Civil Engineering FORECASTING POTENTIAL PROJECT RISKS THROUGH LEADING INDICATORS TO PROJECT OUTCOME A Thesis by JI WON CHOI... Guikema Head of Department, David Rosowsky May 2007 Major Subject: Civil Engineering iii ABSTRACT Forecasting Potential Project Risks through Leading Indicators to Project Outcome. (May 2007) Ji Won Choi, B.S., Han-Yang University...

  7. The Relative Lyapunov Indicators: Theory and Application to Dynamical Astronomy

    E-Print Network [OSTI]

    Sándor, Zsolt

    2015-01-01

    A recently introduced chaos detection method, the Relative Lyapunov Indicator (RLI) is investigated in the cases of symplectic mappings and continuous Hamiltonian systems. It is shown that the RLI is an efficient numerical tool in determining the true nature of individual orbits, and in separating ordered and chaotic regions of the phase space of dynamical systems. A comparison between the RLI and some other variational indicators are presented, as well as the recent applications of the RLI to various problems of dynamical astronomy.

  8. New chaos indicators for systems with extremely small Lyapunov exponents

    E-Print Network [OSTI]

    Ken-ichi Okubo; Ken Umeno

    2015-03-18

    We propose new chaos indicators for systems with extremely small positive Lyapunov exponents. These chaos indicators can firstly detect a sharp transition between the Arnold diffusion regime and the Chirikov diffusion regime of the Froeschl\\'e map and secondly detect chaoticity in systems with zero Lyapunov exponent such as the Boole transformation and the $S$-unimodal function to characterize sub-exponential diffusions.

  9. A Thesis for the Degree of Master An Efficient Tree-based Group Key

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master An Efficient Tree-based Group Key Agreement using Bilinear Map-based Group Key Agreement using Bilinear Map #12;An Efficient Tree-based Group Key Agreement using Bilinear in partial fulfillment of the require- ments for the degree of Master of Science in the School of Engineering

  10. A Thesis for the Degree of Master A New Group Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master A New Group Key Agreement Scheme based on Ternary Tree Sang-won Lee School of Engineering Information and Communications University 2003 #12;A New Group Key Agreement Scheme based on Ternary Tree #12;A New Group Key Agreement Scheme based on Ternary Tree Advisor

  11. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  12. Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2 , Jun Ao3 , and Jianhua Li1 1 School@263.net Abstract. Kallahalla et al. presented a RSA-based Forward Key Rotation mechanism in secure storage present a Forward Key Rotation storage scheme based on discrete logarithm and discuss its security

  13. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

    E-Print Network [OSTI]

    State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University Experimental for energy dissipation mechanism. State Key Laboratory of Disaster Reduction in Civil Engineering #12;· Scope on Horizontal connection. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

  14. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek1, , S presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers

  15. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek 1,# , S presents the first scalable, e#cient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2­KE/3­KE) protocols. We propose three di#erent compilers where

  16. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  17. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12;A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt1,buchmann}@cdc.informatik.tu-darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  18. TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen-way trapdoor function, and then propose a new multivariate public key cryptosystem called TOT, which can though C was broken, its high speed has been affirmed). Keywords: TOT; multivariate public key

  19. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12; A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt 1,buchmann}@cdc.informatik.tu­darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  20. A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the

    E-Print Network [OSTI]

    Zdun, Uwe

    A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise in (all) the new key technology areas, it was hard for the management to estimate which new technologies, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale

  1. A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner Hamburg in the ubiquitous and pervasive comput- ing setting is secure key exchange. The restrictions moti- vate-core in ¢¡¤£¦¥¨§ -CMOS technology are evaluated. 1. Introduction In ubiquitous and pervasive computing scenarios, key

  2. Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships Mohammad, ymu}@uow.edu.au Abstract. In this paper, we revisit security notions for dedicated-key hash functions notions for dedicated-key hash functions. The provision of this set of enhanced properties has been

  3. Key establishment à la Merkle in a quantum world

    E-Print Network [OSTI]

    Gilles Brassard; Peter Hoyer; Kassem Kalach; Marc Kaplan; Sophie Laplante; Louis Salvail

    2015-02-13

    In 1974, Ralph Merkle proposed the first unclassified scheme for secure communications over insecure channels. When legitimate communicating parties are willing to spend an amount of computational effort proportional to some parameter N, an eavesdropper cannot break into their communication without spending a time proportional to N^2, which is quadratically more than the legitimate effort. Two of us showed in 2008 that Merkle's schemes are completely insecure against a quantum adversary, but that their security can be partially restored if the legitimate parties are also allowed to use quantum computation: the eavesdropper needed to spend a time proportional to N^{3/2} to break our earlier quantum scheme. Furthermore, all previous classical schemes could be broken completely by the onslaught of a quantum eavesdropper and we conjectured that this is unavoidable. We give now two novel key establishment schemes in the spirit of Merkle's. The first one can be broken by a quantum adversary who makes an effort proportional to N^{5/3}, which is the optimal attack against this scheme. Our second scheme is purely classical, yet it cannot be broken by a quantum eavesdropper who is only willing to expend an effort proportional to that of the legitimate parties. We then introduce two families of more elaborate protocols. The first family consists in quantum protocols whose security is arbitrarily close to quadratic in the query complexity model. The second is a family of classical protocols whose security against a quantum adversary is arbitrarily close to N^{3/2} in the same model.

  4. Monthly Indices: A Procedure for Energy Use Display Creating Monthly Indices for Comparing the Energy Consumption of Buildings 

    E-Print Network [OSTI]

    Landman, D. S.; Haberl, J. S.

    1996-01-01

    This technical paper describes the construction of comparative monthly energy and weather indices for buildings and their usefulness in simple comparisons across sites. These graphs show monthly electric and natural gas average power levels (i.e., W...

  5. Economic and Energy Indicators. Bi-weekly report

    SciTech Connect (OSTI)

    Not Available

    1988-01-01

    The Economic and Energy Indicator provides up-to-date information on changes since 1977 in economic and energy activities of major countries. It consists of tables only. They depict (a) economic indicators (industrial production, unemployment, consumer price inflation, and exchange rate trends) for the Big Seven developed countries (United States, Japan, West Germany, France, United Kingdom, Italy, and Canada); (b) foreign trade and foreign trade prices for the Big Seven; and (c) monthly average prices for selected agricultural products and industrial materials. The energy indicators include tables on petroleum consumption, production, and imports for the Big Seven. A table and chart depict the movement of OPEC average crude oil sales prices since 1973.

  6. A Comprehensive System of U.S. Energy Intensity Indicators

    Broader source: Energy.gov [DOE]

    This report describes a comprehensive system of energy intensity indicators for the United States that has been developed for the Department of Energy's Office of Energy Efficiency and Renewable Energy (EERE) over the past decade. This system of indicators is hierarchical in nature, beginning with detailed indexes of energy intensity for various sectors of the economy, which are ultimately aggregated to an overall energy intensity index for the economy as a whole. The aggregation of energy intensity indexes to higher levels in the hierarchy is performed with a version of the Log Mean Divisia index (LMDI) method. Based upon the data and methods in the system of indicators, the economy-wide energy intensity index shows a decline of about 14% in 2011 relative to a 1985 base year.

  7. Economic and energy indicators. Bi-weekly report

    SciTech Connect (OSTI)

    Not Available

    1987-01-01

    The EEI provides up-to-date information on changes since 1977 in economic and energy activities of major countries. It consists of tables only. They depict (a) economic indicators (industrial production, unemployment, consumer price inflation, and exchange rate trends) for the Big Seven developed countries (United States, Japan, West Germany, France, United Kingdom, Italy, and Canada); (b) foreign trade and foreign trade prices for the Big Seven; and (c) monthly average prices for selected agricultural products and industrial materials. The energy indicators include tables on petroleum consumption, production, and imports for the Big Seven. A table and chart depict the movement of OPEC average crude oil sales prices since 1973.

  8. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  9. Kinetics of inactivation of indicator pathogens during thermophilic anaerobic digestion

    E-Print Network [OSTI]

    Kinetics of inactivation of indicator pathogens during thermophilic anaerobic digestion Sudeep C Thermophilic anaerobic digestion Pathogen inactivation Ascaris suum Helminth eggs Poliovirus Enteric viruses a b s t r a c t Thermophilic anaerobic sludge digestion is a promising process to divert waste

  10. Discovering indicators in decision making in relation to reconstruction

    E-Print Network [OSTI]

    Christensen, Henrik Bærbak

    "There are common indicators, in relation to the elements of the Architecture Busi- ness Cycle. The Architecture Business Cycle (ABC) [2] for these legacy systems is un- documented and in essence broken viable to reconstruct the architecture in order to let the system live on. This project will try to help

  11. The Community Loss Index: A New Social Indicator

    E-Print Network [OSTI]

    Qiu, Weigang

    and an aggregator of individ- ual experiences. Building on the relationship between loss and stress, the index at is growing due to mounting demand for accountability, outcome measures, evidence-based research, and indicators that reveal what works. In response, researchers like Jochen Albrecht and Laxmi Ramasubramanian ð

  12. Bird diversity indicates ecological value in urban home prices

    E-Print Network [OSTI]

    Wallace, Mark C.

    have been proven to benefit housing values with little need for nuanced ecological assessmentBird diversity indicates ecological value in urban home prices Michael C. Farmer & Mark C. Wallace are equally valuable. Also some ecologically valuable space appears on private residences, not only public

  13. Northwest Power and Conservation Council's High Level Implementation Indicators

    E-Print Network [OSTI]

    . The indicators will track progress in the general categories of land, water, passage, and screens (see attached, WE184 # of miles of habitat accessed 255.9 258.2 Water Water conservation and irrigation improvement stream reach improvement 0 0 Water transactions 164 Acquire Water Instream 1438 # of miles of primary

  14. Development of graphical indices for building energy data 

    E-Print Network [OSTI]

    Abbas, Mustafa

    1993-01-01

    . With the advancements in computing, the development of sophisticated graphing packages, and easy access to micro and mini computers, the concept of graphical indices is more timely than ever before. There are, however, a few drawbacks. Graphs can easily be made...

  15. Nitrogen Isotopes as Indicators of NOx Source Contributions to

    E-Print Network [OSTI]

    Elliott, Emily M.

    with NOx emissions from surrounding stationary sources and additionally that 15N is more strongly correlated with surrounding stationary source NOx emissions than pH, SO4 2-, or NO3 - concentrations. Although emission inventories indicate that vehicle emissions are the dominant NOx source in the eastern U

  16. Introduction The Air Indicator Report for Public Access and Community

    E-Print Network [OSTI]

    Collins, Gary S.

    Introduction The Air Indicator Report for Public Access and Community Tracking (AIRPACT) provides daily air quality forecasts for the Pacific Northwest. Numerical weather forecasts produced using to the Community Multi-scale Air Quality (CMAQ) model, which is a photochemical transport model. In AIRPACT, CMAQ

  17. ECOSYSTEM INDICATORS AND TRENDS USED BY FOCI NORTH PACIFIC REGION

    E-Print Network [OSTI]

    of atmospheric forcing and physical oceanographic response of the North Pacific Ocean and Bering Sea Pacific whick is taken as an indicator of a change in the PDO. Ocean temperatures throughout the North temperature variability. The PDO is a long- lived, El Niño-like pattern of North Pacific Ocean climate

  18. DEVELOPMENT OF A CERAMIC TAMPER INDICATING SEAL: SRNL CONTRIBUTIONS

    SciTech Connect (OSTI)

    Krementz, D.; Brinkman, K.; Martinez-Rodriguez, M.; Mendez-Torres, A.; Weeks, G.

    2013-06-03

    Savannah River National Laboratory (SRNL) and Sandia National Laboratories (SNL) are collaborating on development of a Ceramic Seal, also sometimes designated the Intrinsically Tamper Indicating Ceramic Seal (ITICS), which is a tamper indicating seal for international safeguards applications. The Ceramic Seal is designed to be a replacement for metal loop seals that are currently used by the IAEA and other safeguards organizations. The Ceramic Seal has numerous features that enhance the security of the seal, including a frangible ceramic body, protective and tamper indicating coatings, an intrinsic unique identifier using Laser Surface Authentication, electronics incorporated into the seal that provide cryptographic seal authentication, and user-friendly seal wire capture. A second generation prototype of the seal is currently under development whose seal body is of Low Temperature Co-fired Ceramic (LTCC) construction. SRNL has developed the mechanical design of the seal in an iterative process incorporating comments from the SNL vulnerability review team. SRNL is developing fluorescent tamper indicating coatings, with recent development focusing on optimizing the durability of the coatings and working with a vendor to develop a method to apply coatings on a 3-D surface. SRNL performed a study on the effects of radiation on the electronics of the seal and possible radiation shielding techniques to minimize the effects. SRNL is also investigating implementation of Laser Surface Authentication (LSA) as a means of unique identification of each seal and the effects of the surface coatings on the LSA signature.

  19. Energy Flow: A Multimodal `Ready' Indication For Electric Vehicles

    E-Print Network [OSTI]

    ]. The limited range of EVs implicates a new importance of information about stored energy, estimated rangeEnergy Flow: A Multimodal `Ready' Indication For Electric Vehicles Abstract The lack of sound compared to a conventional car with a combustion engine. Most EVs provide a visual feedback about

  20. DATA NORMALIZATION : A KEY FOR STRUCTURAL HEALTH MONITORING

    SciTech Connect (OSTI)

    Farrar, C. R. (Charles R.); Sohn, H. (Hoon); Worden, K.

    2001-01-01

    Structural health monitoring (SHM) is the implementation of a damage detection strategy for aerospace, civil and mechanical engineering infrastructure. Typical damage experienced by this infrastructure might be the development of fatigue cracks, degradation of structural connections, or bearing wear in rotating machinery. For SHM strategies that rely on vibration response measurements, the ability to normalize the measured data with respect to varying operational and environmental conditions is essential if one is to avoid false-positive indications of damage. Examples of common normalization procedure include normalizing the response measurements by the measured inputs as is commonly done when extracting modal parameters. When environmental cycles influence the measured data, a temporal normalization scheme may be employed. This paper will summarize various strategies for performing this data normalization task. These strategies fall into two general classes: (1) Those employed when measures of the varying environmental and operational parameters are available; (2) Those employed when such measures are not available. Whenever data normalization is performed, one runs the risk that the damage sensitive features to be extracted from the data will be obscured by the data normalization procedure. This paper will summarize several normalization procedures that have been employed by the authors and issues that have arose when trying to implement them on experimental and numerical data.

  1. Issues in using landscape indicators to assess land changes

    SciTech Connect (OSTI)

    Kline, Keith L [ORNL; Dale, Virginia H [ORNL

    2012-01-01

    Landscape indicators, when combined with information about environmental conditions (such as habitat potential, biodiversity, carbon and nutrient cycling, and erosion) and socioeconomic forces, can provide insights about changing ecosystem services. They also provide information about opportunities for improving natural resources management. Landscape indicators rely on data regarding land cover, land management and land functionality. Challenges in using landscape indicators to assess change and effects include (1) measures of land management and attributes that are reliable, robust and consistent for all areas on the Earth do not exist, and thus land cover is more frequently utilized; (2) multiple types of land cover and management are often found within a single landscape and are constantly changing, which complicates measurement and interpretation; and (3) while causal analysis is essential for understanding and interpreting changes in indicator values, the interactions among multiple causes and effects over time make accurate attribution among many drivers of change particularly difficult. Because of the complexity, sheer number of variables, and limitations of empirical data on land changes, models are often used to illustrate and estimate values for landscape indicators, and those models have several problems. Recommendations to improve our ability to assess the effects of changes in land management include refinement of questions to be more consistent with available information and the development of data sets based on systematic measurement over time of spatially explicit land qualities such as carbon and nutrient stocks, water and soil quality, net primary productivity, habitat and biodiversity. Well-defined and consistent land-classification systems that are capable of tracking changes in these and other qualities that matter to society need to be developed and deployed. Because landscapes are so dynamic, it is crucial to develop ways for the scientific community to work together to collect data and develop tools that will enable better analysis of causes and effects and to develop robust management recommendations that will increases land s capacity to meet societal needs in a changing world.

  2. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  3. CD133: a Potential Indicator for Differentiation and Prognosis of Human Cholangiocarcinoma

    E-Print Network [OSTI]

    Fan, Linni; He, Furong; Liu, Hongxiang; Zhu, Jin; Liu, Yixiong; Yin, Zhiyong; Wang, Lu; Guo, Ying; Wang, Zhe; Yan, Qingguo; Huang, Gaosheng

    2011-07-29

    Key Laboratory of Caner Biology), the Fourth Military Medical University. Author details 1State Key Laboratory of Cancer Biology and Department of Pathology, Xijing Hospital, Fourth Military Medical University, Xi’an 710032, China. 2Department...

  4. Panchromatic star formation rate indicators and their uncertainties

    E-Print Network [OSTI]

    da Cunha, Elisabete

    2015-01-01

    The star formation rate (SFR) is a fundamental property of galaxies and it is crucial to understand the build-up of their stellar content, their chemical evolution, and energetic feedback. The SFR of galaxies is typically obtained by observing the emission by young stellar populations directly in the ultraviolet, the optical nebular line emission from gas ionized by newly-formed massive stars, the reprocessed emission by dust in the infrared range, or by combining observations at different wavelengths and fitting the full spectral energy distributions of galaxies. In this brief review we describe the assumptions, advantages and limitations of different SFR indicators, and we discuss the most promising SFR indicators for high-redshift studies.

  5. Leachability of salmonella and fecal pollution indicator bacteria through soil 

    E-Print Network [OSTI]

    Fehrmann, Robert Clinton

    1977-01-01

    of Department (Member) / /. ' Member) August 1977 74M3- ABSTRACT Leachability of Salmonella and Fecal Pollution Indicator Bacteria through Soil. (August 1977) Robert Clinton Fehrmann, B. S. , Texas AM University Chairman of Advisory Committee: Dr... microorganisms to be leached through soil, columns :ere filled with different soils and inoculs. ted with suspensions of fecal bacteria. Dif er ences in bacterial movement within a particular sni I, and bacterial movement between different types of soils...

  6. Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using "Omics" Citation Details In-Document Search Title: Unveiling Microbial Carbon Cycling...

  7. Introduction Soil compaction is the key physical feature that can prevent sustainable woodland

    E-Print Network [OSTI]

    Introduction Soil compaction is the key physical feature that can prevent sustainable woodland risk of physical instability and windthrow due to underdeveloped root systems. This Best Practice

  8. Key Benefits in Using Ethanol-Diesel Blends | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Benefits in Using Ethanol-Diesel Blends Key Benefits in Using Ethanol-Diesel Blends Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER...

  9. Diagnostic indicators for integrated assessment models of climate policy

    SciTech Connect (OSTI)

    Kriegler, Elmar; Petermann, Nils; Krey, Volker; Schwanitz, Jana; Luderer, Gunnar; Ashina, Shuichi; Bosetti, Valentina; Eom, Jiyong; Kitous, Alban; Mejean, Aurelie; Paroussos, Leonidas; Sano, Fuminori; Turton, Hal; Wilson, Charlie; Van Vuuren, Detlef

    2015-01-01

    Integrated assessments of how climate policy interacts with energy-economic systems can be performed by a variety of models with different functional structures. This article proposes a diagnostic scheme that can be applied to a wide range of integrated assessment models to classify differences among models based on their carbon price responses. Model diagnostics can uncover patterns and provide insights into why, under a given scenario, certain types of models behave in observed ways. Such insights are informative since model behavior can have a significant impact on projections of climate change mitigation costs and other policy-relevant information. The authors propose diagnostic indicators to characterize model responses to carbon price signals and test these in a diagnostic study with 11 global models. Indicators describe the magnitude of emission abatement and the associated costs relative to a harmonized baseline, the relative changes in carbon intensity and energy intensity and the extent of transformation in the energy system. This study shows a correlation among indicators suggesting that models can be classified into groups based on common patterns of behavior in response to carbon pricing. Such a classification can help to more easily explain variations among policy-relevant model results.

  10. Mapping swamp timothy (Cripsis schenoides) seed productivity using spectral values and vegetation indices in managed wetlands

    SciTech Connect (OSTI)

    Rahilly, P.J.A.; Li, D.; Guo, Q.; Zhu, J.; Ortega, R.; Quinn, N.W.T.; Harmon, T.C.

    2010-01-15

    This work examines the potential to predict the seed productivity of a key wetland plant species using spectral reflectance values and spectral vegetation indices. Specifically, the seed productivity of swamp timothy (Cripsis schenoides) was investigated in two wetland ponds, managed for waterfowl habitat, in California's San Joaquin Valley. Spectral reflectance values were obtained and associated spectral vegetation indices (SVI) calculated from two sets of high resolution aerial images (May 11, 2006 and June 9, 2006) and were compared to the collected vegetation data. Vegetation data were collected and analyzed from 156 plots for total aboveground biomass, total aboveground swamp timothy biomass, and total swamp timothy seed biomass. The SVI investigated included the Simple Ratio (SR), Normalized Difference Vegetation Index (NDVI), Soil Adjusted Vegetation Index (SAVI), Transformed Soil Adjusted Vegetation Index (TSAVI), Modified Soil Adjusted Vegetation Index (MSAVI), and Global Environment Monitoring Index (GEMI). We evaluated the correlation of the various SVI with in situ vegetation measurements for linear, quadratic, exponential and power functions. In all cases, the June image provided better predictive capacity relative to May, a result that underscores the importance of timing imagery to coincide with more favorable vegetation maturity. The north pond with the June image using SR and the exponential function (R{sup 2}=0.603) proved to be the best predictor of swamp timothy seed productivity. The June image for the south pond was less predictive, with TSAVI and the exponential function providing the best correlation (R{sup 2}=0.448). This result was attributed to insufficient vegetal cover in the south pond (or a higher percentage of bare soil) due to poor drainage conditions which resulted in a delay in swamp timothy germination. The results of this work suggest that spectral reflectance can be used to estimate seed productivity in managed seasonal wetlands.

  11. Optical-based smart structures for tamper-indicating applications

    SciTech Connect (OSTI)

    Sliva, P.; Anheier, N.C.; Simmons, K.L.; Undem, H.A.

    1996-11-01

    This report is a compilation of several related projects performed from 1991 through 1996 concerning the design, construction, and application of optical-based smart structure to tamper-indicating and sensing secure containers. Due to several influences, the projects were carried through to varying degrees of completion. Cancellation of the overall project at the client level motivated the authors to gather all of the technology and ideas about smart structures developed during these several projects, whether completed or just conceptualized, into one document. Although each section individually discusses a specific project, the overall document is written chronologically with each successive section showing how increased smart structure complexity was integrated into the container.

  12. Measured Energy Use Indices for 27 Office Buildings 

    E-Print Network [OSTI]

    Haberl, J. S.; Sreshthaputra, A.; Claridge, D. E.; Turner, W. D.; Harmon, K.; Kisselburgh, J.; Mase, R.

    2001-01-01

    .2. Heating energy is pro-rated from the total heating energy use at the S.F. Austin plant that serves this site.Whole Building EUI WBE Table 3: Energy Use Indices (EUIs) for 27 Office Buildings (kWh/ft2-yr, W/ft2) Weekdays Profile: Site 904 0.000.200.400.600....801.001.20123456789101112131415161718192021222324Hour WB Mean 10th Percentile 25th Percentile 50th Percentile 75th Percentile 90th Percentile Maximum Minimum Weekdays Profile: Site 704 0.000.200.400.600.801.001.20123456789101112131415161718192021222324Hour WB Mean 10th Percentile 25th Percentile 50th...

  13. Deformation of shale: mechanical properties and indicators of mechanisms 

    E-Print Network [OSTI]

    Ibanez, William Dayan

    1993-01-01

    . 2 mm in width) is present in all of the fractures. Samples shortened parallel to bedding exhibit macroscopic kink bands with external rotations that reflect slip on basal planes of clays that define bedding. Fractures in these samples are apparent... as well, commonly forming at one or both kink band boundaries. Kink bands appear to decrease in width with increasing P, from 1. 5 mm (at P, = 60 MPa) (o . 8 mm lat P, = 200 MPa). Optical extinction of oriented clays indicate crystallographic rotations...

  14. Tamper-indicating device having a glass body

    DOE Patents [OSTI]

    Johnston, Roger G. (Los Alamos, NM); Garcia, Anthony R. E. (Espanola, NM)

    2003-04-29

    A tamper-indicating device is described. The device has a first glass body member and a second glass body member that are attached to each other through a hasp. The glass body members of the device can be tempered. The body members can be configured with hollow volumes into which powders, microparticles, liquids, gels, or combinations thereof are sealed. The choice, the amount, and the location of these materials can produce a visible, band pattern to provide each body member with a unique fingerprint identifier, which makes it extremely difficult to repair or replace once it is damaged in order to avoid tamper detection.

  15. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  16. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Na¨im Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  17. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  18. Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    (and tamper-resistance), limited computing power and memory space, inability to perform public challenges for communication security: no public-key cryptography can be used, only symmetric algorithms is that there is no communication overhead due to evolution of keys ­ this is important, since energy consumption for communication

  19. Band structures Optical absorption Summary Key concepts in Density Functional Theory (II)

    E-Print Network [OSTI]

    Botti, Silvana

    Band structures Optical absorption Summary Key concepts in Density Functional Theory (II) Kohn-Sham scheme, band structure and optical spectra Silvana Botti European Theoretical Spectroscopy Facility (ETSF, Belfast Key concepts in Density Functional Theory (II) Silvana Botti #12;Band structures Optical

  20. MOLECULAR PHYSICS, 2002, VOL. 100, NO. 11, 16591675 Key properties of monohalogen substituted phenols: interpretation

    E-Print Network [OSTI]

    Nguyen, Minh Tho

    MOLECULAR PHYSICS, 2002, VOL. 100, NO. 11, 1659±1675 Key properties of monohalogen substituted August 2001; accepted 31 December 2001) This paper is an attempt to bridge the key properties by Runge from coal tar [1] in 1834 and named pheÂnol by Gerhardt in 1843 [2] (see also Laurent [3

  1. FFT-Based Key Recovery for the Integral Attack Yosuke Todo

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FFT-Based Key Recovery for the Integral Attack Yosuke Todo NTT Secure Platform Laboratories Abstract. The integral attack is one of the most powerful attack against block ciphers. In this paper, we propose two new techniques for the integral attack, the FFT technique and the key concealment technique

  2. Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol

    E-Print Network [OSTI]

    Sonny Lumbantoruan; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2010-03-11

    In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this paper, we show that by assigning different transmission probability to each transmitted qubit within a single polarization basis, we can generally improve the key generation rate of the BB84 protocol and achieve a higher key rate.

  3. Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives

    E-Print Network [OSTI]

    is a multilateral effort to develop the next generation of economical and safe nuclear reactors, and the ITERBetter Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas

  4. Generating RSA Keys on a Handheld Using an Untrusted Server Nagendra Modadugu Dan Boneh Michael Kim

    E-Print Network [OSTI]

    Boneh, Dan

    Æciently generate RSA keys on a low power handheld device with the help of an untrusted server. Most of the key power handheld device is somewhat problematic. For example, generating a 1024 bit RSA signature life time is a concern. Consider a user who is given a new cellphone application while traveling

  5. Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing- able, server-passive and user-anonymous timed release public-key encryption scheme which allows precise in our scheme is completely passive -- no interaction between it and the sender or receiver is needed

  6. Secure Key Management in the Cloud Ivan Damgrd1, Thomas P. Jakobsen1,,

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Secure Key Management in the Cloud Ivan Damgård1, Thomas P. Jakobsen1,, Jesper Buus Nielsen1 of assistance from outside the cloud when doing the transition. We study the levels of security one can on their practical performance. Keywords: Information security, cloud computing, cloud cryptography, secure key man

  7. Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Schage Jorg Schwenk

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Sch¨age J efficient attacks on the na¨ive combination of these protocols. In this paper, we propose new compilers challenge(s) exchanged during authentication. Keywords: authenticated key agreement, protocol compiler, TLS

  8. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  9. Key Frame Selection Algorithms for Automatic Generation of Panoramic Images from

    E-Print Network [OSTI]

    Shahabi, Cyrus

    acquire and fuse various sensor data (e.g., geospatial metadata) together with video to create sensor, and possibly even on-demand. Our experimental results demonstrate that by using geospatial metadata qual- ity. Key words:Geo-tagged videos, crowdsourcing, key frame selection, geospa- tial metadata

  10. On the Communication Complexity of Secret Key Generation in the Multiterminal Source Model

    E-Print Network [OSTI]

    Kashyap, Navin

    On the Communication Complexity of Secret Key Generation in the Multiterminal Source Model Manuj Mukherjee Navin Kashyap Abstract--Communication complexity refers to the minimum rate of public communication required for generating a maximal- rate secret key (SK) in the multiterminal source model of Csisz

  11. Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks

    E-Print Network [OSTI]

    Heys, Howard

    Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks Xueying-- In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless energy efficiency with a level of security suitable for wireless sensor networks. Keywords - wireless

  12. On The IndistinguishabilityBased Security Model of Key Agreement Protocols-Simple Cases 1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On The Indistinguishability­Based Security Model of Key Agreement Protocols-Simple Cases 1 Zhaohui University White Hart Lane, London N17 8HR, United Kingdom {m.z.cheng of authenticated key agreement protocols in simple cases have been evolving for more than ten years. In this paper

  13. On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases1 Zhaohui University White Hart Lane, London N17 8HR, United Kingdom {m.z.cheng of authenticated key agreement protocols in simple cases have been evolving for more than ten years. In this paper

  14. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two

  15. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two

  16. Evaluation of the effects of a highway improvement project on Key deer 

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30

    Deer-vehicle collisions (DVCs) along a 5.6-km segment of United States Highway 1 (US 1) on Big Pine Key (BPK), Florida responsible for approximately 26% of endangered Florida Key deer (Odocoileus virginianus clavium) annual mortalities. The Florida...

  17. Ntru-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Ntr¯u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra Ehsan Malekian) as well as non-associative Octonions (a power-associative and alternative algebra of dimension eight over: Public Key Cryptography, Ntr¯u, Alternative algebra, lattice based cryptogra- phy, non

  18. Proxy Key Re-encapsulation Mechanism for Group Communications Chunbo Ma and Jun Ao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    - 1 - Proxy Key Re-encapsulation Mechanism for Group Communications Chunbo Ma and Jun Ao School. China machunbo@guet.edu.cn Abstract. Many practical applications use hybrid encryption mechanism to deal scheme is poor. The key encapsulation is a crucial part in hybrid encryption mechanism, which allows

  19. Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    and 192, 256-bit key AES for TOP SECRET information [19]. In the last ten years AES has been subject 197 [18]. In June 2003 the US government has approved the use of 128, 192, 256 bit key AES for SECRET block. We concatenate four such local collisions together and add another 6-round trail on top in order

  20. Reaction Attacks on Public Key Cryptosystems Based on the Word Problem

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Reaction Attacks on Public Key Cryptosystems Based on the Word Problem Mar#19;#16;a Isabel Gonz#19 for public key cryptosystems based on the hardness of the word problem for #12;nitely presented groups. In particular, the evidenced hardness of the classical problems for #12;nitely presented groups (the word

  1. A 100 MHz MEMS SiBAR Phase Modulator for Quadrature Phase Shift Keying

    E-Print Network [OSTI]

    Ayazi, Farrokh

    A 100 MHz MEMS SiBAR Phase Modulator for Quadrature Phase Shift Keying Logan Sorenson and Farrokh of a MEMS resonator to form the basic component of a switchless quadrature phase shift keying (QPSK) scheme. INTRODUCTION In recent years, microelectromechanical systems (MEMS)- based solutions have gained acceptance

  2. A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks$

    E-Print Network [OSTI]

    Merro, Massimo

    analysis of three well-known key management protocols for wireless sensor networks: µTESLA, LEAP+ and Li. Introduction Wireless sensors are small and cheap devices powered by low-energy batteries, equipped with radio protocol. Due to resource limitations, all key management protocols for WSNs, such as µTESLA [1], LiSP [2

  3. The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean

    E-Print Network [OSTI]

    The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean Phoebe J. Lam1 concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll a key source of bioavailable Fe to the HNLC North Pacific. Keywords: iron, continental margin, HNLC 1

  4. Matrix Codes and Multitone Frequency Shift Keying for Power Line Communications

    E-Print Network [OSTI]

    Chee, Yeow Meng

    Matrix Codes and Multitone Frequency Shift Keying for Power Line Communications Yeow Meng Chee, Han Technological University, Singapore Abstract--Single-tone frequency shift keying (FSK) modulation with permutation codes has been found to be useful in addressing the problem of narrowband noise disturbance

  5. Experimental Passive Round-Robin Differential Phase-Shift Quantum Key Distribution

    E-Print Network [OSTI]

    Jian-Yu Guan; Zhu Cao; Yang Liu; Guo-Liang Shen-Tu; Jason S. Pelc; M. M. Fejer; Cheng-Zhi Peng; Xiongfeng Ma; Qiang Zhang; Jian-Wei Pan

    2015-05-29

    In quantum key distribution (QKD), the bit error rate is used to estimate the information leakage and hence determines the amount of privacy amplification --- making the final key private by shortening the key. In general, there exists a threshold of the error rate for each scheme, above which no secure key can be generated. This threshold puts a restriction on the environment noises. For example, a widely used QKD protocol --- BB84 --- cannot tolerate error rates beyond 25%. A new protocol, round-robin differential phase shifted (RRDPS) QKD, essentially removes this restriction and can in principle tolerate more environment disturbance. Here, we propose and experimentally demonstrate a passive RRDPS QKD scheme. In particular, our 500 MHz passive RRDPS QKD system is able to generate a secure key over 50 km with a bit error rate as high as 29%. This scheme should find its applications in noisy environment conditions.

  6. Remote Key Establishment by Mode Mixing in Multimode Fibres and Optical Reciprocity

    E-Print Network [OSTI]

    Bromberg, Yaron; Popoff, Sebastien M; Cao, Hui

    2015-01-01

    Disorder and scattering in photonic systems have long been considered a nuisance that should be circumvented. Recently, disorder has been harnessed for a rapidly growing number of applications, including imaging, sensing and spectroscopy. The chaotic dynamics and extreme sensitivity to external perturbations make random media particularly well-suited for optical cryptography. However, using random media for distribution of secret keys between remote users still remains challenging, since it requires the users have access to the same scattering system. Here we utilize random mode mixing in multimode fibres to generate and distribute keys simultaneously. Fast fluctuations in the fibre mode mixing provide the source of randomness for the key generation, and optical reciprocity guarantees that the keys at the two ends of the fibre are identical. We experimentally demonstrate the scheme using classical light and off-the-shelf components, opening the door for cost effective key establishment at the physical-layer o...

  7. Chemical Signature Indicating A Lack of Massive Stars in Dwarf Galaxies

    E-Print Network [OSTI]

    Tsujimoto, T

    2011-01-01

    Growing evidence supports an unusual elemental feature appearing in nearby dwarf galaxies, especially dwarf spheroidals (dSphs), indicating a key process of galaxy evolution that is different from that of the Galaxy. In addition to the well-known deficiency of alpha-elements in dSphs, recent observations have clearly shown that s-process elements (Ba) are significantly enhanced relative to Fe, alpha-, and r-process elements. This enhancement occurs in some dSphs as well as in the Large Magellanic Cloud, but is unseen in the Galaxy. Here we report that this feature is evidence of the lack of very massive stars (> 25 solar mass) as predicted in the low star formation rate environment, and we conclude that the unique elemental feature of dwarf galaxies including a low-alpha/Fe ratio in some low-metallicity stars is, at least in some part, characterized by a different form of the initial mass function. We present a detailed model for the Fornax dSph galaxy and discuss its complex chemical enrichment history toget...

  8. CHEMICAL SIGNATURE INDICATING A LACK OF MASSIVE STARS IN DWARF GALAXIES

    SciTech Connect (OSTI)

    Tsujimoto, Takuji, E-mail: taku.tsujimoto@nao.ac.jp [National Astronomical Observatory of Japan, Mitaka-shi, Tokyo 181-8588 (Japan)

    2011-08-01

    Growing evidence supports an unusual elemental feature appearing in nearby dwarf galaxies, especially dwarf spheroidals (dSphs), indicating a key process of galaxy evolution that is different from that of the Galaxy. In addition to the well-known deficiency of {alpha}-elements in dSphs, recent observations have clearly shown that s-process elements (Ba) are significantly enhanced relative to Fe, {alpha}-, and r-process elements. This enhancement occurs in some dSphs as well as in the Large Magellanic Cloud, but is unseen in the Galaxy. Here we report that this feature is evidence of the lack of very massive stars ({approx}>25 M{sub sun}) as predicted in the low star formation rate environment. We conclude that the unique elemental feature of dwarf galaxies including a low {alpha}/Fe ratio in some low-metallicity stars is, at least in some part, characterized by a different form of the initial mass function. We present a detailed model for the Fornax dSph galaxy and discuss its complex chemical enrichment history together with the nucleosynthesis site of the light s-process element Y.

  9. Indicator system for a process plant control complex

    DOE Patents [OSTI]

    Scarola, Kenneth (Windsor, CT); Jamison, David S. (Windsor, CT); Manazir, Richard M. (North Canton, CT); Rescorl, Robert L. (Vernon, CT); Harmon, Daryl L. (Enfield, CT)

    1993-01-01

    An advanced control room complex for a nuclear power plant, including a discrete indicator and alarm system (72) which is nuclear qualified for rapid response to changes in plant parameters and a component control system (64) which together provide a discrete monitoring and control capability at a panel (14-22, 26, 28) in the control room (10). A separate data processing system (70), which need not be nuclear qualified, provides integrated and overview information to the control room and to each panel, through CRTs (84) and a large, overhead integrated process status overview board (24). The discrete indicator and alarm system (72) and the data processing system (70) receive inputs from common plant sensors and validate the sensor outputs to arrive at a representative value of the parameter for use by the operator during both normal and accident conditions, thereby avoiding the need for him to assimilate data from each sensor individually. The integrated process status board (24) is at the apex of an information hierarchy that extends through four levels and provides access at each panel to the full display hierarchy. The control room panels are preferably of a modular construction, permitting the definition of inputs and outputs, the man machine interface, and the plant specific algorithms, to proceed in parallel with the fabrication of the panels, the installation of the equipment and the generic testing thereof.

  10. Indicator system for advanced nuclear plant control complex

    DOE Patents [OSTI]

    Scarola, Kenneth (Windsor, CT); Jamison, David S. (Windsor, CT); Manazir, Richard M. (North Canton, CT); Rescorl, Robert L. (Vernon, CT); Harmon, Daryl L. (Enfield, CT)

    1993-01-01

    An advanced control room complex for a nuclear power plant, including a discrete indicator and alarm system (72) which is nuclear qualified for rapid response to changes in plant parameters and a component control system (64) which together provide a discrete monitoring and control capability at a panel (14-22, 26, 28) in the control room (10). A separate data processing system (70), which need not be nuclear qualified, provides integrated and overview information to the control room and to each panel, through CRTs (84) and a large, overhead integrated process status overview board (24). The discrete indicator and alarm system (72) and the data processing system (70) receive inputs from common plant sensors and validate the sensor outputs to arrive at a representative value of the parameter for use by the operator during both normal and accident conditions, thereby avoiding the need for him to assimilate data from each sensor individually. The integrated process status board (24) is at the apex of an information hierarchy that extends through four levels and provides access at each panel to the full display hierarchy. The control room panels are preferably of a modular construction, permitting the definition of inputs and outputs, the man machine interface, and the plant specific algorithms, to proceed in parallel with the fabrication of the panels, the installation of the equipment and the generic testing thereof.

  11. Sensitivity Analysis of Dynamic Stability Indicators in Power Systems

    SciTech Connect (OSTI)

    Nguyen, Tony B.; Pai, M. A.

    2006-01-01

    Real time stability evaluation and preventive scheduling in power systems offers many challenges in a stressed power system. Through fast simulation of contingencies in real time it is possible to extract suitable information from the data and develop reliable metrics or indices to evaluate proximity of the system to an unstable condition. In this chapter we review the recent applications of the trajectory sensitivity analysis (TSA) technique in developing such indicators. Trajectory sensitivities can be used to compute critical parameters such as clearing time of circuit breakers, tie line flow, etc. in a power system by developing suitable norms for ease of interpretation. Alternatively it can be used along with the notion of Principal Singular Surfaces (PSS) to detect mode of instability (MOI). The TSA technique has the advantage that model complexity is not a limitation and the sensitivities are computed numerically. Suitable metrics are developed from these sensitivities. In addition to computing critical parameters, the TSA technique can be extended to do preventive rescheduling. A brief discussion of other applications of TSA is included as well as future areas of research.

  12. Indicators of waste management efficiency related to different territorial conditions

    SciTech Connect (OSTI)

    Passarini, Fabrizio, E-mail: fabrizio.passarini@unibo.it [University of Bologna, Dept. Industrial Chemistry and Materials, viale Risorgimento 4, I-40136 Bologna (Italy); Vassura, Ivano, E-mail: ivano.vassura@unibo.it [University of Bologna, Dept. Industrial Chemistry and Materials, viale Risorgimento 4, I-40136 Bologna (Italy); Monti, Francesco, E-mail: fmonti84@gmail.com [University of Bologna, Dept. Industrial Chemistry and Materials, viale Risorgimento 4, I-40136 Bologna (Italy); Morselli, Luciano, E-mail: luciano.morselli@unibo.it [University of Bologna, Dept. Industrial Chemistry and Materials, viale Risorgimento 4, I-40136 Bologna (Italy); Villani, Barbara, E-mail: bvillani@arpa.emr.it [Regional Environmental Protection Agency (Emilia-Romagna Region), Largo Caduti del Lavoro 6, I-40122 Bologna (Italy)

    2011-04-15

    The amount of waste produced and the control of separate collection are crucial issues for the planning of a territorial Integrated Waste Management System, enabling the allocation of each sorted waste fraction to the proper treatment and recycling processes. The present study focuses on assessing indicators of different waste management systems in areas characterized by different territorial conditions. The investigated case study concerns the municipalities of Emilia Romagna (northern Italy), which present a rather uniform socioeconomic situation, but a variety of geographic, urban and waste management characteristics. A survey of waste generation and collection rates was carried out, and correlated with the different territorial conditions, classifying the municipalities according to altitude and population density. The best environmental performances, in terms of high separate collection rate, were found on average in rural areas in the plain, while the lowest waste generation was associated with rural hill towns.

  13. Probability distributions of some power system reliability indices 

    E-Print Network [OSTI]

    Dip, Minh

    1978-01-01

    of three renewal process Let {N.(t),t>0} denote the i t h renewal process. Thus i f N (t) i s the number of renewals ( f a i l u r e s ) in (0,t) in the pooled process, then: m N D(t) = E N.(t) . (13) " i=l 1 9 10 Khintchine and Gri g e l i o n i...PROBABILITY DISTRIBUTIONS OF SOME POWER SYSTEM RELIABILITY INDICES A Thesis by MINH DIP (DIEP) Submitted to the Graduate College of Texas A&M University in p a r t i a l f u l f i l l m e n t of the requirement f o r the degree of MASTER...

  14. Electrochemical cells with end-of-life indicator

    SciTech Connect (OSTI)

    Skarstad, P.M.; Hayes, T.G.

    1986-10-28

    This patent describes an electrochemical cell including an oxidizable active anode material; a non-consumable, electrically conducting, inert cathode current collector material, and electrolytic solution bridging the anode and cathode current collector. The solution includes a liquid, inorganic oxyhalide or thiohalide solvent and a solute for rendering the electrolytic solution conductive of anode metal ions. The improvement described here comprisses the addition to the cell of a quantity of an EOL component, as an initial dischargeable constituent thereof, having an electropotential lower than that of the solvent. The EOL component is selected from the group consisting of arsenic trichloride, arsenic trifluoride, arsenic tribromide, the vanadium halides, the transition metal sulfides and oxides, except for the actinide series, and technetium, and mixtures thereof whereby EOL indication in the form of a step discharge is provided during discharge of the cell.

  15. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  16. Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks

    SciTech Connect (OSTI)

    Patel, K. A.; Dynes, J. F.; Lucamarini, M.; Choi, I.; Sharpe, A. W.; Yuan, Z. L. Shields, A. J.; Penty, R. V.

    2014-02-03

    We demonstrate quantum key distribution (QKD) with bidirectional 10 Gb/s classical data channels in a single fiber using dense wavelength division multiplexing. Record secure key rates of 2.38 Mbps and fiber distances up to 70?km are achieved. Data channels are simultaneously monitored for error-free operation. The robustness of QKD is further demonstrated with a secure key rate of 445 kbps over 25?km, obtained in the presence of data lasers launching conventional 0 dBm power. We discuss the fundamental limit for the QKD performance in the multiplexing environment.

  17. INEEL Radiological Control Performance Indicator Report - Quarterly for CY-99

    SciTech Connect (OSTI)

    Hinckley, Frank Leroy

    2000-02-01

    This Performance Indicator Report is provided in accordance with Article 133 of the INEEL Radiological Control Manual. The INEEL collective occupational radiation deep dose is 63.034 person-rem year to date, compared to a goal of 83.1 person-rem. During the fourth quarter, all areas experienced deletions of work resulting from the Maintenance Stand Down. This reduction in work is a primary factor in the difference in the year end dose and the ALARA goal. The work will be completed during CY-99. Beginning in CY-98, a numeric Radiological Performance Index (RPI) is being used to compare radiological performance. The RPI takes into consideration frequency and severity of events such as skin contaminations, clothing contaminations, spills, exposures to radiation exceeding limits, and positive internal dose. The RPI measures the cost of these events in cents per hour of radiological work performed. To make the RPI meaningful, tables have been prepared to show the facility that contributes to the values used. The data are compared on a quarterly basis to the prior year to show measurable performance.

  18. Wireless remote liquid level detector and indicator for well testing

    DOE Patents [OSTI]

    Fasching, George E. (Morgantown, WV); Evans, Donald M. (Point Marion, PA); Ernest, John H. (Morgantown, WV)

    1985-01-01

    An acoustic system is provided for measuring the fluid level in oil, gas or water wells under pressure conditions that does not require an electrical link to the surface for level detection. A battery powered sound transmitter is integrated with a liquid sensor in the form of a conductivity probe, enclosed in a sealed housing which is lowered into a well by means of a wire line reel assembly. The sound transmitter generates an intense identifiable acoustic emission when the sensor contacts liquid in the well. The acoustic emissions propagate up the well which functions as a waveguide and are detected by an acoustic transducer. The output signal from the transducer is filtered to provide noise rejection outside of the acoustic signal spectrum. The filtered signal is used to indicate to an operator the liquid level in the well has been reached and the depth is read from a footage counter coupled with the wire line reel assembly at the instant the sound signal is received.

  19. A nonextensive view of the stellar braking indices

    E-Print Network [OSTI]

    de Freitas, D B; Soares, B B; Silva, J R P

    2015-01-01

    The present work is based on a description for the angular mometum loss rate due to magnetic braking for main-sequence stars on the relationship between stellar rotation and age. In general, this loss rate denoted by $\\mathrm dJ/\\mathrm dt$ depends on angular velocity $\\Omega$ in the form $\\mathrm dJ/\\mathrm dt\\propto\\Omega^{q}$, where $q$ is a parameter extracted from nonextensive statistical mechanics. Already, in context of stellar rotation, this parameter is greater than unity and it is directly related to the braking index. For $q$ equal to unity, the scenario of saturation of the magnetic field is recovered, otherwise $q$ indicates an unsaturated field. This new approach have been proposed and investigated by de Freitas \\& De Medeiros for unsaturated field stars. In present work, we propose a nonextensive approach for the stellar rotational evolution based on the Reiners \\& Mohanthy model. In this sense, we developed a nonextensive version of Reiners \\& Mohanthy torque and also compare this ...

  20. Lyapunov indices with two nearby trajectories in a curved spacetime

    E-Print Network [OSTI]

    Xin Wu; Tian-Yi Huang; Hong Zhang

    2010-06-28

    We compare three methods for computing invariant Lyapunov exponents (LEs) in general relativity. They involve the geodesic deviation vector technique (M1), the two-nearby-orbits method with projection operations and with coordinate time as an independent variable (M2), and the two-nearby-orbits method without projection operations and with proper time as an independent variable (M3). An analysis indicates that M1 and M3 do not need any projection operation. In general, the values of LEs from the three methods are almost the same. As an advantage, M3 is simpler to use than M2. In addition, we propose to construct the invariant fast Lyapunov indictor (FLI) with two-nearby-trajectories and give its algorithm in order to quickly distinguish chaos from order. Taking a static axisymmetric spacetime as a physical model, we apply the invariant FLIs to explore the global dynamics of phase space of the system where regions of chaos and order are clearlyidentified.

  1. Lyapunov indices with two nearby trajectories in a curved spacetime

    SciTech Connect (OSTI)

    Wu, X. [Department of Physics, Nanchang University, Nanchang 330047 (China); Department of Astronomy, Nanjing University, Nanjing 210093 (China); Huang, T.-Y.; Zhang, H. [Department of Astronomy, Nanjing University, Nanjing 210093 (China)

    2006-10-15

    We compare three methods for computing invariant Lyapunov exponents (LEs) in general relativity. These methods involve the geodesic deviation vector technique (M1), the two-nearby-orbits method with projection operations and with coordinate time as the independant variable (M2), and the two-nearby-orbits method without projection operations and with proper time as the independent variable (M3). An analysis indicates that M1 and M3 do not need any projection operation. In general, the values of LEs from the three methods are almost the same. However, M2 fails for some specific cases. As a result, M3 is the most preferable to calculate LEs in most cases. In addition, we propose to construct the invariant fast Lyapunov indictor (FLI) with two-nearby-trajectories and give its algorithm in order to quickly distinguish chaos from order. Taking a static axisymmetric spacetime as a physical model, we apply different algorithms of the FLI to explore the global dynamics of phase space of the system where regions of chaos and order are clearly identified.

  2. Nitinol Esophageal Stents: New Designs and Clinical Indications

    SciTech Connect (OSTI)

    Strecker, Ernst-Peter; Boos, Irene; Vetter, Sylvia; Strohm, Michael; Domschke, Sigurd [Department of Radiology and Nuclear Medicine, Diakonissen-Krankenhaus, Diakonissenstr. 28, D-76191 Karlsruhe (Germany)

    1996-11-15

    Purpose: To evaluate the clinical use of covered and noncovered, knitted nitinol stents in patients presenting new stent indications. Methods: Self-expandable, knitted nitinol stents were implanted in four patients for treatment of dysphagia. In two patients who had malignant strictures and had esophago-respiratory fistulae and in one patient with an esophagocutaneous fistula, polytetrafluoroethylene (PTFE)-covered stents were implanted. One patient received a noncovered stent, but a retrograde approach through a percutaneous endoscopic gastrostomy (PEG) fistula had to be chosen for recanalization of an esophageal occlusion. Two patients received stents for treatment of benign strictures. Results: Recanalization of the stricture and stent implantation were performed under fluoroscopic control without any procedure-related morbidity or mortality. Dysphagia improved in all patients and the esophageal fistulae could be sealed off by covered stents. During a maximum follow-up of 18 months, there was no stent migration or esophageal perforation. Complications observed were stent stenosis due to food impaction (1/4) and benign stent stenosis (2/2). Most complications could be treated by the interventional radiologist. Conclusion: Self-expandable, covered Nitinol stents provide an option for the treatment of dysphagia combined with esophageal fistulae. In combination with interventional radiology techniques, even complex strictures are accessible. For benign strictures, the value of stent treatment has not yet been proven.

  3. KEY PERSONNEL

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclearH-canyon |I 14/%2A en DOE/NNSAby

  4. Technology, Knowledge, Culture, and Management: the keys The shift from industrial societies to information societies

    E-Print Network [OSTI]

    Kopec, Danny

    Technology, Knowledge, Culture, and Management: the keys to success Abstract The shift from to success: technology, knowledge, culture and management. Organizations employ technology with the goal of improving efficiency and reducing operational costs. Hence technology structures within organizations must

  5. Cryptographic security of the quantum key distribution from the triangle inequality

    E-Print Network [OSTI]

    Pawel Kurzynski; Marcin Markiewicz; Dagomir Kaszlikowski

    2014-09-22

    We show that the Csiszar-Korner sufficient condition for secure cryptographic key generation with the help of quantum theory can be easily derived using the triangle inequality for an information-theoretic distance.

  6. Vit Plant receives and sets key air filtration equipment for Low Activity Waste Facility

    Broader source: Energy.gov [DOE]

    WTP lifted a nearly 100-ton carbon bed absorber into the Low-Activity Waste Facility. This key piece of air-filtration equipment will remove mercury and acidic gases before air is channeled through...

  7. SLIM first user of the day Turn the key on the laser

    E-Print Network [OSTI]

    Yavuz, Deniz

    1 SLIM first user of the day Turn the key on the laser controller from "STANDBY" to "ON". The laser controller, shown in the image below reads "Status: OK." Open the new laser control program on the computer

  8. Hacking on decoy-state quantum key distribution system with partial phase randomization

    E-Print Network [OSTI]

    Shi-Hai Sun; Mu-Sheng Jiang; Xiang-Chun Ma; Chun-Yan Li; Lin-Mei Liang

    2014-07-15

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum+weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  9. A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey

    E-Print Network [OSTI]

    Utrecht, Universiteit

    A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey of the Menderes Massif in western Turkey, and subsequently a map-view restoration of its Neogene unroofing history

  10. The United States Industrial Electric Motor Systems Market Opportunities Assessment: Key Results 

    E-Print Network [OSTI]

    Rosenberg, M.

    1999-01-01

    presents key findings from the Market Assessment in regard to patterns of motor energy use, saturation of energy efficiency measures such as efficient motors and adjustable speed drives, and motor system purchase and maintenance practices....

  11. Structures of Clamp-Loader Complexes Are Key to DNA Replication

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Structures of Clamp-Loader Complexes Are Key to DNA Replication Print DNA Replication: An Open-and-Shut Case Every time a cell divides, whether in humans or in other organisms, its...

  12. No-Switching Quantum Key Distribution using Broadband Modulated Coherent Light

    E-Print Network [OSTI]

    Andrew M. Lance; Thomas Symul; Vikram Sharma; Christian Weedbrook; Timothy C. Ralph; Ping Koy Lam

    2005-10-28

    We realize an end-to-end no-switching quantum key distribution protocol using continuous-wave coherent light. We encode weak broadband Gaussian modulations onto the amplitude and phase quadratures of light beams at the Shannon's information limit. Our no-switching protocol achieves high secret key rate via a post-selection protocol that utilizes both quadrature information simultaneously. We establish a secret key rate of 25 Mbits/s for a lossless channel and 1 kbit/s, per 17 MHz of detected bandwidth, for 90% channel loss. Since our scheme is truly broadband, it can potentially deliver orders of magnitude higher key rates by extending the encoding bandwidth with higher-end telecommunication technology.

  13. Reliable and efficient PUF-based key generation using pattern matching

    E-Print Network [OSTI]

    Paral, Zdenek (Sid)

    We describe a novel and efficient method to reliably provision and re-generate a finite and exact sequence of bits, for use with cryptographic applications, e.g., as a key, by employing one or more challengeable Physical ...

  14. Test Scanning Request Form Please complete one form for each test and key.

    E-Print Network [OSTI]

    Pantaleone, Jim

    Test Scanning Request Form Please complete one form for each test and key. This Section: Test Name: Contact Person: Email Regarding This Scan Date Received Time Initials Number of Tests Scored: / / : A.M. P

  15. An Overview of the State of the Art for Practical Quantum Key Distribution

    E-Print Network [OSTI]

    Daniel Moskovich

    2015-05-15

    This is an overview of the state of the art for practical quantum key distribution (QKD) as of March 2015. It is written by a non-expert for non-experts. Additions and corrections are welcome.

  16. New attacks on ISO key establishment protocols Anish Mathuria and G. Sriram

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    New attacks on ISO key establishment protocols Anish Mathuria and G. Sriram DA-IICT Near Indroda Circle Gandhinagar-382007 INDIA anish mathuria@daiict.ac.in, g.sriram.248@gmail.com July 29, 2008

  17. QUADRATURE CHAOS SHIFT KEYING Zbigniew Galias and Gian Mario Maggio y

    E-Print Network [OSTI]

    Galias, Zbigniew

    shift keying communication system. The block diagram of the QCSK modulation scheme is shown in Fig. 1. 3: Dept. of Electrical Engi­ neering, University of Mining and Metallurgy, al. Mickiewicza 30, 30

  18. GREET Bioenergy Life Cycle Analysis and Key Issues for Woody Feedstocks

    Broader source: Energy.gov [DOE]

    Breakout Session 2D—Building Market Confidence and Understanding II: Carbon Accounting and Woody Biofuels GREET Bioenergy Life Cycle Analysis and Key Issues for Woody Feedstocks Michael Wang, Senior Scientist, Energy Systems, Argonne National Laboratory

  19. Roles of key active-site residues in flavocytochrome P450 BM3

    E-Print Network [OSTI]

    Noble, Michael A.; Miles, Caroline S.; Chapman, Stephen K.; Lysek, Dominikus A.; MacKay, Angela C.; Reid, Graeme A.; Hanzlik, Robert P.; Munro, Andrew W.

    1999-01-01

    The effects of mutation of key active-site residues (Arg-47, Tyr-51, Phe-42 and Phe-87) in Bacillus megaterium flavocytochrome P450 BM3 were investigated. Kinetic studies on the oxidation of laurate and arachidonate showed ...

  20. Structuring institutional analysis for urban ecosystems: A key to sustainable urban forest management

    E-Print Network [OSTI]

    Evans, Tom

    Structuring institutional analysis for urban ecosystems: A key to sustainable urban forest in urban settings with a specific focus on sustainable urban forest management. We conclude that urban management . Urban forest policy. Institutional analysis . Ecosystem services . Public goods . Sustainability

  1. Error Elimination in the KLJN Secure Key Exchange and Vehicular Applications 

    E-Print Network [OSTI]

    Saez, Yessica Lisbeth

    2015-05-22

    The Kirchhoff-law-Johnson-noise (KLJN) system is a classical physical secure key exchange scheme based on the Kirchhoff’s circuit loop law and the fluctuation-dissipation theorem of statistical physics. This dissertation contains two main studies...

  2. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

  3. Properties and performance of the IEEE 802.11b complementary-code-key signal sets

    E-Print Network [OSTI]

    Royster, Thomas C., IV

    We describe similarities and differences between complementary-code-key (CCK) modulation and modulation that is derived from biorthogonal signals, and we present performance results and other information that may be useful ...

  4. Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures

    E-Print Network [OSTI]

    Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures Staff Summary of Ecotope Recommendation: Staff Response and Recommended Action: 4.1.3 Ductless Heat Pumps Staff Summary of Ecotope Recommendation

  5. Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action,

    E-Print Network [OSTI]

    Lubell, Mark

    Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action, environmentalism, collective interest model. Mark Lubell Department The literature on environmental activism has failed to produce a model of individual decision- making explicitly

  6. 1 INTRODUCTION The volumetric water content, V, is a key variable

    E-Print Network [OSTI]

    Zornberg, Jorge G.

    1 INTRODUCTION The volumetric water content, V, is a key variable in unsaturated soil mechanics of the dielectric permittivity of the soil, Ka, which is in turn related to the volumetric water content through

  7. Effects of Vegetation Structure and Elevation on Lower Keys Marsh Rabbit Density 

    E-Print Network [OSTI]

    Dedrickson, Angela

    2012-02-14

    LKMR density on lands managed by the United States Navy, Naval Air Station Key West and evaluate how vegetation structure and patch elevation effect LKMR population density. I conducted fecal pellet counts to determine LKMR density, collected...

  8. Continuous variable quantum key distribution using polarization encoding and post selection

    E-Print Network [OSTI]

    Stefan Lorenz; Natalia Korolkova; Gerd Leuchs

    2004-03-08

    We present an experimental demonstration of a quantum key distribution protocol using coherent polarization states. Post selection is used to ensure a low error rate and security against beam splitting attacks even in the presence of high losses. Signal encoding and readout in polarization bases avoids the difficult task of sending a local oscillator with the quantum channel. This makes our setup robust and easy to implement. A shared key was established for losses up to 64%.

  9. The Lower Keys marsh rabbit and silver rice rat: steps toward recovery 

    E-Print Network [OSTI]

    Perry, Neil Desmond

    2006-10-30

    -1 LOWER KEYS MARSH RABBIT AND THE SILVER RICE RAT: STEPS TOWARDS RECOVERY A Thesis by NEIL DESMOND PERRY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF SCIENCE August 2006 Major Subject: Wildlife and Fisheries Sciences LOWER KEYS MARSH RABBIT AND THE SILVER RICE RAT: STEPS TOWARDS RECOVERY A Thesis by NEIL DESMOND PERRY Submitted to the Office...

  10. IBMS BoneKEy | The 4th Joint Meeting of ECTS and IBMS 1 Citation: IBMS BoneKEy 13, Article number: 675 (2015) | doi:10.1038/bonekey.2015.42

    E-Print Network [OSTI]

    Cai, Long

    2015-01-01

    IBMS BoneKEy | The 4th Joint Meeting of ECTS and IBMS 1 Citation: IBMS BoneKEy 13, Article number declared no competing interests. ORAL POSTERS ­ PRE-CLINICAL The 4th Joint Meeting of ECTS and IBMS

  11. IBMS BoneKEy | The 4th Joint Meeting of ECTS and IBMS 1 Citation: IBMS BoneKEy 13, Article number: 685 (2015) | doi:10.1038/bonekey.2015.53

    E-Print Network [OSTI]

    Cai, Long

    2015-01-01

    IBMS BoneKEy | The 4th Joint Meeting of ECTS and IBMS 1 Citation: IBMS BoneKEy 13, Article number of ECTS and IBMS Rotterdam, The Netherlands 25­28 April 2015 POSTMENOPAUSAL OSTEOPOROSIS, DIAGNOSTIC TOOLS

  12. IBMS BoneKEy | The 4th Joint Meeting of ECTS and IBMS 1 Citation: IBMS BoneKEy 13, Article number: 679 (2015) | doi:10.1038/bonekey.2015.46

    E-Print Network [OSTI]

    Cai, Long

    2015-01-01

    IBMS BoneKEy | The 4th Joint Meeting of ECTS and IBMS 1 Citation: IBMS BoneKEy 13, Article number `Defining the Bone Metastasis Niche'. CABS ORAL COMMUNICATIONS The 4th Joint Meeting of ECTS and IBMS

  13. An Experiment with Depressurization Tests as Indicators of Radon Availability in Six New Jersey Houses

    E-Print Network [OSTI]

    Gadgil, A.J.

    2008-01-01

    as Indicators of Radon Availability in 6 New Jersey HousesAS INDICATORS OF RADON AVAILABILITY IN 6 NEW JERSEY HOUSESas Indicators of Radon Availability in 6 New Jersey Houses

  14. Access Control: Key Control Policy Page 1 of 5 Virginia Polytechnic Institute and State University No. 5620 Rev.: 3

    E-Print Network [OSTI]

    Zallen, Richard

    , maintenance of physical security devices, and other arrangements concerning security for leased properties logistics. 2. To establish control of the campus keying system including key duplication and distribution. 3

  15. Department of Bioengineering Stacey Tran Fong, 5121F Engr V, 310-794-5072 ENGINEERING V KEY / CARD REQUEST

    E-Print Network [OSTI]

    Levine, Alex J.

    Department of Bioengineering Stacey Tran Fong, 5121F Engr V, 310-794-5072 ENGINEERING V KEY / CARD of Bioengineering to charge my Bruin Bill account for the key deposits in the amount stated above. I understand

  16. 4Q CY2008 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    "Attached is the Facility Representative (FR) Program Performance Indicators Quarterly  Report covering the period from October to December   2008. Data for these indicators are  gathered by Field...

  17. 1Q CY2009 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    "Attached is the Facility Representative (FR) Program Performance Indicators Quarterly  Report covering the period from January to March 2009. Data for these indicators are gathered by Field...

  18. 3Q CY2007 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    Attached is the Facility Representative (FR) Program Performance Indicators Quarterly Report covering the period from July to September 2007. Data for these indicators are gathered by Field...

  19. 1Q CY2003 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    Attached is the Facility Representative Program Performance Indicators (PIs) Quarterly Report Covering the Period from January to March  2003. Data for these indicators are gathered by Field...

  20. 3Q C&2008 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    "Attached is the Facility Representative (FR) Program Performance Indicators Quarterly  Report covering the period from July to September   2008. Data for these indicators aregathered by Field...

  1. 2Q CY2009 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    "Attached is the Facility Representative (FR) Program Performance Indicators Quarterly  Report covering the period from April to June  2009. Data for these indicators are gathered by Field elements...

  2. 2Q CY2008 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    Attached is the Facility Representative (FR) Program Performance Indicators QuarterlyReport covering the period from April to June 2008. Data for these indicators aregathered by Field elements...

  3. 3Q CY2006 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    Attached is the Facility Representative (FR) Program Performance Indicators Quarterly Report covering the period from July to September 2006. Data for these indicators are gathered by Field...

  4. Sustainability Indicators for Discrete Manufacturing Processes Applied to Grinding Technology

    E-Print Network [OSTI]

    Linke, Barbara S.; Corman, Gero J.; Dornfeld, David A.; Tönissen, Stefan

    2013-01-01

    the data into three sustainability indicators for eachor into one total sustainability indicator. The weighting isAn overview of sustainability assessment methodologies,

  5. 4Q CY2006 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Office of Energy Efficiency and Renewable Energy (EERE)

    Attached is the Facility Representative (FR) Program Performance Indicators Quarterly Report covering the period from October to December 2006. Data for these indicators are gathered by Field...

  6. 1Q CY2010 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    "Attached is the Facility Representative (FR) Program Performance Indicators Quarterly  Report covering the period from January to March2010. Data for these indicators are gathered by Field...

  7. 1Q CY2006 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    Attached is the Facility Representative (FR) Program Performance Indicators Quarterly Report covering the period from January  to March 2006. Data for these indicators are gathered by Field...

  8. 2Q CY2007 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    Attached is the Facility Representative (FR) Program Performance Indicators Quarterly Report covering the period from April to June 2007. Data for these indicators are gathered by field elements...

  9. 4Q CY2005 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    Attached is the Facility Representative (FR) Program Performance Indicators Quarterly Report covering the period from October to December 2005. Data for these indicators are gathered by Field...

  10. 2Q CY2006 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    Attached is the Facility Representative (FR) Program Performance Indicators Quarterly Report covering the period from April to June 2006. Data for these indicators are gathered by Field elements...

  11. 3Q CY2009 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    Attached is the Facility Representative (FR) Program Performance Indicators Quarterly  Report covering the period from July to September 2009. Data for these indicators are gathered by Field...

  12. 3Q CY2000 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    The Facility Representative Program Indicators (Pis) Quarterly Report attached, covering the period from July to September 2000. Data for these indicators are gathered by the Field elements...

  13. 1Q CY2012 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    This memorandum summarizes the Facility Representative (FR) Program Performance Indicators Quarterly Report covering the period from January through March 2012. Data for these indicators were...

  14. 2Q CY2011 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    "This memorandum summarizes the Facility Representative (FR) Program Performance Indicators Quarterly Report covering the period April through June 20 1 1. Data for these indicators were gathered...

  15. 4Q CY2011 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    "This memorandum summarizes the Facility Representative (FR) Program Performance Indicators Quarterly Report covering the period from October through December 2011. Data for these indicators were...

  16. 1Q CY2011 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    This memorandum summarizes the Facility Representative (FR) Program Performance Indicators Quarterly Report covering the Period January through March 2011. Data for these indicators were gathered...

  17. 1Q CY2001 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    The Facility Representive Program Performance Indicators (PIs) Quarterly Report is attached covering the period from January to March 2001. Data for these indicators are gathered by the Field...

  18. 4Q CY2009 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    "Attached is the Facility Representative (FR) Program Performance Indicators Quarterly  Report covering the period from October to December 2009. Data for these indicators are gathered by Field...

  19. 3Q CY2011 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    This memorandum summarizes the Facility Representative (FR) Program Performance Indicators Quarterly Report covering the Period July  through September 2011. Data for these indicators were gathered...

  20. 2Q CY2012 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    "This memorandum summarizes the Facility Representative (FR) Program Performance Indicators Quarterly Report covering the period from April through June 2012. Data for these indicators were...

  1. 4Q CY2001 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    The Facility Representive Program Performance Indicators (PIs) Quarterly Report is attached covering the period from October to December  2001. Data for these indicators are gathered by the Field...

  2. 3Q CY2001 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Broader source: Energy.gov [DOE]

    The Facility Representive Program Performance Indicators (PIs) Quarterly Report is attached covering the period from July to September 2001. Data for these indicators are gathered by the Field...

  3. 4Q CY2007 (PDF), Facility Representative Program Performance Indicators Quarterly Report

    Office of Energy Efficiency and Renewable Energy (EERE)

    "Attached is the Facility Representative (FR) Program Performance Indicators QuarterlyReport covering the period from October to December 2007. Data for these indicators aregathered by Field...

  4. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Environmental Management (EM)

    0 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010 Report describes the 2010 edition of energy price indices and discount factors for performing...

  5. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-06-09

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  6. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-08-31

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  7. Practical Attacks on Decoy State Quantum Key Distribution Systems with Detector Efficiency Mismatch

    E-Print Network [OSTI]

    Fei Yangyang; Gao Ming; Wang Weilong; Li Chaobo; Ma Zhi

    2015-07-23

    To the active basis choice decoy state quantum key distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on faked states attack, with quantum nondemolition measurement ability to restress the threat of detector efficiency mismatch. Considering that perfect quantum nondemolition measurement ability dose not exist in real life, we also propose a practical attack strategy using photon number resolving detectors. Theoretical analysis and numerical simulation results show that, without changing the channel, our attack strategies are serious threats to decoy state quantum key distribution systems. The eavesdropper may get some information ab out the secret key without causing any alarms. Besides, the lower bound of detector efficiency mismatch to run our modified faked states attack successfully with perfect quantum nondemolition measurement ability is also given out, which provides the producers of quantum key distribution systems with a reference and can be treated as the approximate secure bound of detector efficiency mismatch in decoy state quantum key distribution systems.

  8. IEEE SIGNAL PROCESSING LETTERS, VOL. 11, NO. 2, FEBRUARY 2004 251 Transformed-Key Asymmetric Watermarking System

    E-Print Network [OSTI]

    Kim, Taejeong

    --Asymmetric key, digital watermarking, linear transformation, private and public detection. I. INTRODUCTIONIEEE SIGNAL PROCESSING LETTERS, VOL. 11, NO. 2, FEBRUARY 2004 251 Transformed-Key Asymmetric water- marking system. In the proposed system, a linear transformation A is applied to the primitive key

  9. Entanglement-based continuous-variable quantum key distribution with multimode states and detectors

    E-Print Network [OSTI]

    Vladyslav C. Usenko; Laszlo Ruppert; Radim Filip

    2014-12-18

    Secure quantum key distribution with multimode Gaussian entangled states and multimode homodyne detectors is proposed. In general the multimode character of both the sources of entanglement and the homodyne detectors can cause a security break even for a perfect channel when trusted parties are unaware of the detection structure. Taking into account the multimode structure and potential leakage of information from a homodyne detector reduces the loss of security to some extent. We suggest the symmetrization of the multimode sources of entanglement as an efficient method allowing us to fully recover the security irrespectively to multimode structure of the homodyne detectors. Further, we demonstrate that by increasing the number of the fluctuating but similar source modes the multimode protocol stabilizes the security of the quantum key distribution. The result opens the pathway towards quantum key distribution with multimode sources and detectors.

  10. Quantum Hacking on Continuous-Variable Quantum Key Distribution System using a Wavelength Attack

    E-Print Network [OSTI]

    Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2013-07-24

    The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be added before performing the monitoring detection.

  11. Methods and apparatuses for self-generating fault-tolerant keys in spread-spectrum systems

    DOE Patents [OSTI]

    Moradi, Hussein; Farhang, Behrouz; Subramanian, Vijayarangam

    2015-12-15

    Self-generating fault-tolerant keys for use in spread-spectrum systems are disclosed. At a communication device, beacon signals are received from another communication device and impulse responses are determined from the beacon signals. The impulse responses are circularly shifted to place a largest sample at a predefined position. The impulse responses are converted to a set of frequency responses in a frequency domain. The frequency responses are shuffled with a predetermined shuffle scheme to develop a set of shuffled frequency responses. A set of phase differences is determined as a difference between an angle of the frequency response and an angle of the shuffled frequency response at each element of the corresponding sets. Each phase difference is quantized to develop a set of secret-key quantized phases and a set of spreading codes is developed wherein each spreading code includes a corresponding phase of the set of secret-key quantized phases.

  12. Methods and apparatuses for self-generating fault-tolerant keys in spread-spectrum systems

    DOE Patents [OSTI]

    Moradi, Hussein; Farhang, Behrouz; Subramanian, Vijayarangam

    2015-12-22

    Self-generating fault-tolerant keys for use in spread-spectrum systems are disclosed. At a communication device, beacon signals are received from another communication device and impulse responses are determined from the beacon signals. The impulse responses are circularly shifted to place a largest sample at a predefined position. The impulse responses are converted to a set of frequency responses in a frequency domain. The frequency responses are shuffled with a predetermined shuffle scheme to develop a set of shuffled frequency responses. A set of phase differences is determined as a difference between an angle of the frequency response and an angle of the shuffled frequency response at each element of the corresponding sets. Each phase difference is quantized to develop a set of secret-key quantized phases and a set of spreading codes is developed wherein each spreading code includes a corresponding phase of the set of secret-key quantized phases.

  13. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  14. Coexistence of high-bit-rate quantum key distribution and data on optical fiber

    E-Print Network [OSTI]

    K. A. Patel; J. F. Dynes; I. Choi; A. W. Sharpe; A. R. Dixon; Z. L. Yuan; R. V. Penty; A. J. Shields

    2012-11-30

    Quantum key distribution (QKD) uniquely allows distribution of cryptographic keys with security verified by quantum mechanical limits. Both protocol execution and subsequent applications require the assistance of classical data communication channels. While using separate fibers is one option, it is economically more viable if data and quantum signals are simultaneously transmitted through a single fiber. However, noise-photon contamination arising from the intense data signal has severely restricted both the QKD distances and secure key rates. Here, we exploit a novel temporal-filtering effect for noise-photon rejection. This allows high-bit-rate QKD over fibers up to 90 km in length and populated with error-free bidirectional Gb/s data communications. With high-bit rate and range sufficient for important information infrastructures, such as smart cities and 10 Gbit Ethernet, QKD is a significant step closer towards wide-scale deployment in fiber networks.

  15. Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption

    E-Print Network [OSTI]

    Kam Wai Clifford Chan; Mayssaa El Rifai; Pramode K. Verma; Subhash Kak; Yuhua Chen

    2015-03-19

    This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the intercept-resend attack, the photon number splitting attack, and the man-in-the-middle attack. It is found that the mean photon number can be much larger than one. This complements the recent interest in multi-photon quantum communication protocols that require a pre-shared key between the legitimate users.

  16. Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems

    E-Print Network [OSTI]

    Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

    2011-04-01

    Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.

  17. Field test of the wavelength-saving quantum key distribution network

    E-Print Network [OSTI]

    Shuang Wang; Wei Chen; Zhen-Qiang Yin; Yang Zhang; Tao Zhang; Hong-Wei Li; Fang-Xing Xu; Zheng Zhou; Yang Yang; Da-Jun Huang; Li-Jun Zhang; Fang-Yi Li; Dong Liu; Yong-Gang Wang; Guang-Can Guo; Zheng-Fu Han

    2012-03-20

    We propose a wavelength-saving topology of quantum key distribution(QKD) network based on passive optical elements, and report the field test of this network on the commercial telecom optical fiber. In this network, 5 nodes are supported with 2 wavelengths, and every two nodes can share secure keys directly at the same time. All QKD links in the network operate at the frequency of 20 MHz. We also characterized the insertion loss and crosstalk effects on the point-to-point QKD system after introducing this QKD network.

  18. Passive decoy state quantum key distribution: Closing the gap to perfect sources

    E-Print Network [OSTI]

    Wolfgang Mauerer; Christine Silberhorn

    2006-10-17

    We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present-day, non-ideal photon-number detection. Arbitrary experimental imperfections which lead to bit errors are included. We select decoy states by classical post-processing. This allows to improve the effective signal statistics and achievable distance.

  19. Passive Optical Network Approach to GigaHertz-Clocked Multiuser Quantum Key Distribution

    E-Print Network [OSTI]

    Veronica Fernandez; Robert J. Collins; Karen J. Gordon; Paul D. Townsend; Gerald S. Buller

    2006-12-15

    We present the application of quantum key distribution technologies to fiber-based broadband passive optical access networks. This application is based on our 850 nm wavelength gigahertz clock-rate single-receiver system, is compatible with existing telecommunications fiber and exploits a wavelength band not currently utilized in access networks. The developed quantum key distribution networks are capable of transmitting over distances consistent with the span of access links for metropolitan networks (10 km), at clock frequencies ranging up to 3 GHz.

  20. Keys to Access: Argonne-INCREASE partnership opens doors to collaboration |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKeyKey