Sample records for noted key indicators

  1. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  2. Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management

    E-Print Network [OSTI]

    Foley, Simon

    Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management Simon N. Foley, Thomas B. Quillinan, John P. Morrison, David A. Power, James J. Kennedy. Department of Computer Science

  3. Research Note Extent of Stem Dieback in Trembling Aspen (Populus tremuloides) as an Indicator of

    E-Print Network [OSTI]

    Northern British Columbia, University of

    Research Note Extent of Stem Dieback in Trembling Aspen (Populus tremuloides) as an Indicator aspen (Populus tremuloides Michx.) could be used to determine the time of browsing during the growing season. Two hundred naturally growing aspen saplings of similar size and form were randomly selected

  4. Global MSW Generation in 2007 estimated at two billion tons Global Waste Management Market Assessment 2007, Key Note Publications Ltd ,

    E-Print Network [OSTI]

    Columbia University

    analyses the global waste market, with particular reference to municipal solid waste (MSW). Key NoteGlobal MSW Generation in 2007 estimated at two billion tons Global Waste Management Market between growth in wealth and increase in waste -- the more affluent a society becomes, the more waste

  5. Web Site: http://www.coop-program.engr.uga.edu/ms.html UGA Cooperative Engineering Program Development Key Points and Notes.docx

    E-Print Network [OSTI]

    Arnold, Jonathan

    Web Site: http://www.coop-program.engr.uga.edu/ms.html UGA Cooperative Engineering Program;Web Site: http://www.coop-program.engr.uga.edu/ms.html UGA Cooperative Engineering Program Development Development Key Points and Notes.docx Latest Update: October 3, 2012 Mission Statement: The UGA Engineering

  6. An important component of music is the rhythm, or duration of the sounds. We designate this with whole notes, half notes, quarter notes, eighth notes, etc., the names of which indicate

    E-Print Network [OSTI]

    Campbell, Russell Bruce

    of time has been based on the juxtaposition of slow and quick notes. This is true of Balkan music, where, but using 3:2 from an adjacent village. Some Balkan music with the SQ pattern identified can be heard most Balkan music i

  7. A Comprehensive System of Energy Intensity Indicators for the U.S.: Methods, Data and Key Trends

    SciTech Connect (OSTI)

    Belzer, David B.

    2014-08-31T23:59:59.000Z

    This report describes a comprehensive system of energy intensity indicators for the United States that has been developed for the Department of Energy’s Office of Energy Efficiency and Renewable Energy (EERE) over the past decade. This system of indicators is hierarchical in nature, beginning with detailed indexes of energy intensity for various sectors of the economy, which are ultimately aggregated to an overall energy intensity index for the economy as a whole. The aggregation of energy intensity indexes to higher levels in the hierarchy is performed with a version of the Log Mean Divisia Index (LMDI) method. Based upon the data and methods in the system of indicators, the economy-wide energy intensity index shows a decline of about 14% in 2010 relative to a 1985 base year. Discussion of energy intensity indicators for each of the broad end-use sectors of the economy—residential, commercial, industrial, and transportation—is presented in the report. An analysis of recent changes in the efficiency of electricity generation in the U.S. is also included. A detailed appendix describes the data sources and methodology behind the energy intensity indicators for each sector.

  8. A Comparison of Value-Added Accountability Systems with Accountability Systems that Use the Success of Economically Disadvantaged Students as a Key Accountability Indicator

    E-Print Network [OSTI]

    Barlow, Kevin Lynn

    2014-12-12T23:59:59.000Z

    level variables. ........................................................ 54 Updating student level variables. ................................................................................ 58 Estimating Campus Valued-Added Coefficients (Beta Values... campus or district does not achieve the accountability rating it desires, the reason is typically because of this indicator (e.g., the economically disadvantaged students in science did not perform well). The current accountability system in Texas...

  9. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  10. Key Performance Indicators of River Basin Organizations

    E-Print Network [OSTI]

    US Army Corps of Engineers

    frequently has faculty from universities spending time in residence at the Institute. Both IWR and the Corps benefit from such faculty engaging in ongoing water resources studies and research on a reimbursable basis such as analyzing the linkages between water resources development and water resources problems (e.g. drought

  11. Key performance indicators in humanitarian logistics

    E-Print Network [OSTI]

    Davidson, Anne Leslie

    2006-01-01T23:59:59.000Z

    Non-profit humanitarian relief organizations have typically been unable to measure the performance of their supply chains due to an inability to centrally capture data from operations. With the recent development and ...

  12. Federal Water Use Indices

    Broader source: Energy.gov [DOE]

    FEMP provides water use indices as a guide for Federal agencies. Note that each is a rough estimate of water usage at different types of sites. Your site may vary considerably.

  13. NOTE / NOTE Sex ratio variation in gynodioecious species of

    E-Print Network [OSTI]

    Dorken, Marcel

    NOTE / NOTE Sex ratio variation in gynodioecious species of Echium endemic to the Canary Islands Marcel E. Dorken Abstract: Species of Echium from the Canary Islands represent an adaptive radiation fertility of females and hermaphrodites were de- tected. Key words: Canary Islands, Echium, island radiation

  14. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  15. Texas Phosphorus Index TECHNICAL NOTES

    E-Print Network [OSTI]

    Mukhtar, Saqib

    for West Texas, see Figure 1. NRCS and Extension Service specialists in Texas developed the P indicesTexas Phosphorus Index TECHNICAL NOTES U.S. DEPARTMENT OF AGRICULTURE NATURAL RESOURCES CONSERVATION SERVICE TEXAS Revised December, 2012 AGRONOMY TECHNICAL NOTE NUMBER ­ 15 PHOSPHORUS ASSESSMENT

  16. Blue Note

    ScienceCinema (OSTI)

    Murray Gibson

    2010-01-08T23:59:59.000Z

    Argonne's Murray Gibson is a physicist whose life's work includes finding patterns among atoms. The love of distinguishing patterns also drives Gibson as a musician and Blues enthusiast."Blue" notes are very harmonic notes that are missing from the equal temperament scale.The techniques of piano blues and jazz represent the melding of African and Western music into something totally new and exciting.

  17. Blue Note

    SciTech Connect (OSTI)

    Murray Gibson

    2007-04-27T23:59:59.000Z

    Argonne's Murray Gibson is a physicist whose life's work includes finding patterns among atoms. The love of distinguishing patterns also drives Gibson as a musician and Blues enthusiast."Blue" notes are very harmonic notes that are missing from the equal temperament scale.The techniques of piano blues and jazz represent the melding of African and Western music into something totally new and exciting.

  18. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  19. OTS NOTE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling7 AugustAFRICAN .METALS~ c3 Alexander941 OTS NOTE

  20. Using Key Performance Indicators to Manage Energy Costs 

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    Modern management systems rely heavily on information technology to set goals, track performance and communicate results. Energy management approaches (such as those offered by the US Department of Energy and Natural Resources Canada...

  1. November 2012 Key Performance Indicator (KPI): Energy Consumption

    E-Print Network [OSTI]

    Evans, Paul

    and district heating scheme* data. Year Energy Consumption (KWh) Percentage Change 2005/06 65,916,243 N/A 2006 buildings are connected to the Nottingham District Heating Scheme. This service meets all the heating requirements by combusting municipal waste to produce hot water. The process significantly saves carbon

  2. November 2012 Key Performance Indicator (KPI): Carbon Management

    E-Print Network [OSTI]

    Evans, Paul

    District Heating Scheme. This service meets all the heating requirements by combusting municipal waste statistics, to convert energy consumption data. The totals are calculated using electricity, gas and district heating scheme* data. Year Emissions (Tonnes CO2) % change from 2005/06 2005/2006 17,400 N/A 2006/2007 15

  3. A note on quantum related-key attacks Martin Rotteler

    E-Print Network [OSTI]

    University Department of Mathematical Sciences Boca Raton, FL 33431 rsteinwa@fau.edu June 10, 2013 Abstract given by bit-flips (Winternitz and Hellman, 1987). An illustrative example for an application

  4. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  5. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  6. COMPUTER SECURITY revision list Subject Notes

    E-Print Network [OSTI]

    Chothia, Tom

    COMPUTER SECURITY revision list Subject Notes AES DES 3-DES CBC Diffie-Hellman Elgaml RSA KeyCrypt Electronic Signatures PGP Access Control Matrix Access Control Lists #12;COMPUTER SECURITY revision list for Linux Confused Deputy Problem MD5 SHA1 SHA2 / SHA256 / SHA512 SHA3 Collision attacks MAC Password

  7. Ocean Engineering 33 (2006) 22092223 Technical Note

    E-Print Network [OSTI]

    Mohseni, Kamran

    Ocean Engineering 33 (2006) 2209­2223 Technical Note Pulsatile vortex generators for low-speed maneuvering of small underwater vehicles Kamran Mohseni� Department of Aerospace Engineering Sciences, science writer). #12;1. Introduction Oceans hold the key to the origin and continuity of life on the Earth

  8. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  9. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  10. VOL2NOTE.CHP:Corel VENTURA

    Gasoline and Diesel Fuel Update (EIA)

    Tables * Note 4. Domestic Crude Oil Production * Note 5. Export Data * Note 6. Quality Control and Data Revision * Note 7. Frames Maintenance * Note 8. Descriptive Monthly...

  11. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  12. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  13. On the security of some password-based key agreement schemes

    E-Print Network [OSTI]

    on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19

  14. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  15. BRIEFING NOTES November 2010

    E-Print Network [OSTI]

    Mound, Jon

    and EU, have promoted biofuel advancement which has #12;Briefing Note. November 2010. SustainableBRIEFING NOTES November 2010 Sustainable biofuels in Africa: cultivation of Jatropha curcas in Mali Background Case study 1 - Mali Case study 2 - Malawi Policy recommendations Biofuel cultivation worldwide

  16. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  17. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  18. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    Construction Other Oil Consumption by Sector (1980-2009) Mtto "Other". Final Oil Consumption by Sectoral SharesOil Natural Gas Note: Data based on total final consumption

  19. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  20. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  1. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  2. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  3. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  4. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  5. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  6. Thermal indicator for wells

    DOE Patents [OSTI]

    Gaven, Jr., Joseph V. (Oakton, VA); Bak, Chan S. (Newbury Park, CA)

    1983-01-01T23:59:59.000Z

    Minute durable plate-like thermal indicators are employed for precision measuring static and dynamic temperatures of well drilling fluids. The indicators are small enough and sufficiently durable to be circulated in the well with drilling fluids during the drilling operation. The indicators include a heat resistant indicating layer, a coacting meltable solid component and a retainer body which serves to unitize each indicator and which may carry permanent indicator identifying indicia. The indicators are recovered from the drilling fluid at ground level by known techniques.

  7. Editor's Note: Hurricane Sandy,

    E-Print Network [OSTI]

    Rosen, Jay

    Editor's Note: Hurricane Sandy, also known as Super Storm Sandy, Tropi- cal Storm Sandy, or just to protect the public, vital infrastructure, and the environment. Hurricane Sandy When Joseph Bruno, New York- nuity that the city demonstrated in the wake of Hurricane Sandy. So when he addressed a forum at New

  8. Computer Engineering Curriculum Notes

    E-Print Network [OSTI]

    Mather, Patrick T.

    1 Computer Engineering Curriculum Notes 2013-2014 Technical Electives Students fulfill 15 credits be assigned to either group A or group B as determined by Computer Engineering program committee. Every year the computer engineering program committee will review the list and may make change(s). Group A (at least 6

  9. ELECTRICAL ENGINEERING Curriculum Notes

    E-Print Network [OSTI]

    Mather, Patrick T.

    ELECTRICAL ENGINEERING Curriculum Notes 2013-2014 1. Electrical Engineering (EE) students must/programs/electrical_engineering) and minors are used to regulate technical electives. A student must complete four technical elective courses in Electrical Engineering or Computer Engineering. At a minimum

  10. 10/25/2010 1 Eco-Region Protection Indicator

    E-Print Network [OSTI]

    Columbia University

    10/25/2010 1 Eco-Region Protection Indicator for the 2010 release of the Natural Resource Note: An error was detected in the protected area points layer for the 2010 version of the World Database of Protected Areas (WDPA) after processing the eco-region protection indicator, but too late

  11. Briefing notes on MPhils

    E-Print Network [OSTI]

    Runde, Jochen

    2009-07-13T23:59:59.000Z

    staff.’ (extract from BP internal report) The CMI MPhil initiative is also serving as an agent of change within Cambridge University. Successes on this front include: great strides in the development of the platform-sharing model (e.g. all CMI... BRIEFING NOTE Professional Practice MPhil Programmes developed under the aegis of CMI CMI has sponsored the development of a number of new MPhils at Cambridge, inspired by the successful ‘Professional Practice’ programmes at MIT. It is the multi...

  12. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  13. Notes and Definitions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > The EnergyCenterDioxideDocumentationThreeNewsfuelNotes and Definitions

  14. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  15. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  16. Tamper indicating bolt

    DOE Patents [OSTI]

    Blagin, Sergei V.; Barkanov, Boris P.

    2004-09-14T23:59:59.000Z

    A tamper-indicating fastener has a cylindrical body with threads extending from one end along a portion of the body, and a tamper indicating having a transducer for converting physical properties of the body into electronic data; electronics for recording the electronic data; and means for communicating the recorded information to a remote location from said fastener. The electronics includes a capacitor that varies as a function of force applied by the fastener, and non-volatile memory for recording instances when the capacitance varies, providing an indication of unauthorized access.

  17. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  18. Industrial energy use indices 

    E-Print Network [OSTI]

    Hanegan, Andrew Aaron

    2008-10-10T23:59:59.000Z

    Energy use index (EUI) is an important measure of energy use which normalizes energy use by dividing by building area. Energy use indices and associated coefficients of variation are computed for major industry categories ...

  19. Notes on basic algebraic geometry

    E-Print Network [OSTI]

    2008-06-16T23:59:59.000Z

    Jun 16, 2008 ... Notes on basic algebraic geometry ...... Having discovered the basic equation ..... back to a rational function on X. Thus we get a nonzero ...

  20. Notes2Providers.doc -1-Notes to Retail Providers

    E-Print Network [OSTI]

    providers that purchase electricity from a power pool that submits an Annual Report to the Energy CommissionNotes2Providers.doc -1- Notes to Retail Providers February 2003 Power Source Disclosure an energy mix or fuel mix different than the California Mix, (Net System Power)i . As a retail provider you

  1. Residential market transformation: National and regional indicators

    SciTech Connect (OSTI)

    Van Wie McGrory, Laura L.; McNamara, Maureen; Suozzo, Margaret

    2000-06-01T23:59:59.000Z

    A variety of programs are underway to address market barriers to the adoption of energy-efficient residential technologies and practices. Most are administered by utilities, states, or regions that rely on the Energy Star as a consistent platform for program marketing and messaging. This paper reviews regional and national market transformation activities for three key residential end-uses -- air conditioning, clothes washing, and lighting -- characterizing current and ongoing programs; reporting on progress; identifying market indicators; and discussing implications.

  2. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  3. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  4. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  5. Key Activities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyce Kerr-PhilpottAbout the

  6. Key Activities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyce Kerr-PhilpottAbout theOffice

  7. Extension Note Forest Research

    E-Print Network [OSTI]

    -based harvesting systems led to the development of the "Site Degradation Guidelines for the Vancouver Forest Region to validate soil disturbance guidelines, were lacking at that time. Early attempts had been made to assess, and to measure tree growth over the longer term as an indication of site productivity. The first trial

  8. The CIEDE2000 Color-Difference Formula: Implementation Notes,

    E-Print Network [OSTI]

    Sharma, Gaurav

    The CIEDE2000 Color-Difference Formula: Implementation Notes, Supplementary Test Data and scientists in correctly implementing the recently developed CIEDE2000 color-difference formula. We indicate mathematical discontinuities in the formula. © 2004 Wiley Periodicals, Inc. Col Res Appl, 30, 21­30, 2005

  9. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  10. Enhanced tamper indicator

    DOE Patents [OSTI]

    Garcia, Anthony R.; Johnston, Roger G.

    2003-07-08T23:59:59.000Z

    The present invention provides an apparatus and method whereby the reliability and tamper-resistance of tamper indicators can be improved. A flexible connector may be routed through a latch for an enclosure such as a door or container, and the free ends of the flexible connector may be passed through a first locking member and firmly attached to an insert through the use of one or more attachment members such as set screws. A second locking member may then be assembled in interlocking relation with the first locking member to form an interlocked assembly around the insert. The insert may have one or more sharp projections extending toward the first or second locking member so that any compressive force applied in an attempt to disassemble the interlocked assembly results in permanent, visible damage to the first or second locking member.

  11. Booklet, DOE Subject Area Indicators and Key Word List for RD...

    Broader source: Energy.gov (indexed) [DOE]

    information that is potentially classified as Restricted Data (RD) or Formerly Restricted Data (FRD). This book is particularly helpful to document reviewers conducting...

  12. From strategy to action: 20112013 A summary of key initiatives and performance indicators for UC

    E-Print Network [OSTI]

    Hickman, Mark

    Carr Deputy Vice-Chancellor Professor Ian Town Registrar Jeff Field Chief Financial Officer Dr Yvonne. (SS&I, CER, PVCs, AVC(A)) 2. RETAIN: Support student success through better monitoring

  13. NREL Policy Stacking Theory Correlates Key Indicators with Solar Market Success (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-11-01T23:59:59.000Z

    NREL's Integrated Applications Group evaluated the time-dependent relationships between policy implementation and the success of solar markets using historical data for installed capacity of solar photovoltaic energy systems. This Science and Technology Highlights fact sheet summarizes their research.

  14. Impacts of intermittent sources on the quality of power supply: The key role of reliability indicators

    E-Print Network [OSTI]

    Boyer, Edmond

    importance, especially when high shares of renewable energy sources, and in particular intermittent energy. In particular, high shares of renew- able energy sources may become a critical aspect of future energy systems, both for centralized scheme and for distributed architecture. The integration of renewable energy

  15. Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyandapproximately 10|BlueFireBoilerBoltonHooperOctober

  16. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  17. Performance Indicators of Wind Energy Production

    E-Print Network [OSTI]

    D'Amico, G; Prattico, F

    2015-01-01T23:59:59.000Z

    Modeling wind speed is one of the key element when dealing with the production of energy through wind turbines. A good model can be used for forecasting, site evaluation, turbines design and many other purposes. In this work we are interested in the analysis of the future financial cash flows generated by selling the electrical energy produced. We apply an indexed semi-Markov model of wind speed that has been shown, in previous investigation, to reproduce accurately the statistical behavior of wind speed. The model is applied to the evaluation of financial indicators like the Internal Rate of Return, semi-Elasticity and relative Convexity that are widely used for the assessment of the profitability of an investment and for the measurement and analysis of interest rate risk. We compare the computation of these indicators for real and synthetic data. Moreover, we propose a new indicator that can be used to compare the degree of utilization of different power plants.

  18. Name ____key_______________ This is an open-book, open notes exam.

    E-Print Network [OSTI]

    Taber, Douglass

    O O AcOH O I OCH3 OH HO HO OHH OHH OHH OH HHO OHH OHH OH OHH HHO OHH OH OHH OHH HHO OH OHH HHO HHO OH HHO OHH HHO OH HHO HHO OHH OH HHO HHO HHO OH O H N O O H H O This end becomes alkene this carbon

  19. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  20. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  1. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  2. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  3. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  4. Indicator for in Use Energy Consumption (IUE): a tool enhancing Design for Energy Efficiency of

    E-Print Network [OSTI]

    Boyer, Edmond

    Efficiency; Design Indicator; Energy using Product (EuP); Value Engineering. 1- Introduction: Environmental-assemblies. The use of the indicator is simulated in the redesign of a set top box. Key words: Ecodesign; Energy

  5. Technical Note 499 December1990

    E-Print Network [OSTI]

    Technical Note 499 · December1990 Interpretation as Abduction Jerry R. Hobbs, Mark Stickel;Interpretation as Abduction Jerry R. Hobbs, Mark Stickel, Douglas Appelt, and Paul Martin Artificial Intelligence Center SRI International Abstract Abduction is inference to the best explanation. In the TACITUS project

  6. A note on axial symmetries

    E-Print Network [OSTI]

    Christopher Beetle; Shawn Wilder

    2013-12-31T23:59:59.000Z

    This note describes a local scheme to characterize and normalize an axial Killing field on a general Riemannian geometry. No global assumptions are necessary, such as that the orbits of the Killing field all have period $2 \\pi$. Rather, any Killing field that vanishes at at least one point necessarily has the expected global properties.

  7. COGS 300 Notes March 11, 2014 Today's "Fun" Example: Honda's ASIMO Robot

    E-Print Network [OSTI]

    Woodham, Robert J.

    COGS 300 Notes March 11, 2014 Today's "Fun" Example: Honda's ASIMO Robot Honda unvealed the newest at http://www.youtube.com/watch?v=lvruMLGiAdI For more video examples, go to http://asimo.honda.com/ Key by 3 km/hour from previous model) Example: Honda's ASIMO Robot (cont'd) The Asimo humanoid robot has

  8. NERSC Users Group Meeting June 13 - 14, 1995 Notes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed KeyPresentations ERSUGMinutesNotes

  9. NERSC Users Group Meeting June 24-25, 2004 Notes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed KeyPresentationsAttendee ListNotes

  10. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  11. NOTE: OPTIMAL NON-HOMOGENEOUS COMPOSITES FOR ...

    E-Print Network [OSTI]

    R. Tavakoli

    2012-10-02T23:59:59.000Z

    NOTE: OPTIMAL NON-HOMOGENEOUS COMPOSITES FOR. DYNAMIC LOADING REVISITED. R. TAVAKOLI. 1. Problem formulation. Consider ? ? Rd (

  12. THOMSON SCIENTIFIC EndNote Web

    E-Print Network [OSTI]

    texto. · Armazenar até 10.000 referências em sua base de dados pessoal (EndNote Web Library), pro resultados das pesquisas diretamente em sua base de dados pessoal do EndNote Web clicando no botão "Save to EndNote Web". As referências sal- vas em sua base de dados pessoal do EndNote Web serão exibidas com

  13. OFFSHORE WIND FARMS Guidance note for Environmental

    E-Print Network [OSTI]

    OFFSHORE WIND FARMS Guidance note for Environmental Impact Assessment In respect of FEPA and CPA requirements Version 2 - June 2004 #12;Offshore Wind Farms: Guidance Note for Environmental Impact Assessment 2004 #12;Offshore Wind Farms: Guidance Note for Environmental Impact Assessment in Respect of FEPA

  14. DANE TECHNICAL NOTE INFN -LNF, Accelerator Division

    E-Print Network [OSTI]

    Istituto Nazionale di Fisica Nucleare (INFN)

    K K DANE TECHNICAL NOTE INFN - LNF, Accelerator Division Frascati, March 10, 1997 Note: BM-1 BUNCH current. This measurement allows to calculate energy losses due to parasitic beam-vacuum chamber losses. In this Note we present results of the measurements and their analysis, comparing the results

  15. Operating Costs Estimates Cost Indices

    E-Print Network [OSTI]

    Boisvert, Jeff

    to update costs of specific equipment, raw material or labor or CAPEX and OPEX of entire plants Cost Indices

  16. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  17. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  18. E M E R I T I Note: Date in parentheses indicates year of receiving emer-

    E-Print Network [OSTI]

    Gering, Jon C.

    School of Music; MME, EdD, Florida State University. Clay H. Dawson Associate Professor Emeritus of MusicD, University of Iowa; Post Doctoral Study, University of Missouri, University of Montana. Gary D. Sells

  19. Notes From the Chair 2 Council approves indicators to track 2

    E-Print Network [OSTI]

    and Conservation Council Volume Eight, Number Four AUTUMN 2009 Wind power, a variable resource requiring additional Public Comment on Fish and Wildlife Plans for Bitterroot and Blackfoot Rivers 11 Striking a Balance Between Energy and the Environment in the Columbia River Basin What's Inside The Sixth Power Plan

  20. Lecture notes for criticality safety

    SciTech Connect (OSTI)

    Fullwood, R.

    1992-03-01T23:59:59.000Z

    These lecture notes for criticality safety are prepared for the training of Department of Energy supervisory, project management, and administrative staff. Technical training and basic mathematics are assumed. The notes are designed for a two-day course, taught by two lecturers. Video tapes may be used at the options of the instructors. The notes provide all the materials that are necessary but outside reading will assist in the fullest understanding. The course begins with a nuclear physics overview. The reader is led from the macroscopic world into the microscopic world of atoms and the elementary particles that constitute atoms. The particles, their masses and sizes and properties associated with radioactive decay and fission are introduced along with Einstein's mass-energy equivalence. Radioactive decay, nuclear reactions, radiation penetration, shielding and health-effects are discussed to understand protection in case of a criticality accident. Fission, the fission products, particles and energy released are presented to appreciate the dangers of criticality. Nuclear cross sections are introduced to understand the effectiveness of slow neutrons to produce fission. Chain reactors are presented as an economy; effective use of the neutrons from fission leads to more fission resulting in a power reactor or a criticality excursion. The six-factor formula is presented for managing the neutron budget. This leads to concepts of material and geometric buckling which are used in simple calculations to assure safety from criticality. Experimental measurements and computer code calculations of criticality are discussed. To emphasize the reality, historical criticality accidents are presented in a table with major ones discussed to provide lessons-learned. Finally, standards, NRC guides and regulations, and DOE orders relating to criticality protection are presented.

  1. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  2. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  3. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  4. Review of sustainability indices and indicators: Towards a new City Sustainability Index (CSI)

    SciTech Connect (OSTI)

    Mori, Koichiro, E-mail: kmori@iis.u-tokyo.ac.jp [Institute of Industrial Science, University of Tokyo (Japan); Christodoulou, Aris, E-mail: aris.christodoulou@ucl.ac.uk [Centre for Transport Studies, University College London (United Kingdom)

    2012-01-15T23:59:59.000Z

    The purpose of this paper is to discuss conceptual requirements for a City Sustainability Index (CSI) and to review existing major sustainability indices/indicators in terms of the requirements. The following indices are reviewed: Ecological Footprint (EF), Environmental Sustainability Index (ESI), Dashboard of Sustainability (DS), Welfare Index, Genuine Progress Indicator (GPI), Index of Sustainable Economic Welfare, City Development Index, emergy/exergy, Human Development Index (HDI), Environmental Vulnerability Index (EVI), Environmental Policy Index (EPI), Living Planet Index (LPI), Environmentally-adjusted Domestic Product (EDP), Genuine Saving (GS), and some applications of composite indices or/and multivariate indicators to local or regional context as case studies. The key conceptual requirements for an adequate CSI are: (i) to consider environmental, economic and social aspects (the triple bottom line of sustainability) from the viewpoint of strong sustainability; (ii) to capture external impacts (leakage effects) of city on other areas beyond the city boundaries particularly in terms of environmental aspects; (iii) to create indices/indicators originally for the purpose of assessing city sustainability; and (iv) to be able to assess world cities in both developed and developing countries using common axes of evaluation. Based on the review, we conclude that it is necessary to create a new CSI that enables us to assess and compare cities' sustainability performance in order to understand the global impact of cities on the environment and human life as compared with their economic contribution. In the future, the CSI will be able to provide local authorities with guidance toward sustainable paths. - Highlights: Black-Right-Pointing-Pointer We derive the four key requirements for a new City Sustainability Index (CSI) system. Black-Right-Pointing-Pointer First, the triple bottom line must be considered in terms of strong sustainability. Black-Right-Pointing-Pointer Second, environmental leakage effects beyond city boundaries should be captured. Black-Right-Pointing-Pointer Third, 'city sustainability' should be originally considered when CSI is created. Black-Right-Pointing-Pointer Fourth, cities in developed and developing countries can be evaluated without bias.

  5. Energy Efficiency Indicators Methodology Booklet

    E-Print Network [OSTI]

    Sathaye, Jayant

    2010-01-01T23:59:59.000Z

    Lighting Appliance Definition Energy use per householdE/employee Indicator E/m Definition Energy use per squarem 2 per building type Definition Energy per square meter for

  6. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  7. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  8. Energy Efficiency Indicators Methodology Booklet

    SciTech Connect (OSTI)

    Sathaye, Jayant; Price, Lynn; McNeil, Michael; de la rue du Can, Stephane

    2010-05-01T23:59:59.000Z

    This Methodology Booklet provides a comprehensive review and methodology guiding principles for constructing energy efficiency indicators, with illustrative examples of application to individual countries. It reviews work done by international agencies and national government in constructing meaningful energy efficiency indicators that help policy makers to assess changes in energy efficiency over time. Building on past OECD experience and best practices, and the knowledge of these countries' institutions, relevant sources of information to construct an energy indicator database are identified. A framework based on levels of hierarchy of indicators -- spanning from aggregate, macro level to disaggregated end-use level metrics -- is presented to help shape the understanding of assessing energy efficiency. In each sector of activity: industry, commercial, residential, agriculture and transport, indicators are presented and recommendations to distinguish the different factors affecting energy use are highlighted. The methodology booklet addresses specifically issues that are relevant to developing indicators where activity is a major factor driving energy demand. A companion spreadsheet tool is available upon request.

  9. EndNote X5 Basics What is EndNote?

    E-Print Network [OSTI]

    will need to choose between two installation types ­ Typical or Custom. If you choose Typical, you. This guide will show you the following basic steps for using EndNote: Opening or creating an EndNote Library Adding bibliographic references or citations to your library Using EndNote with Microsoft Word

  10. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  11. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  12. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  13. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  14. TESLA-LNF TECHNICAL NOTE Divisione Acceleratori

    E-Print Network [OSTI]

    TESLA-LNF TECHNICAL NOTE _____________ Divisione Acceleratori Frascati, November 20, 2003 Note: TESLA Report 2003-26 TESLA DAMPING RING: INJECTION/EXTRACTION SCHEMES WITH RF DEFLECTORS D. Alesini, S/extraction schemes in the Damping Ring of TESLA using RF deflectors. We illustrate different possible solutions using

  15. DANE TECHNICAL NOTE INFN -LNF, Accelerator Division

    E-Print Network [OSTI]

    Istituto Nazionale di Fisica Nucleare (INFN)

    (Chairman) F. Willeke, DESY 1. Follow up of previous Meeting The first report by the DANE Machine AdvisoryK K DANE TECHNICAL NOTE INFN - LNF, Accelerator Division Frascati, May 11, 2000 Note: G-55 Report by DANE Machine Advisory Panel on 2nd Meeting held on 4-5 May 2000 J. M. Jowett, CERN S. Myers, CERN

  16. DANE TECHNICAL NOTE INFN -LNF, Accelerator Division

    E-Print Network [OSTI]

    Istituto Nazionale di Fisica Nucleare (INFN)

    KKKK KKKK DANE TECHNICAL NOTE INFN - LNF, Accelerator Division Frascati, January 13, 1993 Note: IR to see how much heat has to be removed. The two main sources of heat are: 1) Resistive losses due. Technol. 5(6) 3446 (1987). #12;IR-1 pg. 6 APPENDIX IA Losses in the I.R. 1) Resistive losses in Be: dp dz

  17. BNL/SNS TECHNICAL NOTE R. Witkover

    E-Print Network [OSTI]

    BNL/SNS TECHNICAL NOTE NO. 049 R. Witkover September 23, 1998 ALTERNATING GRADIENT SYNCHROTRON-In-Gap" Monitor for the Spallation Neutron Source #12;SNS Technical Note Considerations in Designing a "Beam of approximately 550 nsec. With a design intensity of 1014 per pulse, un-controlled losses must be kept to a level

  18. DANE TECHNICAL NOTE INFN -LNF, Accelerator Division

    E-Print Network [OSTI]

    Istituto Nazionale di Fisica Nucleare (INFN)

    KKKK KKKK DANE TECHNICAL NOTE INFN - LNF, Accelerator Division Frascati, October 26, 1994 Note: RF enough (i.e. if the parasitic losses are low with respect to the energy left by each passing bunch-zero longitudinal electric field on the cavity axis. Being azimuthally symmetric, it is possible to calculate them

  19. DANE TECHNICAL NOTE INFN -LNF, Accelerator Division

    E-Print Network [OSTI]

    Istituto Nazionale di Fisica Nucleare (INFN)

    K K DANE TECHNICAL NOTE INFN - LNF, Accelerator Division Frascati, July 16, 1996 Note: RF-19 losses and prevents to reach the operating voltage range. The RF cavity of the DANE -Factory Accumulator and electrical conductivities. Multipactoring (MP) is a phenomenon of resonant electron discharge which can occur

  20. DANE TECHNICAL NOTE INFN -LNF, Accelerator Division

    E-Print Network [OSTI]

    Istituto Nazionale di Fisica Nucleare (INFN)

    K K DANE TECHNICAL NOTE INFN - LNF, Accelerator Division Frascati, December 14, 1995 Note: CD-5, are also needed in order to minimise the losses. In order to use this device as a transverse kicker, two) excitation. #12;CD-5 pg. 3 The combined magnetic and electric field gives a net deflecting Lorentz force

  1. DANE TECHNICAL NOTE INFN -LNF, Accelerator Division

    E-Print Network [OSTI]

    Istituto Nazionale di Fisica Nucleare (INFN)

    KKKK KKKK DANE TECHNICAL NOTE INFN - LNF, Accelerator Division Frascati, Sept. 26, 1991 Note: RF-4 and vacuum simpler and less expensive. The cavity will be made of copper which has better electrical and thermal conductivity to reduce the RF losses and keep the cooling easier. #12;RF-4 pg. 2 Multipacting (MP

  2. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  3. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  4. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  5. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  6. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  7. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  8. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  9. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  10. Simplifying Tensor Polynomials with Indices

    E-Print Network [OSTI]

    A. Balfagon; X. Jaen

    1998-09-22T23:59:59.000Z

    We are presenting an algorithm capable of simplifying tensor polynomials with indices when the building tensors have index symmetry properties. These properties include simple symmetry, cyclicity and those due to the presence of partial and covariant derivatives. We are also including some examples using the Riemann tensor as a paradigm. The algorithm is part of a Mathematica package called Tools of Tensor Calculus (TTC) [web address: http://baldufa.upc.es/ttc

  11. Workshop Notes from ""Compressed Natural Gas and Hydrogen Fuels...

    Broader source: Energy.gov (indexed) [DOE]

    Workshop Notes from ""Compressed Natural Gas and Hydrogen Fuels: Lessons Learned for the Safe Deployment of Vehicles"" Workshop, December 10-11, 2009 Workshop Notes from...

  12. Corrosion indicating equipment UK-1

    SciTech Connect (OSTI)

    Gerasimenko, Y.S.; Abrosimov, V.S.; Rudenko, A.K.; Sorokin, V.I.

    1986-11-01T23:59:59.000Z

    UK-1, developed and introduced into oil industry corrosion-indicating equipment, has been developed on the basis of the principle of measurements of polarization resistance. It is designed for determining the corrosion activity of effluents of oil fields. The technical data and design of the equipment is discussed. The investigations were carried out on 08kp steel in simulation effluents of oil fields in the presence of corrosion inhibitors used in the oil industry at various temperatures (25-50 C) and liquid flow rate.

  13. Notes on Slovene and Slavic Etymology

    E-Print Network [OSTI]

    Hamp, Eric P.

    1997-01-01T23:59:59.000Z

    The notes present critiques of F. Bezlaj's Etymological Dictionary of the Slovene Language and new proposals for the etymology of the words krma 'animal feed', Krma (toponym), kašelj 'cough', ogenj 'flame, fire', and oglje 'charcoal'....

  14. A. La Rosa Lecture Notes APPLIED OPTICS

    E-Print Network [OSTI]

    A. La Rosa Lecture Notes APPLIED OPTICS _______________________________________________________________________________ The variational principle and ray propagation The ray equation Propagation on a lenslike media: GRIN lenses Ref: A. Yariv and P. Yeh, "Photonics," Oxford University Press. Chapter 2. The ray equation obtained from

  15. A. La Rosa Lecture Notes APPLIED OPTICS

    E-Print Network [OSTI]

    _______________________________________________________________________________ Rays and Optical beams Ref: A. Yariv and P. Yeh, "Photonics," Oxford University Press. Chapter 2. IA. La Rosa Lecture Notes APPLIED OPTICS. Ray Matrices I.A Special cases Case: Propagation through a thin lens Case: Propagation through

  16. Data Mining and Knowledge Discovery: Practice Notes

    E-Print Network [OSTI]

    Novak, Petra Kralj

    1 Data Mining and Knowledge Discovery: Practice Notes Petra Kralj Novak Petra.Kralj.Novak@ijs.si and exam · 2013/1/15: Written exam, seminar proposal discussion · 2013/2/12: Data mining seminar

  17. Data Mining and Knowledge Discovery: Practice Notes

    E-Print Network [OSTI]

    Novak, Petra Kralj

    1 Data Mining and Knowledge Discovery: Practice Notes Petra Kralj Novak Petra.Kralj.Novak@ijs.si on Weka 3: Descriptive data mining ­ Discussion about seminars and exam · 2013/12/16: Written exam

  18. Lecture Notes in Secret Sharing Carles Padro

    E-Print Network [OSTI]

    Lecture Notes in Secret Sharing Carles Padr´o Nanyang Technological University, Singapore Version 2.7 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2 Secret Sharing.2 Secret Sharing Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.3 Threshold Secret

  19. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  20. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  1. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  2. Tuesday Webcast for Industry: Key Energy-Saving Projects for Smaller Facilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartmentTest forTechnologiesTribal Utility FormationKey Energy-Saving

  3. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  4. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  5. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  6. I will send the key shortly. I don't want to waste time going over the exam in class as

    E-Print Network [OSTI]

    Allan, Vicki H.

    class ­ Study book/notes after class ­ Go to SI's each week ­ Come to office hours 4-1 Exam 30 35 40 452/12/2009 1 Exam · I will send the key shortly. · I don't want to waste time going over the exam

  7. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  8. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  9. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  10. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  11. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  12. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  13. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  14. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  15. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  16. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  17. ENERGIES RENOVABLES NOTES FINALS 2006 COGNOMS, NOM ASSISTNCIA TREBALL NOTA

    E-Print Network [OSTI]

    Batiste, Oriol

    ENERGIES RENOVABLES NOTES FINALS 2006 COGNOMS, NOM ASSISTÃ?NCIA TREBALL NOTA ALCOVERRO VIDAL, MARCEL

  18. Tamper-indicating barcode and method

    DOE Patents [OSTI]

    Cummings, Eric B.; Even, Jr., William R.; Simmons, Blake A.; Dentinger, Paul Michael

    2005-03-22T23:59:59.000Z

    A novel tamper-indicating barcode methodology is disclosed that allows for detection of alteration to the barcode. The tamper-indicating methodology makes use of a tamper-indicating means that may be comprised of a particulate indicator, an optical indicator, a deformable substrate, and/or may be an integrated aspect of the barcode itself. This tamper-indicating information provides greater security for the contents of containers sealed with the tamper-indicating barcodes.

  19. Banking sector of the Russian Federation : study of the correlation between commodity prices and key safety, soundness and performance indicators

    E-Print Network [OSTI]

    Sinilov, Nikolay

    2010-01-01T23:59:59.000Z

    The purpose of this work is to provide a comprehensive overview of the state of banking system in Russia, and to understand its core dependencies and potential risks. The system, the way we find it now, has evolved though ...

  20. From Strategy to Action: 2011-2013 A summary of key initiatives and performance indicators for UC

    E-Print Network [OSTI]

    Reale, Marco

    Deputy Vice-Chancellor Professor Ian Town Registrar Jeff Field Chief Financial Officer Dr Yvonne Shanahan & effective processes, focused programmes, targeted & integrated communications. (SS&I, CER,PVCs, AVC (A),) 2

  1. BS IE Program Educational Outcomes, Key Abilities, and Performance Indicators for ABET assessment B. Gopalakrishnan, IMSE, 04/11/13

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    material cost required for designs. Students will be able to estimate cost for various manufacturing parameters and cost for use in machining, casting, joining, bulk deformation, and powder metallurgy of materials relationships, material properties, mechanical properties and cost properties to best select

  2. Note and Record A note on polyvinyl chloride (PVC) pipe traps for

    E-Print Network [OSTI]

    Pretoria, University of

    Note and Record A note on polyvinyl chloride (PVC) pipe traps for sampling vegetation of traditional traps, and many are furtive (Myers et al., 2007; Pittman et al., 2008). PVC pipe traps, which and Hyperolius (see Channing, 2001; du Preez & Carruthers, 2009), may be attracted to artificial refugia of PVC

  3. GENOMIC RESOURCES NOTE Genomic Resources Notes accepted 1 February 201331 March

    E-Print Network [OSTI]

    Rieseberg, Loren

    GENOMIC RESOURCES NOTE Genomic Resources Notes accepted 1 February 2013­31 March 2013 GENOMIC RESOURCES DEVELOPMENT CONSORTIUM,1 MATTHEW G. KING,2 SE´ BASTIEN RENAUT,3 LOREN H. RIESEBERG2,4 and HEATHER C. ROWE3 1 Molecular Ecology Resources Editorial Office, 6270 University Blvd, Vancouver, BC V6T 1Z4

  4. 2004 Notes2Providers.doc -1-Notes to Retail Providers

    E-Print Network [OSTI]

    with the meter data reported to the system operator (Retail providers that purchase electricity from a power pool2004 Notes2Providers.doc -1- Notes to Retail Providers February 2005 Power Source Disclosure than the California Mix, (Net System Power)i . As a retail provider you are probably aware that all

  5. Scientific note A scientific note on the partial nucleotide sequence of a US strain

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Scientific note A scientific note on the partial nucleotide sequence of a US strain of Kashmir bee bee virus / nucleotide sequence / RT-PCR Kashmir bee virus (KBV) was first isolated from a diseased sequence of the amplified product. The BLASTN search of the Nucleotide Sequence Database at the National

  6. Microsoft PowerPoint - DOE O 413 3B Brief v9 with key points in notes [Read-Only]

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment3311, 3312),Microgrid Set-Top Box Proceeding March 7, 2012 PageFour

  7. Microsoft PowerPoint - DOE O 413 3B Brief v9 with key points in notes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction to EnergyDepartment ofMarginalPaulMicrosoftBSQ-300 EntireSeptember

  8. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  9. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  10. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  11. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  12. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  13. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  14. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  15. Xyce parallel electronic simulator release notes.

    SciTech Connect (OSTI)

    Keiter, Eric Richard; Hoekstra, Robert John; Mei, Ting; Russo, Thomas V.; Schiek, Richard Louis; Thornquist, Heidi K.; Rankin, Eric Lamont; Coffey, Todd Stirling; Pawlowski, Roger Patrick; Santarelli, Keith R.

    2010-05-01T23:59:59.000Z

    The Xyce Parallel Electronic Simulator has been written to support, in a rigorous manner, the simulation needs of the Sandia National Laboratories electrical designers. Specific requirements include, among others, the ability to solve extremely large circuit problems by supporting large-scale parallel computing platforms, improved numerical performance and object-oriented code design and implementation. The Xyce release notes describe: Hardware and software requirements New features and enhancements Any defects fixed since the last release Current known defects and defect workarounds For up-to-date information not available at the time these notes were produced, please visit the Xyce web page at http://www.cs.sandia.gov/xyce.

  16. Energy Indicators for Sustainable Development: Guidelines and...

    Open Energy Info (EERE)

    Some indicators focus on the delivery of essential energy services for reducing poverty and improving living conditions, while other indicators focus on environmental...

  17. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  18. Red Algae Lose Key Mitochondrial Genes in Response to Becoming Parasitic

    E-Print Network [OSTI]

    Lane, Chris

    Red Algae Lose Key Mitochondrial Genes in Response to Becoming Parasitic Lillian Hancock1 , Lynda independently evolved hundreds of times among the floridiophyte red algae. Much is known about the life history class of red algae, Plocamiocolax puvinata, has lost the atp8 gene entirely, indicating that this gene

  19. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  20. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  1. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  2. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  3. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  4. DANE TECHNICAL NOTE INFN -LNF, Accelerator Division

    E-Print Network [OSTI]

    Istituto Nazionale di Fisica Nucleare (INFN)

    of the utilities (electrical power substation and cooling system) in the linac tunnel and klystron gallery before. Hutton (CEBAF), Chairman W. Scandale (CERN) A. Wrülich (ST) Overall Project Progress and Status The Committee noted the progress made since the last Review and is pleased to see that the major Project

  5. Technical Note Puncture protection of PVC geomembranes______________________________________________

    E-Print Network [OSTI]

    Technical Note Puncture protection of PVC geomembranes a design procedure for estimating the puncture protection of polyvinyl chloride (PVC) geomembranes. The puncture resistance of 0.5 mm, 0.75 mm, and 1.0 mm thick PVC geomembranes was measured using the truncated

  6. Section Notes 3 The Simplex Algorithm

    E-Print Network [OSTI]

    Chen, Yiling

    Section Notes 3 The Simplex Algorithm Applied Math 121 Week of September 22, 2014 Goals for the week · understand how to get from an LP to a simplex tableau. · be familiar with reduced costs, optimal solutions, different types of variables and their roles. · understand the steps of simplex phases I and II

  7. Section Notes 3 The Simplex Algorithm

    E-Print Network [OSTI]

    Chen, Yiling

    Section Notes 3 The Simplex Algorithm Applied Math 121 Week of February 14, 2011 Goals for the week · understand how to get from an LP to a simplex tableau. · be familiar with reduced costs, optimal solutions, different types of variables and their roles. · understand the steps of simplex phases I and II. · be able

  8. Section Notes 3 The Simplex Algorithm

    E-Print Network [OSTI]

    Chen, Yiling

    Section Notes 3 The Simplex Algorithm Applied Math 121 Week of February 17, 2014 Goals for the week · understand how to get from an LP to a simplex tableau. · be familiar with reduced costs, optimal solutions, different types of variables and their roles. · understand the steps of simplex phases I and II. · be able

  9. Briefing Note 2010 19 15 September 2010

    E-Print Network [OSTI]

    Pedersen, Tom

    incremental costs for energy efficiency (EE) retrofits than do newer buildings. Throughout New York, 43Briefing Note 2010 ­ 19 15 September 2010 Energy Efficiency Retrofits Case Study - Empire State Building Produced in partnership with ISIS | A Research Centre | Sauder School of Business | UBC Author

  10. Technical Note Graphene: Substrate preparation and introduction

    E-Print Network [OSTI]

    Technical Note Graphene: Substrate preparation and introduction Radosav S. Pantelic a , Ji Won Suk September 2010 Accepted 4 October 2010 Available online xxxx Keywords: Graphene Graphene oxide Cryo the transfer of continuous, single-layer, pristine graphene to standard Quan- tifoil TEM grids. We compare

  11. Engineering Notes Ice Shape Characterization Using

    E-Print Network [OSTI]

    Tino, Peter

    Engineering Notes Ice Shape Characterization Using Self-Organizing Maps Stephen T. McClain Baylor. Introduction DURING the validation and verification of ice accretion codes, predicted ice shapes must be compared with experimental measurements of wind-tunnel or atmospheric ice shapes. Current methods for ice

  12. Briefing Note 2010 25 16 December 2010

    E-Print Network [OSTI]

    Pedersen, Tom

    of the CDM carbon market distortion issue are 19 chemical gas manufacturers, located mainly in China manufacturers in order to determine if the carbon crediting system has been manipulated.xi To date, China has1 Briefing Note 2010 ­ 25 16 December 2010 Carbon Market Distortions and Diminishing Environmental

  13. Briefing Note 2010 -9 21 June 2010

    E-Print Network [OSTI]

    Pedersen, Tom

    for a carbon tariff in an attempt to curb unfair competition from countries like China, which have weakerBriefing Note 2010 - 9 21 June 2010 Border Carbon Adjustments: The Canadian Context Produced Border carbon adjustments (BCAs), also known as carbon tariffs, are being proposed in the EU and US

  14. AGN Taxonomy and Unification Historical notes

    E-Print Network [OSTI]

    Aretxaga, Itziar

    Lecture 1 AGN Taxonomy and Unification · Historical notes · Multifrequency detection of nuclear activity · Classification of AGN - taxonomy · Unification · Evidence for obscuring tori in AGN Itziar Aretxaga (INAOE) @El Escorial, Dec 2007 #12;AGN taxonomy "Active" is used to refer to energetic processes

  15. CS229 Lecture notes Generative Learning algorithms

    E-Print Network [OSTI]

    Kosecka, Jana

    analysis (GDA). In this model, we'll assume that p(x|y) is distributed according to a multivariate normal discriminant analysis The first generative learning algorithm that we'll look at is Gaussian discrim- inant. In these notes, we'll talk about a different type of learning algorithm. Consider a classification problem

  16. 203-HJT-0611 UNLESS OTHERWISE NOTED

    E-Print Network [OSTI]

    McDonald, Kirk

    WELDS SHALL BE WITH ASME SECTION IX. NO CODE STAMP REQUIRED. 1. WELDING SHALL BE PERFORMED IN ACCORDANCE DIMENSIONS AND TOLERANCES PER ASME Y14.5M 3. MACHINED FINISH 125 MICRO- INCHES RMS 4. CONCENTRICITY .010 TIR.850 2.4 .9 2.850 .900 .975 1.20 NOTES 1. WELDING SHALL BE PERFORMED IN ACCORDANCE WITH ASME SECTION IX

  17. UNLESS OTHERWISE NOTED 203-HJT-0611

    E-Print Network [OSTI]

    McDonald, Kirk

    WITH ASME SECTION IX. NO CODE STAMP REQUIRED. 2. NO RADIOGRAPHY REQUIRED. ALL WELDS SHALL BE DYE PENETRANT.349 NOTES 1. WELDING SHALL BE PERFORMED IN ACCORDANCE WITH ASME SECTION IX. NO CODE STAMP REQUIRED. 2 AND TOLERANCES PER ASME Y14.5M 3. MACHINED FINISH 125 MICRO- INCHES RMS 4. CONCENTRICITY .010 TIR 5. MACHINED

  18. UNLESS OTHERWISE NOTED 203-HJT-0620A

    E-Print Network [OSTI]

    McDonald, Kirk

    .928 2.298 NOTES 1. WELDING AND INSPECTION SHALL BE PERFORMED IN ACCORDANCE WITH ASME SECTION IX. NO CODE ASME Y14.5M 3. MACHINED FINISH 125 MICRO- INCHES RMS 4. CONCENTRICITY .010 TIR 5. MACHINED ANGLES 1 INSPECTION REQUIRED. 2. NUMBER OF PIPE BUTT WELDS SHOULD BE MINIMIZED. NO CODE STAMP REQUIRED. IN ACCORDANCE

  19. DANE TECHNICAL NOTE INFN -LNF, Accelerator Division

    E-Print Network [OSTI]

    Istituto Nazionale di Fisica Nucleare (INFN)

    THE RADIOFREQUENCY SYSTEM FOR DANE: FIRST REMARKS R. Boni, A. Gallo INTRODUCTION This note presents some considerations on the Radiofrequency System (RFS) for DANE. It is worthed to mention that the RFS has to supply to the beams the energy lost by synchrotron radiation and parasitic losses. We propose two different solutions

  20. Research Note Fast 2-flip move evaluations

    E-Print Network [OSTI]

    Hao, Jin-Kao

    problems Fred Glover1 and Jin-Kao Hao2 1 OptTek Systems, Inc. 1919 Seventh Street Boulder, CO 80302, USA glover@opttek.com 2 Laboratoire d'Etude et de Recherche en Informatique (LERIA) Université d'Angers 2. Corresponding author: Fred Glover Biographical notes: Fred Glover holds the title of Distinguished Professor

  1. CenterPulse ContentsDirector's Notes

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    to our year-in-review newsletter, CenterPulse. Please forward it to your colleagues to help us improveCenterPulse ContentsDirector's Notes 2012 Year in Review Happy New Year, everyone! The year 2012 that recommended full continuation of funding for years 52-56 of NIH support. While the final funding level

  2. GEOLOGICAL NOTE Desert Pavement: An Environmental Canary?

    E-Print Network [OSTI]

    Ahmad, Sajjad

    GEOLOGICAL NOTE Desert Pavement: An Environmental Canary? P K. Haft Division of Earth and Ocean 27708 Ie-mail: /wff@geo.duke_eciul ABSTRACT Ongoing ctisruption of ancient, varnished desert pavement that the pavement disturbances reported here ~ue rarc on the millcnnhll time scale of desert varnish format ion

  3. Agent Notes Day 4 ~ Health Training

    E-Print Network [OSTI]

    ­ Agent Notes Day 4 ~ Health Training In preparation for the Health Day, you could order the National Institute on Aging, National Institutes of Health. To order these free booklets, go to www in the afternoon, and edit your agenda to reflect your choices. Several HealthHints newsletters are referenced

  4. Briefing Note 2011 29 4 February 2011

    E-Print Network [OSTI]

    Pedersen, Tom

    Briefing Note 2011 ­ 29 4 February 2011 Fracking in BC: Integrating climate change issues Produced - otherwise known as fracking. However the current controversy regarding fracking, including in the US options to reduce associated emissions, water, and health impacts. Fracking involves shooting a high

  5. Informal Assessment Work Group Meeting Notes

    E-Print Network [OSTI]

    O'Laughlin, Jay

    Informal Assessment Work Group Meeting Notes November 15, 2006 Present: Rula Awwad-Rafferty, Doug Baker, Dick Battaglia, Ben Beard, Suzi Billington, Alton Campbell, Jeanne Christiansen, Gail Eckwright is completed for all programs by May 2007? (Can we do the level of work needed in this time period?) Doug

  6. Application Note (A9) Revision: A

    E-Print Network [OSTI]

    Johnsen, Sönke

    measurements of light falling onto a flat surface. Such studies vary from solar UV exposure limitsApplication Note (A9) Revision: A AUGUST 1995 OPTRONIC LABORATORIES, INC. 4632 36TH STREET Orlando on the wavelength of light so the bluer wavelengths are scattered more strongly than redder. This leads

  7. NOTE: The IRB does not stamp the

    E-Print Network [OSTI]

    Loudon, Catherine

    obtaining Short Form consent: Download and review the current IRB approval letter from the Doc DepotNOTE: The IRB does not stamp the HIPAA Research Authorization Form, the Bill of Rights or the Short Short Form Consent ­ The Basics Date of Last Revision: 08-27-2013 Audience: Researchers Utilizing

  8. Data Mining and Knowledge Discovery: Practice Notes

    E-Print Network [OSTI]

    Novak, Petra Kralj

    1 Data Mining and Knowledge Discovery: Practice Notes dr. Petra Kralj Novak Petra.Kralj.Novak@ijs.si and exam · 2013/12/16: Written exam, seminar proposal discussion · 2014/1/8: Data mining seminar gain becomes the root 7. Divide the set S into subsets Si according to the values of A 8. Repeat steps

  9. Computer Note A Prototype Object Database for

    E-Print Network [OSTI]

    Neigel, Joseph E.

    Computer Note A Prototype Object Database for Mitochondrial DNA Variation J. E. NEIGEL AND P preserved. We hope to prevent further loss by establishing a community database for population genetic surveys. We explored the feasibility of a population genetics database by developing a prototype

  10. Linear Algebra Notes David A. SANTOS

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Linear Algebra Notes David A. SANTOS dsantos@ccp.edu January 2, 2010 REVISION #12;ii Contents . . . . . . . . . . . . . . . . . . 15 2 Matrices and Matrix Operations 18 2.1 The Algebra of Matrices . . . . . . . . . . . 18 2.3 Diagonalisability . . . . . . . . . . . . . . 143 7.4 Theorem of Cayley and Hamilton . . . . . 147 8 Linear Algebra

  11. Panel Session Notes Session II: Energy

    E-Print Network [OSTI]

    Jawitz, James W.

    to make cars more efficient, to make solar panels store more energy to be dispersed throughout the nightPanel Session Notes Session II: Energy Moderator: Dr. Jennifer Curtis Panelists: Dr. Gary Peter price for operating cost and the cost of manufacturing go down, there are many more sectors in the US

  12. A. La Rosa Lecture Notes APPLIED OPTICS

    E-Print Network [OSTI]

    variation of the electric field of the incident radiation Since the corresponding Poynting vector is given ox , which will depend on the electric field amplitude of the incident radiation. So, we need to find electrical charge emits radiation; the latter is camouflaged in the parameter . Note 2: Equation (11

  13. Practice Note Planning for brownfield land

    E-Print Network [OSTI]

    Practice Note Planning for brownfield land regeneration to woodland and wider green infrastructure 1FCPN022 Gail Atkinson and Kieron Doick March 2014 The regeneration of brownfield land to green of brownfield regeneration to woodland in order to inform project planning, raise awareness of lessons learnt

  14. NASA TECHNICAL NOTE APOLLO EXPERIENCE REPORT -

    E-Print Network [OSTI]

    Rathbun, Julie A.

    .' 1 * . NASA TECHNICAL NOTE APOLLO EXPERIENCE REPORT - SPACECRAFT STRUCTURAL WINDOWS by Oruis E(s)) ' Apollo Spacecraft * Chemically Tempered ' Fracture Mechanics 'h e a l e d Glass * Coatings ' Thermally is presented for the Apollo command and lunar modules. This report presents window design philosophy, design

  15. Fishery Notes EI Nino and Its Impact

    E-Print Network [OSTI]

    Fishery Notes EI Nino and Its Impact on Ecuadorean Fisheries Ecuadorean scientists report that an unusually powerful EI Nino in the eastern Pacific is adversely affecting Ecuador's pelagic fisheries. EI. The impact can be partic- ularly severe on larval and juvenile fish and, as a result, the effects of EI Nino

  16. Poor Theory Notes Toward a Manifesto

    E-Print Network [OSTI]

    Loudon, Catherine

    Poor Theory Notes Toward a Manifesto Poor theory is less a theory than a way of proceeding. Poor theory proposes to find ways of making the most of limited resources. Poor theory uses the tools at hand. Poor theory suggests the need to `work around' intransigent problems, when clear solutions

  17. DANE TECHNICAL NOTE INFN -LNF, Accelerator Division

    E-Print Network [OSTI]

    Istituto Nazionale di Fisica Nucleare (INFN)

    K K DANE TECHNICAL NOTE INFN - LNF, Accelerator Division Frascati, 28 November, 2002 IR-12 together with the total losses around the rings. Results seem encouraging, as calculated loss rates at IR2 in details and compared to calculated losses for the KLOE and the DEAR cases. 1 Introduction Background rates

  18. BNL/SNS TECHNICAL NOTE R. Witkover

    E-Print Network [OSTI]

    BNL/SNS TECHNICAL NOTE NO. 126 R. Witkover TechSource, Inc. Santa Fe, NM September 2, 2003 COLLIDER BLM Signal Calibration Constants R. Witkover TechSource, Inc. Santa Fe, NM Background The Beam Loss Monitor (BLM) system is designed to measure beam losses in the SNS using Ion Chambers supplied by BNL

  19. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  20. Tyndall Briefing Note No. 26 Tyndall Briefing Note No. 26 June 2008

    E-Print Network [OSTI]

    Watson, Andrew

    FOR A GLOBAL EMISSIONS TRADING SCHEME (GETS) FOR INTERNATIONAL BUNKERS (AVIATION AND SHIPPING) A Briefing Note the proposal for a global emissions trading scheme (GETS) included in the Open Letter to the IPCC from

  1. Notes Bull. Korean Chem. Soc. 2005, Vol. 26, No. 1 175 Synthesis of Novel Biodegradable Quaternary Amine-based Cross-linked

    E-Print Network [OSTI]

    Park, Jong-Sang

    Notes Bull. Korean Chem. Soc. 2005, Vol. 26, No. 1 175 Synthesis of Novel Biodegradable Quaternary Leadership Academy, 1334 Sosa-lee, Anhung-myun, Hwoingsung-gun, Kangwon 225-823, Korea Received October 26, 2004 Key Words : Cross-linked polymer, Quaternary amine, Biodegradability, Gene delivery In recent

  2. Independent Study in Idaho ISI Course BSU Course NOTES

    E-Print Network [OSTI]

    Barrash, Warren

    Independent Study in Idaho ISI Course BSU Course NOTES Updated 03/2012 Boise State University Administration #12;Independent Study in Idaho ISI Course BSU Course NOTES Updated 03/2012 Boise State University

  3. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  4. NERSC Users Group Meeting February 22, 2001 Notes for Greenbook Process

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key RoleHome »PresentationsNotes

  5. NERSC Users Group Meeting June 25-26, 1996 Notes and Action Items

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed KeyPresentationsAttendeeNotes and

  6. COMPLETE CULTIVATION BPG NOTE 13 Best Practice Guidance

    E-Print Network [OSTI]

    tipping method, which is detailed in BPG Note 4: Loose tipping. However, there is a legacy of brownfield

  7. EndNote X6 Basics For Windows

    E-Print Network [OSTI]

    will need to choose between two installation types ­ Typical or Custom. If you choose Typical, you EndNote: Opening or creating an EndNote Library Adding bibliographic references or citations to your library Using EndNote with Microsoft Word to organize research papers, insert references using Cite While

  8. Extension Note Research Disciplines: Ecology ~ Geology ~ Geomorphology ~ Hydrology ~ Pedology ~ Silviculture ~

    E-Print Network [OSTI]

    Extension Note Research Disciplines: Ecology ~ Geology ~ Geomorphology ~ Hydrology ~ Pedology,Tsitika Watershed.Research Section,CoastForest Region,BCMOF, Nanaimo, BC. Extension Note EN-021. EN-021 Hydrology ~ Geomorphology ~ Hydrology ~ Pedology ~ Silviculture ~ Wildlife Extension Note EN-021 March 2006 Forest Research

  9. Nolij Corporation Proprietary & Confidential Information Release Notes for Nolij Web

    E-Print Network [OSTI]

    Escher, Christine

    Nolij Corporation Proprietary & Confidential Information Release Notes for Nolij Web Release 6.3.x Web Release 6.3.x Copyright © 2010 - 2011, Nolij Corporation. All rights reserved. Revised 02Release Notes for Nolij Web Release 6.3.x Introduction These release notes provide information about new

  10. Energy Performance Indicator | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Energy Performance Indicator Energy Performance Indicator April 17, 2014 - 10:57am Addthis The EnPI V3.0 is a regression analysis based tool developed by the U.S. Department of...

  11. LLW notes. Vol. 11, No. 1

    SciTech Connect (OSTI)

    NONE

    1996-02-01T23:59:59.000Z

    `LLW Notes` is distributed by Afton Associates, Inc. to Low-Level Radioactive Waste Forum Participants and other state and compact officials identified by those Participants to receive `LLW Notes`. The Low-Level Radioactive Waste Forum (LLW Forum) is an association of state and compact representatives, appointed by governors and compact commissions, established to facilitate state and compact implementation of the Low-Level Radioactive Waste Policy Act of 1980 and the Low-Level Radioactive Waste Policy Amendments Act of 1985 and to promote the objectives of low-level radioactive waste regional compacts. The LLW Forum provides an opportunity for state and compact officials to share information with one another and to exchange views with officials of federal agencies and other interested parties.

  12. Notes 16. Analysis of tilting pad bearings

    E-Print Network [OSTI]

    San Andres, Luis

    2010-01-01T23:59:59.000Z

    NOTES 16. STATIC AND DYNAMIC FORCED PERFORMANCE OF TILTING PAD BEARINGS: ANALYSIS INCLUDING PIVOT STIFFNESS Dr. Luis San Andr?s Mast-Childs Professor August 2010 SUMMARY Work in progress ? still a lot of be done Introduction... Figure 1 shows a tilting pad journal bearing comprised of four pads. Each pad tilts about its pivot making a hydrodynamic film that generates a pressure reacting to the static load applied on the spinning journal. This type of bearing is typically...

  13. Advanced Analysis: Skeleton notes 1. Fourier Theory

    E-Print Network [OSTI]

    Davies, Christopher

    Advanced Analysis: Skeleton notes 1. Fourier Theory The Fourier series of a function f() on [-, ] is - anein , where an = an(f) = 1 2 - f()e-in d. The Fourier transform of a function f(x) on R is the function ^f() = 1 2 - f(x)e-ix dx, and the Fourier inversion formula is f(x) = - f()eix d. One circle

  14. Notes on Black Hole Fluctuations and Backreaction

    E-Print Network [OSTI]

    B. L. Hu; Alpan Raval; Sukanya Sinha

    1999-01-05T23:59:59.000Z

    In these notes we prepare the ground for a systematic investigation into the issues of black hole fluctuations and backreaction by discussing the formulation of the problem, commenting on possible advantages and shortcomings of existing works, and introducing our own approach via a stochastic semiclassical theory of gravity based on the Einstein-Langevin equation and the fluctuation-dissipation relation for a self-consistent description of metric fluctuations and dissipative dynamics of the black hole with backreaction of its Hawking radiance.

  15. NOTE: Required questions apply to all laboratories. Optional questions, indicated with "N", are dependent on the PI's safety profile.

    E-Print Network [OSTI]

    Shull, Kenneth R.

    hazard,locations and workers on the profile is current. Registrations for lasers, radioactive materials in the chemical inventory. Safety Data Sheets (SDS) for all hazardous chemicals are accessible to all personnel where no skin is exposed, use a lab coat or other protective clothing when working with hazardous

  16. PROGRAMME N.B.: The language of the title indicates the language of teaching. Please note that this

    E-Print Network [OSTI]

    van der Torre, Leon

    Mi- Septembre à Mi-octobre 1. Présentation générale CM 2 hrs J.Gerkrath/H 20 hrs J. Kaprilian/A. Morini /C. Micheau 3. Un ordre juridique à and General Principles of Law in the implementation of EU law Période : mi

  17. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  18. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  19. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  20. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  1. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  2. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  3. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  4. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  5. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  6. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  7. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  8. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  9. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  10. Energy Performance Indicator Tool | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube|6721 FederalTexas Energy Incentive Programs,EnergyAugust 10,Install

  11. Extension Note Research Disciplines: Ecology ~ Geology ~ Geomorphology ~ Hydrology ~ Pedology ~ Silviculture ~ Wildlife

    E-Print Network [OSTI]

    Extension Note Research Disciplines: Ecology ~ Geology ~ Geomorphology ~ Hydrology ~ Pedology: Ecology ~ Geology ~ Geomorphology ~ Hydrology ~ Pedology ~ Silviculture ~ Wildlife Extension Note EN-007

  12. Extension Note Research Disciplines: Ecology ~ Geology ~ Geomorphology ~ Hydrology ~ Pedology ~ Silviculture ~ Wildlife

    E-Print Network [OSTI]

    Extension Note Research Disciplines: Ecology ~ Geology ~ Geomorphology ~ Hydrology ~ Pedology Disciplines: Ecology ~ Geology ~ Geomorphology ~ Hydrology ~ Pedology ~ Silviculture ~ Wildlife Extension Note

  13. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  14. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  15. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  16. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  17. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  18. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  19. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  20. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  1. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  2. Core Indicators for Determinants and Performance of Electricity Sector in Developing Countries

    E-Print Network [OSTI]

    Jamasb, Tooraj; Newbery, David; Pollitt, Michael G.

    2004-07-08T23:59:59.000Z

    .g. IADB, 2001; Joskow, 1998; Newbery, 2002): i. Corporatisation of state-owned utilities; ii. Enactment of an electricity reform law; iii. Regulatory reform, including adoption of incentive regulation for the natural monopoly network activities; iv... to the components of our reform model are the key reform steps implemented (Table II), resource mix and endowments indicators (Table I), and country-level indicators (Table VII). iv. Incentive regulation and privatization improve cost and technical efficiency...

  3. A Review of Loss Mechanisms and Key Design Choices for High Intensity Hadron Rings

    SciTech Connect (OSTI)

    Warsop, C.M. [Rutherford Appleton Laboratory, Oxfordshire (United Kingdom)

    2005-06-08T23:59:59.000Z

    The peak performance reached in a high intensity ring is closely related to the ability to minimise and control beam loss. The need to increase intensity has to be balanced against possible increased induction of radioactivity and the risk of interrupted operations. Losses are dependent on many factors and influence most aspects of machine design. In principle, only one aspect of low loss design needs to be sub-optimal to impose severe intensity limitations. Here, an outline is given of the key factors that need to be considered, focussing primarily on low to medium energy proton machines. Topics include space charge, instabilities, electron effects, injection and main lattice choices. Finally, we note that major progress has been made in refining low loss designs but there is still important work to be done in predicting loss levels and distributions in detail.

  4. Comparison of algorithms for computing infinite structural indices of polynomial matrices

    E-Print Network [OSTI]

    Henrion, Didier

    be viewed as a competitive alternative to the well-known state-space pencil matrix algorithm for obtaining of polynomial matrices play a key role when solving e.g. multivariable decoupling control problems examples and a full com- putational complexity analysis indicate that the Toeplitz al- gorithm can

  5. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  6. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  7. Notes 04. Elements of analytical dynamics.

    E-Print Network [OSTI]

    San Andres, Luis

    2008-01-01T23:59:59.000Z

    T is 1 11 1 111 1 2 1 2 1 2 1 2 N ii i i Nn n ii ii ir s ir s rs Nnn n ii i i ii irss irs s rs s mr r m tt m ttt T rr rr qq rr r r rr Tqqq qq q = == = === = ? ???? ???? ++ ???? ???? ?? ?? ?? ++? ?? ?? == ?? ?? ? ????? = ? ? ?? ? ??? ? #0;G#0;G #0... with the directions of the generalized displacements, thus () 11 2 2 1 .... n nc n n s s s WQqQq Qq Qq? ?? ? ? = =++ ? (41) Note that the generalized force Q k may NOT need to actually represent a force or a moment. However, the product Q k ?q k MUST...

  8. ConsumTechNotes2012.vp

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Year-0E (2001)gasoline prices4Consumption TheX I AConsumptionNote: The

  9. ConsumTechNotes2012.vp

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Year-0E (2001)gasoline prices4Consumption TheX I AConsumptionNote:

  10. ConsumTechNotes2012.vp

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Year-0E (2001)gasoline prices4Consumption TheX I AConsumptionNote:

  11. Property:ExplorationNotes | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation,PillarPublicationTypeEstimatedCostMedianUSDExplorationNotes Jump to: navigation,

  12. Manhattan Project: A Note on Sources

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy, science, and technology-- Energy, science, andD ModelWidgetA NOTE ON

  13. Environ. Impact Asses. Rev., Vol. 38, Jan. 2013, p. 35-43. Developing an indicator for the chronic health impact

    E-Print Network [OSTI]

    Boyer, Edmond

    of this study is to develop an emission based indicator for the health impact of the air pollution caused and reliability. Key words: Health impact, indicator, air pollution, traffic-related emissions 1. Introduction health impact of traffic-related pollutant emissions Véronique Lépicier a , Mireille Chiron b, 1 , Robert

  14. FieldIndicators of Hydric Soils

    E-Print Network [OSTI]

    Gray, Matthew

    Soils, Version 5.01, 2003 Natural Resources Conservation Service Wetland Science Institute Soil on the right has mucky peat (hemic soil material) to a depth of about 8 cm. If indicator S2 (2.5 cm mucky peat or peat) or indicator S3 (5 cm mucky peat or peat) is not a concern, morphologies below 8 cm would

  15. Approximating Power Indices --Theoretical and Empirical Analysis

    E-Print Network [OSTI]

    Rosenschein, Jeff

    , by providing lower bounds for both deter- ministic and randomized algorithms for calculating power indices. WeApproximating Power Indices -- Theoretical and Empirical Analysis Yoram Bachrach School and Computer Science, The Hebrew University, Jerusalem, Israel Amin Saberi Department of Management Science

  16. Tyndall Briefing Note No. 35 Tyndall Briefing Note No. 35 April 2009

    E-Print Network [OSTI]

    Watson, Andrew

    of East Anglia This Briefing Note is the first in a series of opinion pieces from Tyndall Centre The past 50 years: It is undeniable that over the past fifty years, agricultural science and new. The challenge: In coming decades we need to double food production, meet food safety standards, enhance rural

  17. BEG/CEE-UT Think Corner Research Note, June 2012, 1 Think Corner Research Note

    E-Print Network [OSTI]

    Texas at Austin, University of

    : Analysis based on U.S. EIA regional data. #12;© BEG/CEE-UT Think Corner Research Note, 18 May 2012, 2 Two natural gas production. Our methodology is a "top down" approach based on corporate financial reports periodic tracking as well as extension and expansion of our producer survey. 2 1 Foss, M.M., M. Wainberg

  18. Queer as 2 Three Pound Notes #2

    E-Print Network [OSTI]

    Multiple Contributors

    1991-01-01T23:59:59.000Z

    ?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3 TWO ?3 NOTES ?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3 ?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3 Issue Number Two in the BENT COPPERS Series ?3?3?3...?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3 ?AS ?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3 ?3?3?3 ?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?AS TWO ?3 NOTES?3?3?3...

  19. Dr. T.P. Clement CE 3010 class notes

    E-Print Network [OSTI]

    Clement, Prabhakar

    8/15/2011 1 Dr. T.P. Clement CE 3010 class notes Learning Objectives · Motivation · Basic approach value of the definite integral 2 b a dxxf )( Dr. T.P. Clement CE 3010 class notes Analytical (or exact a dxxf )( Dr. T.P. Clement CE 3010 class notes Trapezoidal Rule F(x) #12;8/15/2011 2 Dr. T.P. Clement CE

  20. Scintillation probe with photomultiplier tube saturation indicator

    DOE Patents [OSTI]

    Ruch, Jeffrey F. (Bethel Park, PA); Urban, David J. (Glassport, PA)

    1996-01-01T23:59:59.000Z

    A photomultiplier tube saturation indicator is formed by supplying a supplemental light source, typically an light emitting diode (LED), adjacent to the photomultiplier tube. A switch allows the light source to be activated. The light is forwarded to the photomultiplier tube by an optical fiber. If the probe is properly light tight, then a meter attached to the indicator will register the light from the LED. If the probe is no longer light tight, and the saturation indicator is saturated, no signal will be registered when the LED is activated.

  1. Redshift indicators for gamma-ray bursts

    E-Print Network [OSTI]

    J-L. Atteia

    2005-05-04T23:59:59.000Z

    The measure of the distances and luminosities of gamma-ray bursts (GRBs) led to the discovery that many GRB properties are strongly correlated with their intrinsic luminosity, leading to the construction of reliable luminosity indicators. These GRB luminosity indicators have quickly found applications, like the construction of 'pseudo-redshifts', or the measure of luminosity distances, which can be computed independently of the measure of the redshift. In this contribution I discuss various issues connected with the construction of luminosity-redshift indicators for gamma-ray bursts.

  2. Optimization Online - Note: Optimal non-homogeneous composites ...

    E-Print Network [OSTI]

    Tavakoli Rouhollah

    2012-08-29T23:59:59.000Z

    Aug 29, 2012 ... Note: Optimal non-homogeneous composites for dynamic loading revisited. Tavakoli Rouhollah (rtavakoli ***at*** sharif.ir). Abstract: The ...

  3. A Note on KKT Points of Homogeneous Programs 1'

    E-Print Network [OSTI]

    2005-07-11T23:59:59.000Z

    A Note on KKT Points of Homogeneous Programs 1'. Y. B. Zhao 2 and D. Li 3. Abstract. Homogeneous programming is an important class of optimization ...

  4. A note on complexity of multistage stochastic programs

    E-Print Network [OSTI]

    Marcus de Mendes C. R. Reaiche

    2014-11-20T23:59:59.000Z

    Nov 20, 2014 ... A note on complexity of multistage stochastic programs. Marcus de Mendes C. R. Reaiche(mmcr ***at*** impa.br). Abstract: In Shapiro [2006], ...

  5. Notes 06. Liquid cavitation in fluid film bearings

    E-Print Network [OSTI]

    San Andres, Luis

    2009-01-01T23:59:59.000Z

    NOTES 6. CAVITATION IN LIQUID FILM BEARINGS. Dr. Luis San Andr?s ? 2009 1 NOTES 6. LIQUID CAVITATION IN FLUID FILM BEARINGS Lecture 6 describes the phenomenon of liquid cavitation in steadily loaded fluid film bearings and notes the most... ? Density at Pcav [kg/m 3 ] ? Fluid absolute viscosity [N.s/m 2 ] ? Journal angular speed (rad/s) Subscripts * Inception of the cavitation zone a Ambient value cav Cavitation NOTES 6. CAVITATION IN LIQUID FILM BEARINGS. Dr. Luis San Andr?s ? 2009...

  6. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  7. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  8. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  9. ANNUAL REPORT: INDICATORS OF INSTITUTIONAL QUALITY

    E-Print Network [OSTI]

    Farritor, Shane

    ANNUAL REPORT: INDICATORS OF INSTITUTIONAL QUALITY 2010-2011 #12;2 #12;3 T A B L E O F C O N T E N ................................................................................................................. 5 Quantitative Measures of Quality................................................................................................................... 20 Total Research Expenditures

  10. Benchmarking Sustainability: the use of Indicators

    E-Print Network [OSTI]

    Zaferatos, Nicholas C.

    Benchmarking Sustainability: the use of Indicators Introduction The concept of sustainable development is both very popular and elusive. The overwhelming appeal of sustainability is situated to build a generally shared perception of sustainable development (Butler, 1998). For many people

  11. Off-label indications for imiquimod

    E-Print Network [OSTI]

    Ganjian, Shahrouz; Ourian, Ariel J; Shamtoub, GabrEal; Wu, Jashin J; Murase, Jenny E

    2009-01-01T23:59:59.000Z

    Off-label indications for imiquimod Shahrouz Ganjian 1 ,potential candidate for off-label use in over 60 conditionspotential candidate for off-label use in over 60 conditions

  12. Optical temperature indicator using thermochromic semiconductors

    DOE Patents [OSTI]

    Kronberg, J.W.

    1995-01-01T23:59:59.000Z

    A reversible optical temperature indicator utilizes thermochromic semiconductors which vary in color in response to various temperature levels. The thermochromic material is enclosed in an enamel which provides protection and prevents breakdown at higher temperatures. Cadmium sulfide is the preferred semiconductor material. The indicator may be utilized as a sign or in a striped arrangement to clearly provide a warning to a user. The various color responses provide multiple levels of alarm.

  13. Societal health and urban sustainability indicators

    SciTech Connect (OSTI)

    Petrich, C.H.; Tonn, B.E.

    1996-08-27T23:59:59.000Z

    Without the social will, no city can successfully Undertake the planning and programs necessary for meaningful progress toward sustainability. Social will derives from wellsprings of vital societal health. This paper presents an approach to helping cities in APEC member economies initiate a program for developing indicators of sustainability. Representative indicators of social capital and other aspects of civic engagement, as proxies for societal health, are presented.

  14. Optical temperature indicator using thermochromic semiconductors

    DOE Patents [OSTI]

    Kronberg, James W. (108 Independent Blvd., Aiken, SC 29801)

    1996-01-01T23:59:59.000Z

    A reversible optical temperature indicator utilizes thermochromic semiconductors which vary in color in response to various temperature levels. The thermochromic material is enclosed in an enamel which provides protection and prevents breakdown at higher temperatures. Cadmium sulfide is the preferred semiconductor material. The indicator may be utilized as a sign or in a striped arrangement to clearly provide a warning to a user. The various color responses provide multiple levels of alarm.

  15. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  16. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  17. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  18. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  19. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  20. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  1. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  2. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  3. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  4. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  5. Queer As a Three Pound Note #1 

    E-Print Network [OSTI]

    Multiple Contributors

    1991-01-01T23:59:59.000Z

    -Type text/plain; charset=ISO-8859-1 ?AS A ?3 N O TE ?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3 ?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3 ?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3 Issue Number One in the BENT COPPERS Series A slash... upon or conflict with other holders of copyrights. No reprints of any type are permitted without express, written permission of the publisher and individual contributors involved. 2 ?3?3?3 ?3?3?3 ?As a ?3 Note?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3?3...

  6. BRIEFING NOTE SUMMARY OF MATTERS CONSIDERED BY THE MANAGEMENT BOARD

    E-Print Network [OSTI]

    Report. Members briefly discussed the issue of the management of capital works, noting the success projects were that: a. While much of the work of project management could be outsourced, each project1 BRIEFING NOTE SUMMARY OF MATTERS CONSIDERED BY THE MANAGEMENT BOARD ON FRIDAY, 28 APRIL 2006

  7. Technical Note Variational free energy and the Laplace approximation

    E-Print Network [OSTI]

    Daunizeau, Jean

    Technical Note Variational free energy and the Laplace approximation Karl Friston,a, Jérémie October 2006 This note derives the variational free energy under the Laplace approximation, with a focus. This is relevant when using the free energy as an approximation to the log-evidence in Bayesian model averaging

  8. Extension Note Research Disciplines: Ecology ~ Geology ~ Geomorphology ~ Hydrology ~ Pedology ~ Silviculture ~

    E-Print Network [OSTI]

    Extension Note Research Disciplines: Ecology ~ Geology ~ Geomorphology ~ Hydrology ~ Pedology Hudson and Axel Anderson KEYWORDS: Water management, Coastal watersheds, hydrological modeling CITATIONPractice. ResearchSection,Coast ForestRegion, BCMOF,Nanaimo, BC. Extension Note EN-022. EN-022 Hydrology March 2006

  9. Dr. T.P. Clement CE 3010 class notes

    E-Print Network [OSTI]

    Clement, Prabhakar

    1 Dr. T.P. Clement CE 3010 class notes Quotes · Genius is 1 percent inspiration and 99 percent in little things. Excellence is not an exception, it is a prevailing attitude Colin Powell 1 Dr. T.P · Combining conditions · Loops · Examples 2 Dr. T.P. Clement CE 3010 class notes Program to Find Real Roots

  10. 1 ACIT Meeting Notes Advisory Committee for Information Technology

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    1 ACIT Meeting Notes Advisory Committee for Information Technology Meeting Notes MEETING DATE: 11. There was less emphasis on technology and more on communication and governance structure. Mary will respond as the biggest issues in next few years. Feedback included: Mobility and mobile computing (already behind curve

  11. APPLICATION OF SEWAGE SLUDGES AND COMPOSTS BPG NOTE 6

    E-Print Network [OSTI]

    APPLICATION OF SEWAGE SLUDGES AND COMPOSTS BPG NOTE 6 Best Practice Guidance for Land Regeneration harmful organisms (plant, animal and human pathogens) in insufficiently composted materials · If C NOTE 6 PAGE 2 Applications of sewage sludges and composts Forestry Tree growth on nutrient

  12. 1 ACIT Meeting Notes Advisory Committee for Information Technology

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    1 ACIT Meeting Notes Advisory Committee for Information Technology Meeting Notes MEETING DATE: 11 compiling a timeline highlighting changes in the world of technology at large, as well as UCSC-specific. The committee reflected on how far technology has come (examples below). Netscape, punch cards, modem, PDP II

  13. 1 ACIT Meeting Notes Advisory Committee for Information Technology

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    1 ACIT Meeting Notes Advisory Committee for Information Technology Meeting Notes MEETING DATE: 12. Larrabee] Tracy Larrabee presented on her use of technology in the classroom. Her experience has been that there is the same face time and interaction as in-class education, and technology only enriches the learning

  14. DA NE TECHNICAL NOTE INFN -LNF, Accelerator Division

    E-Print Network [OSTI]

    Istituto Nazionale di Fisica Nucleare (INFN)

    K K DA NE TECHNICAL NOTE INFN - LNF, Accelerator Division Frascati, Sept. 2, 1991 Note: G-7 ENERGY LOSS DUE TO THE BROAD-BAND IMPEDANCE IN DA NE L. Palumbo, M. Serio 1. INTRODUCTION The Broad-Band (BB to simplify the evaluation of single-bunch instability thresholds and parasitic losses [1]. Lacking detailed

  15. TECHNICAL NOTES Drought Storage Allocation Rules for Surface

    E-Print Network [OSTI]

    Pasternack, Gregory B.

    TECHNICAL NOTES Drought Storage Allocation Rules for Surface Reservoir Systems Jay R. Lund1 Abstract: This technical note develops a simple drought storage allocation rule to minimize evaporative and seepage water losses from a system of reservoirs. Such a rule might have value during a prolonged drought

  16. DA NE TECHNICAL NOTE INFN -LNF, Accelerator Division

    E-Print Network [OSTI]

    Istituto Nazionale di Fisica Nucleare (INFN)

    K K DA NE TECHNICAL NOTE INFN - LNF, Accelerator Division Frascati, Sept. 2, 1991 Note: G-8 RF AND RESISTIVE ENERGY LOSS IN THE INTERACTION REGION VACUUM CHAMBER S. Bartalucci, L. Palumbo, M. Serio, B-section variation leads to sub- stantial energy losses localized in the IR vacuum chamber even if the steps in cross

  17. DA NE TECHNICAL NOTE INFN -LNF, Accelerator Division

    E-Print Network [OSTI]

    Istituto Nazionale di Fisica Nucleare (INFN)

    K K DA NE TECHNICAL NOTE INFN - LNF, Accelerator Division Frascati, April 6, 1992 Note: G-13 RF ENERGY LOSSES AND IMPEDANCE OF THE DA NE ACCUMULATOR RING VACUUM CHAMBER S. Bartalucci, L. Palumbo, M chamber. This field acts back on the beam and it is re- sponsible for energy losses and instabilities. We

  18. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  19. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  20. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  1. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  2. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  3. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  4. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  5. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  6. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  7. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  8. Performance indicators for first quarter CY 1994

    SciTech Connect (OSTI)

    Not Available

    1994-11-01T23:59:59.000Z

    The Department of Energy (DOE) has established a Department-Wide Performance Indicator (PI) Program for trending and analysis of operational data as directed by DOE Order 5480.26. The PI Program was established to provide a means for monitoring the environment safety, and health (ES&H) performance of the DOE at the Secretary and other management levels. This is the thirteenth in a series of quarterly reports generated for the Department of Energy Idaho Operations Office (DOE-ID) by EG&G Idaho, Inc., to meet the requirements of the PI Program as directed by the DOE Standard (DOE-STD-1048-92). The report format and content adhere to the guidelines established In DOE Order 5480.26, Trending and Analysis of Operations Information Using Performance Indicators, and DOE-STD-1048-92, DOE Peformance Indicators Guidance Document.

  9. State of charge indicators for a battery

    DOE Patents [OSTI]

    Rouhani, S. Zia (Idaho Falls, ID)

    1999-01-01T23:59:59.000Z

    The present invention relates to state of charge indicators for a battery. One aspect of the present invention utilizes expansion and contraction displacements of an electrode plate of a battery to gauge the state of charge in the battery. One embodiment of a battery of the present invention includes an anodic plate; a cathodic plate; an electrolyte in contact with the anodic and cathodic plates; plural terminals individually coupled with one of the anodic and cathodic plates; a separator intermediate the anodic and cathodic plates; an indicator configured to indicate an energy level of the battery responsive to movement of the separator; and a casing configured to house the anodic and cathodic plates, electrolyte, and separator.

  10. Lanthanide-halide based humidity indicators

    DOE Patents [OSTI]

    Beitz, James V. (Hinsdale, IL); Williams, Clayton W. (Chicago, IL)

    2008-01-01T23:59:59.000Z

    The present invention discloses a lanthanide-halide based humidity indicator and method of producing such indicator. The color of the present invention indicates the humidity of an atmosphere to which it is exposed. For example, impregnating an adsorbent support such as silica gel with an aqueous solution of the europium-containing reagent solution described herein, and dehydrating the support to dryness forms a substance with a yellow color. When this substance is exposed to a humid atmosphere the water vapor from the air is adsorbed into the coating on the pore surface of the silica gel. As the water content of the coating increases, the visual color of the coated silica gel changes from yellow to white. The color change is due to the water combining with the lanthanide-halide complex on the pores of the gel.

  11. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  12. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  13. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  14. Proportional structural effects of formative indicators

    E-Print Network [OSTI]

    Franke, George R.; Preacher, Kristopher J.; Rigdon, Ed E.

    2009-03-15T23:59:59.000Z

    : an application to the motion picture industry. J Acad Mark Sci 2006;34(Fall):559–75. Howell RD, Breivik E, Wilcox JB. Is formative measurement really mea- surement? Reply to Bollen (2007) and Bagozzi (2007). Psychol Methods 2007;12(December):238–45. Jarvis CB... and Winklhofer, 2001; Edwards and Bagozzi, 2000; Jarvis et al., 2003; Petter et al., 2007). Some criteria deal with constructs and indicators in isolation from other constructs. For example, reflective indicators of a unidimensional construct manifest the same...

  15. Plasma gun notes Here are some notes based on an idea of Paul Bellan's (see his Spheromak

    E-Print Network [OSTI]

    Brown, Michael R.

    Plasma gun notes Here are some notes based on an idea of Paul Bellan's (see his Spheromak book end C. L is an inductance per unit length and L0 is the inductance of the system before the spheromak starts to move. The spheromak is a sliding short of mass m impaled on the center electrode. The potential

  16. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions Key Terms

  17. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions Key TermsCrude

  18. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions Key TermsCrudeAPI

  19. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions Key

  20. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions KeyReceipts by

  1. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions KeyReceipts

  2. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksAreaChargeInput Definitions Key

  3. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputs & Utilization Definitions Key

  4. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputsTotal Stocks Definitions Key Terms

  5. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputsTotal Stocks Definitions Key

  6. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputsTotal Stocks Definitions KeyPrices,

  7. Watch for the red dot indicating

    E-Print Network [OSTI]

    > http:// > Watch for the red dot indicating expanded stories online sdm.mit.edu/pulse continued its facilities by constructing the European Extremely Large Telescope (E-ELT) on a mountain in Chile isolated from the grid. The planned construction of the E-ELT and the challenges faced by the current

  8. The Scottish Forestry Strategy Description of indicators

    E-Print Network [OSTI]

    The Scottish Forestry Strategy Description of indicators Updated December 2011 1 #12;T h e S c o of wood energy plant (in megawatt thermal and electrical) Number of non-domestic, wood fuelled energy sector Forecast wood availability from the national forest estate Timber's contribution to Scottish Value

  9. Eco-innovation indicators European Environment Agency

    E-Print Network [OSTI]

    Eco-innovation indicators European Environment Agency Copenhagen, February 2006 #12;Page 2 consisted of Timo Mäkelä, DG Environment, Pierre Valette, DG Research, and Björn Stigson World Business measure the progress made in implementing the Environment Technology Action Plan. Currently, the field

  10. Vegetation Indices to Aid Areal Evapotranspiration Estimations

    E-Print Network [OSTI]

    Szilagyi, Jozsef

    Vegetation Indices to Aid Areal Evapotranspiration Estimations Jozsef Szilagyi1 Abstract: Multiyear Seevers and Ottmann 1994; Nicholson et al. 1996; Sz- ilagyi et al. 1998; Szilagyi and Parlange 1999; Szilagyi 2000 . Different authors drew differing conclusions about the appli- cability of NDVI to estimate

  11. Oxygen Detection via Nanoscale Optical Indicators

    E-Print Network [OSTI]

    Ghosh, Ruby N.

    Oxygen Detection via Nanoscale Optical Indicators Ruby N. Ghosh Dept. of Physics Michigan State University East Lansing, MI, USA weekschr@msu.edu Abstract--Oxygen plays a ubiquitous role in terrestrial developed an optical technique for monitoring oxygen in both gas and liquid phases utilizing nanoscale metal

  12. Indicators of recent environmental change in Alaska

    SciTech Connect (OSTI)

    Jacoby, G.C.; D`Arrigo, R.D.; Juday, G.

    1997-12-31T23:59:59.000Z

    Climate models predict that global warming due to the effects of increasing trace gases will be amplified in northern high latitude regions, including Alaska. Several environmental indicators, including tree-ring based temperature reconstructions, borcal forest growth measurements and observations of glacial retreat all indicate that the general warming of the past century has been significant relative to prior centuries to millenia. The tree-ring records for central and northern Alaska indicate that annual temperature increased over the past century, peaked in the 1940s, and are still near the highest level for the past three centuries (Jacoby and D`Arrigo 1995). The tree-ring analyses also suggest that drought stress may now be a factor limiting growth at many northern sites. The recent warming combined with drier years may be altering the response of tree growth to climate and raising the likelihood of forest changes in Alaska and other boreal forests. Other tree-ring and forest data from southern and interior Alaska provide indices of the response of vegetation to extreme events (e.g., insect outbreaks, snow events) in Alaska (Juday and marler 1996). Historical maps, field measurements and satellite imagery indicate that Alaskan glaciers have receded over the past century (e.g., Hall and Benson 1996). Severe outbreaks of bark beetles may be on the increase due to warming, which can shorten their reproductive cycle. Such data and understanding of causes are useful for policy makers and others interested in evaluation of possible impacts of trace-gas induced warming and environmental change in the United States.

  13. BNL ALARA Center: ALARA Notes, No. 9

    SciTech Connect (OSTI)

    Khan, T.A.; Xie, J.W.; Beckman, M.C. [eds.] [and others

    1994-02-01T23:59:59.000Z

    This issue of the Brookhaven National Laboratory`s Alara Notes includes the agenda for the Third International Workshop on ALARA and specific instructions on the use of the on-line fax-on-demand service provided by BNL. Other topics included in this issue are: (1) A discussion of low-level discharges from Canadian nuclear plants, (2) Safety issues at French nuclear plants, (3) Acoustic emission as a means of leak detection, (4) Replacement of steam generators at Doel-3, Beaznau, and North Anna-1, (5) Remote handling equipment at Bruce, (6) EPRI`s low level waste program, (7) Radiation protection during concrete repairs at Savannah River, (8) Reactor vessel stud removal/repair at Comanche Peak-1, (9) Rework of reactor coolant pump motors, (10) Restoration of service water at North Anna-1 and -2, (11) Steam generator tubing problems at Mihama-1, (12) Full system decontamination at Indian Point-2, (13) Chemical decontamination at Browns Ferry-2, and (14) Inspection methodolody in France and Japan.

  14. INDICE INDEX IMAGEN DE LA PORTADA

    E-Print Network [OSTI]

    Rutten, Rob

    #12;CCI 2006 2 INDICE INDEX IMAGEN DE LA PORTADA La imagen solar de la portada de este año fue imagen adjunta de la Tierra indica la escala. Esta línea se genera en la alta cromosfera del Sol, una magnético formando lazos. La imagen muestra la complejidad de los fenómenos observados en la línea H

  15. National Climate Assessment Indicators: Background, Development, & Examples

    SciTech Connect (OSTI)

    Janetos, Anthony C.; Chen, Robert; Arndt, Deke; Kenney, Melissa A.; Abbasi, Daniel; Armstrong, Tom; Bartuska, Ann; Blair, Maria; Buizer, Jim; Dietz, Tom; Easterling, Dave; Kaye, Jack; Kolian, Michael; McGeehin, Michael; O'Connor, Robert; Pulwarty, Roger; Running, Steve; Schmalensee, Dick; Webb, Robert; Weltzin, Jake; Baptista, Sandra; Enquist, Carolyn A.; Janetos, Anthony C.; Chen, Robert; Arndt, Deke; Hatfield, Jerry; Hayes, Mark L.; Jones, K. Burce; McNutt, Chad; Meier, Wayne R.; Schwartz, Mark D.; Svoboda, Mark

    2012-02-28T23:59:59.000Z

    Indicators are usually thought of as measurements or calculations that represent important features of the status, trend, or performance of a system of interest (e.g. the economy, agriculture, air quality). They are often used for the most practical of reasons – one cannot measure everything important about systems of interest, so there is a practical need to identify major features that can be reported periodically and used to guide both research and decisions (NRC 2000).

  16. Performance indicators for third quarter, CY 1993

    SciTech Connect (OSTI)

    Groh, M.

    1993-12-31T23:59:59.000Z

    The Department of Energy (DOE) has established a Department-wide Performance Indicator (PI) Program for trending and analysis of operational data as directed by DOE Order 5480.26. The Pl Program was established to provide a means for monitoring the environment safety, and health (ES&H) performance of the DOE at the Secretary and other management levels. This is the eleventh in a series of quarterly reports generated for the Department of Energy Idaho Operations Office (DOE-ID) by EG&G Idaho, Inc. The information in this eleventh quarterly report, while contributing to a historical database for supporting future trending analysis, does not at this time provide a sound basis for developing trend-related conclusions. In the future, it is expected that trending and analysis of operational data will enhance the safety culture In both DOE and contractor organizations by providing an early warning of deteriorating environmental, safety, and health conditions. DOE-STD-1048-92 identifies four general areas of Pls. They are: Personnel Safety, Opperational Incidents, Environment, Management. These four areas have been subdivided into 28 performance indicators. Approximately 115 performance indicator control and distribution charts comprise the body of this report. A brief summary of Pls contained in each of these general areas is provided in each of these general areas is provided.

  17. Constraining the Braking Indices of Magnetars

    E-Print Network [OSTI]

    Gao, Z F; Wang, N; Yuan, J P; Peng, Q H; Du, Y J

    2015-01-01T23:59:59.000Z

    Due to the lack of long term pulsed emission in quiescence and the strong timing noise, it is impossible to directly measure the braking index $n$ of a magnetar. Based on the estimated ages of their potentially associated supernova remnants (SNRs), we estimate the values of $n$ of nine magnetars with SNRs, and find that they cluster in a range of $1\\sim$41. Six magnetars have smaller braking indices of $13$ for other three magnetars are attributed to the decay of external braking torque, which might be caused by magnetic field decay. We estimate the possible wind luminosities for the magnetars with $13$ within the updated magneto-thermal evolution models. We point out that there could be some connections between the magnetar's anti-glitch event and its braking index, and the magnitude of $n$ should be taken into account when explaining the event. Although the constrained range of the magnetars' braking indices is tentative, our method provides an effective way to constrain the magnetars' braking indices if th...

  18. Pre-convective environmental conditions indicative of non-tornadic severe thunderstorm winds over Southeast Florida 

    E-Print Network [OSTI]

    Wilhelm, Jeffrey Michael

    1987-01-01T23:59:59.000Z

    thunderstorm wind events over Southeast Florida during the period of study. Upper-air data were obtained for several stations on and around the Florida peninsula. These stations include: Key West, Florida (EYW), West Palm Beach, Florida (PBI), Tampa Bay...PRE-CONVECTIVE ENVIRONMENTAL CONDITIONS INDICATIVE OF NON-TORNADIC SEVERE THUNDERSTORM WINDS OVER SOUTHEAST FLORIDA A Thesis by JEFFREY MICHAEL WILHELM Submitted to the Graduate College of Texas ARM University in partial fulfillment...

  19. Environmental effects of dredging. Risk assessment: An overview of the process. Technical note

    SciTech Connect (OSTI)

    Dillon, T.M.; Engler, R.M.

    1991-12-01T23:59:59.000Z

    This technical note provides a nontechnical overview of the risk assessment process. A companion technical note regarding risk assessment terminology will be published in the near future.

  20. BNL/SNS TECHNICAL NOTE M. Kesselman

    E-Print Network [OSTI]

    , indicate the possibility of producing a low droop current transformer ( appropriately for the SNS Ring. A compromise between droop, rise time and transient response may be necessary. 2 will use both FCTs and low droop BCMs to examine bunch characteristics as well as over-all current

  1. DANE TECHNICAL NOTE INFN -LNF, Accelerator Division

    E-Print Network [OSTI]

    Istituto Nazionale di Fisica Nucleare (INFN)

    compounds), a large reduction of these peaks will indicate the end of the treatement. e) A Nitrogen glow will be vented with slight positive dry Nitrogen and sealed until ready to be installed. 2) Vacuum Group has safety problems). We have to study the best solution for our system. 6) Titanium ion pumps. Star-Cell ion

  2. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  3. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  4. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  5. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  6. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  7. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  8. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  9. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  10. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  11. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  12. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  13. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  14. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  15. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  16. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  17. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  18. Performance indicators for public mental healthcare: A systematic international inventory

    E-Print Network [OSTI]

    Lauriks, Steve; Buster, Marcel CA; de Wit, Matty AS; Arah, Onyebuchi A; Klazinga, Niek S

    2012-01-01T23:59:59.000Z

    Lauriks et al. : Performance indicators for public mentaland properties of unique performance indicators for publicOA, Klazinga NS: Performance indicators for public mental

  19. Development of a performance-based industrial energy efficiency indicator for cement manufacturing plants.

    SciTech Connect (OSTI)

    Boyd, G.; Decision and Information Sciences

    2006-07-21T23:59:59.000Z

    Organizations that implement strategic energy management programs have the potential to achieve sustained energy savings if the programs are carried out properly. A key opportunity for achieving energy savings that plant managers can take is to determine an appropriate level of energy performance by comparing the plant performance with that of similar plants in the same industry. Manufacturing plants can set energy efficiency targets by using performance-based indicators. The U.S. Environmental Protection Agency (EPA), through its ENERGY STAR{reg_sign} program, has been developing plant energy performance indicators (EPIs) to encourage a variety of U.S. industries to use energy more efficiently. This report describes work with the cement manufacturing industry to provide a plant-level indicator of energy efficiency for assembly plants that produce a variety of products, including Portland cement and other specialty cement products, in the United States. Consideration is given to the role that performance-based indicators play in motivating change; the steps needed to develop indicators, including interacting with an industry to secure adequate data for an indicator; and the actual application and use of an indicator when complete. How indicators are employed in the EPA's efforts to encourage industries to voluntarily improve their use of energy is discussed as well. The report describes the data and statistical methods used to construct the EPI for cement manufacturing plants. Individual equations are presented, as are the instructions for using them in an associated Excel spreadsheet.

  20. The advanced flame quality indicator system

    SciTech Connect (OSTI)

    Oman, R.; Rossi, M.J.; Calia, V.S.; Davis, F.L.; Rudin, A. [Insight Technologies, Inc., Bohemia, NY (United States)

    1997-09-01T23:59:59.000Z

    By combining oil tank monitoring, systems diagnostics and flame quality monitoring in an affordable system that communicates directly with dealers by telephone modem, Insight Technologies offers new revenue opportunities and the capability for a new order of customer relations to oil dealers. With co-sponsorship from New York State Energy Research and Development Authority, we have incorporated several valuable functions to a new product based on the original Flame Quality Indicator concept licensed from the US DOE`s Brookhaven National Laboratory. The new system is the Advanced Flame Quality Indicator, or AFQI. As before, the AFQI monitors and reports the intensity of the burner flame relative to a calibration established when the burner is set up at AFQI installation. Repairs or adjustments are summoned by late-night outgoing telephone calls when limits are exceeded in either direction, indicating an impending contamination or other malfunction. A independently, a pressure transducer for monitoring oil tank level and filter condition, safety lockout alarms and a temperature monitor; all reporting automatically at instructed intervals via an on-board modem to a central station PC computer (CSC). Firmware on each AFQI unit and Insight-supplied software on the CSC automatically interact to maintain a customer database for an oil dealer, an OEM, or a regional service contractor. In addition to ensuring continuously clean and efficient operation, the AFQI offers the oil industry a new set of immediate payoffs, among which are reduced outages and emergency service calls, shorter service calls from cleaner operation, larger oil delivery drops, the opportunity to stretch service intervals to as along as three years in some cases, new selling features to keep and attract customers, and greatly enhanced customer contact, quality and reliability.

  1. Contaminant modeling. Environmental effects of dredging. Technical note

    SciTech Connect (OSTI)

    Bird, S.L.; Dortch, M.

    1988-03-01T23:59:59.000Z

    This note provides initial information on contaminant models that are potentially applicable to situations where the presence of toxic materials in sediments complicates Corps of Engineers (CE) dredging activities.

  2. Quantum theory of gravitational collapse (lecture notes on quantum conchology)

    E-Print Network [OSTI]

    Petr Hajicek

    2002-04-15T23:59:59.000Z

    Preliminary version No.~2 of the lecture notes for the talk ``Quantum theory of gravitational collapse'' given at the 271. WE-Heraeus-Seminar ``Aspects of Quantum Gravity'' at Bad Honnef, 25 February--1 March 2002

  3. HMSC Sustainability Committee 11/8/06 Meeting Notes

    E-Print Network [OSTI]

    HMSC Sustainability Committee 11/8/06 Meeting Notes Brandon Trelstad, Coordinator of OSU sustainability group, gave a presentation highlighting sustainability initiatives at OSU, including: · new Kelley survey showing support for increase in student fees to pay for sustainability investments

  4. analysis working note: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    two telescope systems. Lloyd, Seth 2015-01-01 40 Notes 07. Thermal analysis of finite length journal bearings including fluid inertia Texas A&M University - TxSpace Summary: 1...

  5. Supplementary Notes for Actuarial Mathematics for Life Contingent ...

    E-Print Network [OSTI]

    2011-04-04T23:59:59.000Z

    In this note we aim to provide the additional material required to meet the learning ... 2.3 Deferred Acquisition Expenses and Modified Premium Reserves . . . . . . . . . 13 ...... balance will be deducted from the policyholder's account value. 6

  6. NIST Technical Note 1637 Modeling the Effects of Outdoor Gasoline

    E-Print Network [OSTI]

    Bentz, Dale P.

    Carbon Monoxide Exposures Liangzhu (Leon) Wang Steven J Emmerich #12;NIST Technical Note 1637 Modeling Steven J Emmerich Building Environment Division Building and Fire Research Laboratory August 2009 U

  7. SOFTWARE LOCALIZATION: NOTES ON TECHNOLOGY AND CULTURE Kenneth Keniston

    E-Print Network [OSTI]

    Keniston, Kenneth

    , Technology, and Society at the Massachusetts Institute of Technology. Copyright 1997, Kenneth Keniston. DRAFT in Science, Technology, and Society Massachusetts Institute of Technology Cambridge, Massachusetts 02139SOFTWARE LOCALIZATION: NOTES ON TECHNOLOGY AND CULTURE Kenneth Keniston Kenneth Keniston is Andrew

  8. A note on unbounded on/off constraints

    E-Print Network [OSTI]

    H. Hijazi, L. Liberti

    2014-11-12T23:59:59.000Z

    a NICTA - 7 London Circuit - Canberra ACT 2601 Australia ... This note presents a theoretical analysis of disjunctive constraints featuring ... In mixed-integer linear programming, years of research have been devoted to study disjunctive.

  9. Supplementary notes for Math 265 on complex eigenvalues ...

    E-Print Network [OSTI]

    1998-11-30T23:59:59.000Z

    is the topic of these notes. 2) A does not have enough eigenvectors (we cannot pick a basis for 2-space consisting of eigenvectors of A). This happens ... Page 2

  10. BIOINFORMATICS APPLICATIONS NOTE Vol. 25 no. 21 2009, pages 28412842

    E-Print Network [OSTI]

    and Computational Biology, University of Southern California, Los Angeles, CA and 2Cold Spring Harbor LaboratoryBIOINFORMATICS APPLICATIONS NOTE Vol. 25 no. 21 2009, pages 2841­2842 doi:10.1093/bioinformatics

  11. FIELD TEST OF THE FLAME QUALITY INDICATOR

    SciTech Connect (OSTI)

    Andrew M. Rudin; Thomas Butcher; Henry Troost

    2003-02-04T23:59:59.000Z

    The flame quality indicator concept was developed at BNL specifically to monitor the brightness of the flame in a small oil burner and to provide a ''call for service'' notification when the brightness has changed from its setpoint, either high or low. In prior development work BNL has explored the response of this system to operational upsets such as excess air changes, fouled atomizer nozzles, poor fuel quality, etc. Insight Technologies, Inc. and Honeywell, Inc. have licensed this technology from the U.S. Department of Energy and have been cooperating to develop product offerings which meet industry needs with an optimal combination of function and price. Honeywell has recently completed the development of the Flame Quality Monitor (FQM or Honeywell QS7100F). This is a small module which connects via a serial cable to the burners primary operating control. Primary advantages of this approach are simplicity, cost, and ease of installation. Call-for-service conditions are output in the form of front panel indicator lights and contact closure which can trigger a range of external communication options. Under this project a field test was conducted of the FQM in cooperation with service organizations in Virginia, Pennsylvania, New Jersey, New York, and Connecticut. At total of 83 field sites were included. At each site the FQM was installed in parallel with another embodiment of this concept--the Insight AFQI. The AFQI incorporates a modem and provides the ability to provide detailed information on the trends in the flame quality over the course of the two year test period. The test site population was comprised of 79.5% boilers, 13.7% warm air furnaces, and 6.8% water heaters. Nearly all were of residential size--with firing rates ranging from 0.6 gallons of oil per hour to 1.25. During the course of the test program the monitoring equipment successfully identified problems including: plugged fuel lines, fouled nozzles, collapsed combustion chambers, and poor fuel pump cut-off. Service organizations can use these early indications to reduce problems and service costs. There were also some ''call-for-service'' indications for which problems were not identified. The test program also showed that monitoring of the flame can provide information on burner run times and this can be used to estimate current oversize factors and to determine actual fuel usage, enabling more efficient fuel delivery procedures.

  12. Turbine airfoil with outer wall thickness indicators

    DOE Patents [OSTI]

    Marra, John J; James, Allister W; Merrill, Gary B

    2013-08-06T23:59:59.000Z

    A turbine airfoil usable in a turbine engine and including a depth indicator for determining outer wall blade thickness. The airfoil may include an outer wall having a plurality of grooves in the outer surface of the outer wall. The grooves may have a depth that represents a desired outer surface and wall thickness of the outer wall. The material forming an outer surface of the outer wall may be removed to be flush with an innermost point in each groove, thereby reducing the wall thickness and increasing efficiency. The plurality of grooves may be positioned in a radially outer region of the airfoil proximate to the tip.

  13. Environmental effects of dredging. Managing dredged material via thin-layer disposal in coastal marshes. Technical notes

    SciTech Connect (OSTI)

    Wilber, P.

    1993-07-01T23:59:59.000Z

    This technical note describes how dredged material can be successfully managed in an environmentally sound manner in marshes by placing it in layers of 5 to 15 cm. (Unless otherwise indicated, all layer thicknesses indicated in this report refer to material that has undergone postdisposal consolidation.) Environmental studies of this process and of the regulatory history of thin-layer disposal in marshes are summarized. General planning and monitoring considerations are described, including descriptions of the types of equipment used to place dredged material in thin layers in marshes.

  14. Globular cluster luminosity function as distance indicator

    E-Print Network [OSTI]

    Rejkuba, M

    2012-01-01T23:59:59.000Z

    Globular clusters are among the first objects used to establish the distance scale of the Universe. In the 1970-ies it has been recognized that the differential magnitude distribution of old globular clusters is very similar in different galaxies presenting a peak at M_V ~ -7.5. This peak magnitude of the so-called Globular Cluster Luminosity Function has been then established as a secondary distance indicator. The intrinsic accuracy of the method has been estimated to be of the order of ~0.2 mag, competitive with other distance determination methods. Lately the study of the Globular Cluster Systems has been used more as a tool for galaxy formation and evolution, and less so for distance determinations. Nevertheless, the collection of homogeneous and large datasets with the ACS on board HST presented new insights on the usefulness of the Globular Cluster Luminosity Function as distance indicator. I discuss here recent results based on observational and theoretical studies, which show that this distance indica...

  15. Optical indices of lithiated electrochromic oxides

    SciTech Connect (OSTI)

    Rubin, M.; Rottkay, K. von; Wen, S.J.; Ozer, N.; Slack, J.

    1996-09-01T23:59:59.000Z

    Optical indices have been determined for thin films of several electrochromic oxide materials. One of the most important materials in electrochromic devices, WO{sub 3}, was thoroughly characterized for a range of electrochromic states by sequential injection of Li ions. Another promising material, Li{sub 0.5}Ni{sub 0.5}O, was also studied in detail. Less detailed results are presented for three other common lithium-intercalating electrochromic electrode materials: V{sub 2}O{sub 5}, LiCoO{sub 2}, and CeO{sub 2}-TiO{sub 2}. The films were grown by sputtering, pulsed laser deposition (PLD) and sol-gel techniques. Measurements were made using a combination of variable-angle spectroscopy ellipsometry and spectroradiometry. The optical constants were then extracted using physical and spectral models appropriate to each material. Optical indices of the underlying transparent conductors, determined in separate studies, were fixed in the models of this work. The optical models frequently agree well with independent physical measurements of film structure, particularly surface roughness by atomic force microscopy. Inhomogeneity due to surface roughness, gradient composition, and phase separation are common in both the transparent conductors and electrochromics, resulting sometimes in particularly complex models for these materials. Complete sets of data are presented over the entire solar spectrum for a range of colored states. This data is suitable for prediction of additional optical properties such as oblique transmittance and design of complete electrochromic devices.

  16. Physical security and tamper-indicating devices

    SciTech Connect (OSTI)

    Johnston, R.G.; Garcia, A.R.E.

    1997-02-01T23:59:59.000Z

    Computer systems, electronic communications, digital data, and computer storage media are often highly vulnerable to physical tampering. Tamper-indicating devices, also called security seals, are widely used to detect physical tampering or unauthorized access. We studied 94 different security seals, both passive and electronic, developed either commercially or by the US government. Most of these seals are in wide-spread use, including for critical applications. We learned how to defeat all 94 seals using rapid, inexpensive, low-tech methods. Cost was not a good predictor of seal security. It appears to us that many of these seals can be dramatically improved with minor, low-cost modifications to either the seal or the use protocol.

  17. Non-intrusive refrigerant charge indicator

    DOE Patents [OSTI]

    Mei, Viung C.; Chen, Fang C.; Kweller, Esher

    2005-03-22T23:59:59.000Z

    A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

  18. Research and Creative Activity Resources Administrative units (area code 517, unless noted otherwise)

    E-Print Network [OSTI]

    /commercialization (area code 517, unless noted otherwise) MSU Bioeconomy Institute (Holland, Mich.) 616395 8918 http

  19. "Coarse" Notes Population Genetics OVER-AND UNDERDOMINANCE IN FITNESS; STABILITY

    E-Print Network [OSTI]

    Gomulkiewicz, Richard

    · Overdominance: Sickle cell anemia · Underdominance: chromosomal rearrangements; Rh locus ­ NOTE: Absence of over

  20. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  1. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  2. Congestion Management Requirements, Methods and Performance Indices

    SciTech Connect (OSTI)

    Kirby, B.J.

    2002-08-28T23:59:59.000Z

    Transmission congestion occurs when there is insufficient transmission capacity to simultaneously accommodate all requests for transmission service within a region. Historically, vertically integrated utilities managed this condition by constraining the economic dispatch of generators with the objective of ensuring security and reliability of their own and/or neighboring systems. Electric power industry restructuring has moved generation investment and operations decisions into the competitive market but has left transmission as a communal resource in the regulated environment. This mixing of competitive generation and regulated transmission makes congestion management difficult. The difficulty is compounded by increases in the amount of congestion resulting from increased commercial transactions and the relative decline in the amount of transmission. Transmission capacity, relative to peak load, has been declining in all regions of the U.S. for over a decade. This decline is expected to continue. Congestion management schemes used today have negative impacts on energy markets, such as disruptions and monetary penalties, under some conditions. To mitigate these concerns various congestion management methods have been proposed, including redispatch and curtailment of scheduled energy transmission. In the restructured electric energy industry environment, new congestion management approaches are being developed that strive to achieve the desired degree of reliability while supporting competition in the bulk power market. This report first presents an overview and background on key issues and emerging approaches to congestion management. It goes on to identify and describe policies affecting congestion management that are favored and/or are now being considered by FERC, NERC, and one of the regional reliability councils (WSCC). It reviews the operational procedures in use or proposed by three of the leading independent system operators (ISOs) including ERCOT, California ISO, and PJM. Finally, it presents recommendations for evaluating the competing alternative approaches and developing metrics to use in such evaluations. As with any report concerning electricity restructuring, specific details quickly become dated. Individual utilities, states and regions will inevitably change rules and procedures even during the time it takes to publish a report. Hopefully, the general conclusions are more robust and this report will continue to have value even after some of the specific details have changed.

  3. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  4. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  5. Single, Key Gene Discovery Could Streamline Production of Biofuels |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMay 2015ParentsMiddle|SecurityDepartmentShawn Wang

  6. Energy Storage: The Key to a Reliable, Clean Electricity Supply |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube|6721 FederalTexas Energyof 2005 at Iowa WindUnion7 Peer ReviewEnergy 4

  7. Energy-Intensive Processes Portfolio: Addressing Key Energy Challenges

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube|6721 FederalTexas Energyof 2005 at Iowasecurity isBusinesses and the

  8. June2010KeyEISChart.pdf | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyce Yang5 - 2011

  9. Key Activities of the Geothermal Technologies Office | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyce Kerr-Philpott

  10. Key Opportunities and Challenges for Program Sustainability | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyce Kerr-PhilpottAboutEnergy

  11. Key Publications - Natural Gas Regulation | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyce

  12. Keys to Successful Feedback - John Settle PowerPoint Presentation |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Keyof

  13. Transportation Energy Futures Study: The Key Results and Conclusions

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit withTianlin Baxin Hydropower StationTown ofTownNote-Bangladesh Jump to:Webinar |

  14. Novel tamper-indicating protective devices

    SciTech Connect (OSTI)

    DeVolpi, A.

    1995-07-01T23:59:59.000Z

    Several novel tamper-indicating devices, originally developed under DOE auspices for arms control applications, might be useful in nonproliferation. Some devices that have reached the laboratory prototype stage could provide specialized alternatives to established seals. As locks and cables, the following might be useful: (1) a brittle ceramic lock--impervious to toxic, radiation, and thermal extremes--interrogated for identification and continuity by ultrasonic means, (2) a flexible ceramic-fiber seal that also tolerates severe environments, (3) an ultrasonic smart-material strip seal, and (4) an RF-resonant coaxial cable, verified by radio frequency and microwave signals. To validate the identity of secured surfaces, joints, welds, and fasteners--two techniques are applicable: (1) the scanning electron microscope, which examines three- dimensional micron-level topography, and (2) the plastic-casting fingerprint, a simple low-cost technique, analogous to human fingerprinting. The techniques mentioned above have one or more of the potential advantages of low cost, immediate availability, security for large-area enclosures, application to hazardous environments, usability in the FSU, or suitability for covert use.

  15. Sync your library with EndNote Web Information Services 2 February 2013

    E-Print Network [OSTI]

    Painter, Kevin

    Sync your library with EndNote Web EndNote X6 #12;Information Services 2 February 2013 Introduction When you Sync your EndNote library with your library in EndNoteWeb, the two libraries will be compared, and · references that are in your EndNoteWeb library but not in the desktop library will be sent to your desktop

  16. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  17. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  18. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  19. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  20. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  1. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  2. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  3. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  4. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  5. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  6. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  7. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  8. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  9. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  10. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  11. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  12. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  13. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  14. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  15. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  16. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  17. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  18. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  19. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  20. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  1. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  2. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  3. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  4. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  5. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  6. advanced development note: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    or turbine blade. However, a key factor that limits their wide usage is the high manufacturing cost. In this research, a powder mixing technique, Hosokawa mechano chemical...

  7. Summary Notes from 1 November 2007 Generic Technical Issue Discussion on Removal of Highly Radioactive Radionuclides/Key Radionuclides to the Maximum Extent Practical

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssues DOE's NuclearSpurringSteamDepartment4SuitlandOctober 12, 2011 |

  8. LLW Notes, vol. 9, no. 1. February/March 1994

    SciTech Connect (OSTI)

    NONE

    1994-03-01T23:59:59.000Z

    LLW Notes is published ten times each year and is distributed to Low- Level Radioactive Waste Forum Participants and other state and compact officials identified by those Participants to receive LLW Notes. The Low-Level Radioactive Waste Forum is an association of representatives of states and compacts established to facilitate state and compact commission implementation of the Low-Level Radioactive Waste Policy Amendments Act of 1985 and to promote the objectives of low-level radioactive waste regional compacts. The Forum provides an opportunity for states and compacts to share information with one another and to exchange views with officials of federal agencies.

  9. NERSC Users Group Meeting Nov. 15, 1999 Notes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed NUG 2000 Dates JuneNotes Notes

  10. NERSC Users Group Meeting November 9, 2004 Notes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed NUG 2000 Dates JuneNotesNotes

  11. Computer Simulations Indicate Calcium Carbonate Has a Dense Liquid...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computer Simulations Indicate Calcium Carbonate Has a Dense Liquid Phase Computer Simulations Indicate Calcium Carbonate Has a Dense Liquid Phase Berkeley Lab research could help...

  12. Sustainability Indicators for Discrete Manufacturing Processes Applied to Grinding Technology

    E-Print Network [OSTI]

    Linke, Barbara S.; Corman, Gero J.; Dornfeld, David A.; Tönissen, Stefan

    2013-01-01T23:59:59.000Z

    the data into three sustainability indicators for eachor into one total sustainability indicator. The weighting isAn overview of sustainability assessment methodologies,

  13. Environmental effects of dredging technical notes. Assessment of the genotoxic potential of dredged material. Technical notes

    SciTech Connect (OSTI)

    NONE

    1996-08-01T23:59:59.000Z

    This technical note describes an approach for assessing the genotoxic potential of dredged material. The use of integrated batteries of rapid and mechanistically interpretable in vitro and in vivo assays in a tiered approach is fundamental to applied toxicology. The research described here brings this approach to the testing of sediments. Work completed to date and future work will mesh to form an advanced and cost-effective methodology. The purpose of this methodology is to increase the accuracy of environmental risk assessments and facilitate making decisions concerning open-water disposal of dredged material. A great number of the contaminants typically found in dredged material are toxic to exposed organisms through effects on DNA. Such effects are usually the result of low-level chronic exposures. These effects can result in reproductive failure of organisms, impaired growth and development of offspring, and tumors (often cancerous) in vertebrates. Collectively, such effects are called `genotoxicity` and result from damage to the genome of a cell. The damage is heritable, that is, passed on to future cell generations upon duplication of the affected cells.

  14. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  15. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  16. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  17. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  18. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  19. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  20. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  1. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  2. How to reuse a one-time pad and other notes on authentication, encryption, and protection of quantum information

    SciTech Connect (OSTI)

    Oppenheim, Jonathan [Racah Institute of Theoretical Physics, Hebrew University of Jerusalem, Givat Ram, Jerusalem 91904 (Israel); Institute of Theoretical Physics and Astrophysics, University of Gdansk (Poland); Horodecki, Michal [Institute of Theoretical Physics and Astrophysics, University of Gdansk (Poland)

    2005-10-15T23:59:59.000Z

    Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases. The situation is dramatically different from the classical case: we prove that one can recycle the one-time pad without compromising security. The protocol for recycling relies on detecting whether eavesdropping has occurred, and further relies on the fact that information contained in the encrypted quantum state cannot be fully accessed. We prove the security of recycling rates when authentication of quantum states is accepted, and when it is rejected. We note that recycling schemes respect a general law of cryptography which we introduce relating the size of private keys, sent qubits, and encrypted messages. We discuss applications for encryption of quantum information in light of the resources needed for teleportation. Potential uses include the protection of resources such as entanglement and the memory of quantum computers. We also introduce another application: encrypted secret sharing and find that one can even reuse the private key that is used to encrypt a classical message. In a number of cases, one finds that the amount of private key needed for authentication or protection is smaller than in the general case.

  3. Development of a performance-based industrial energy efficiency indicator for corn refining plants.

    SciTech Connect (OSTI)

    Boyd, G. A.; Decision and Information Sciences; USEPA

    2006-07-31T23:59:59.000Z

    Organizations that implement strategic energy management programs have the potential to achieve sustained energy savings if the programs are carried out properly. A key opportunity for achieving energy savings that plant managers can take is to determine an appropriate level of energy performance by comparing their plant's performance with that of similar plants in the same industry. Manufacturing facilities can set energy efficiency targets by using performance-based indicators. The U.S. Environmental Protection Agency (EPA), through its ENERGY STAR{reg_sign} program, has been developing plant energy performance indicators (EPIs) to encourage a variety of U.S. industries to use energy more efficiently. This report describes work with the corn refining industry to provide a plant-level indicator of energy efficiency for facilities that produce a variety of products--including corn starch, corn oil, animal feed, corn sweeteners, and ethanol--for the paper, food, beverage, and other industries in the United States. Consideration is given to the role that performance-based indicators play in motivating change; the steps needed to develop indicators, including interacting with an industry to secure adequate data for an indicator; and the actual application and use of an indicator when complete. How indicators are employed in the EPA's efforts to encourage industries to voluntarily improve their use of energy is discussed as well. The report describes the data and statistical methods used to construct the EPI for corn refining plants. Individual equations are presented, as are the instructions for using them in an associated Excel spreadsheet.

  4. Energy and Society Week 6 Section Plan GSI Notes

    E-Print Network [OSTI]

    Kammen, Daniel M.

    standard deviations account for about 99 percent of the data. You can also use a Z-table in any stats book. Renewable energy sources like wind and solar PV are intermittent and, by themselves, reduce the reliability1 Energy and Society Week 6 Section Plan ­ GSI Notes AGENDA 1. Get feedback on section from

  5. TESLA 2002-10 CBP Tech Note-268

    E-Print Network [OSTI]

    LCC-0108 TESLA 2002-10 CBP Tech Note-268 Comparison of Emittance Tuning Simulations in the NLC and TESLA Damping Rings A. Wolski LBNL W. Decking DESY November 11th , 2002 Abstract Vertical emittance is a critical issue for future linear collider damping rings. Both NLC and TESLA specify vertical emittance

  6. TECHNICAL NOTES Relation between SaffirSimpson Hurricane

    E-Print Network [OSTI]

    Kareem, Ahsan

    TECHNICAL NOTES Relation between Saffir­Simpson Hurricane Scale Wind Speeds and Peak 3-s Gust Abstract: The Saffir­Simpson scale for categorizing hurricane intensity and damage potential is increasingly being used by hurricane forecasters and emergency managers. The hurricane intensity categories

  7. Oldenburg Lecture Notes in Software Engineering Energy-Efficient Applications

    E-Print Network [OSTI]

    Appelrath, Hans-Jürgen

    Oldenburg Lecture Notes in Software Engineering Energy-Efficient Applications Seminar ­ copyright by authors ­ #12;Introduction Energy-efficiency has become an important issue in information to conserve energy in IT probably is trying to build more efficient hardware. Lots of work has already been

  8. Seasonal restrictions on dredging operations in freshwater systems. Technical note

    SciTech Connect (OSTI)

    Sanders, L.; Killgore, J.

    1989-05-01T23:59:59.000Z

    This note summarizes the status of seasonal restrictions on dredging operations in freshwater navigable waterways. The information presented is based on replies received from a questionnaire sent to all US Army Corps of Engineers (CE) District and Division offices that conduct OM dredging operations in freshwater systems.

  9. These notes are from 2010 Cap and Trade Working Already

    E-Print Network [OSTI]

    Toohey, Darin W.

    Acid Rain These notes are from 2010 #12;Cap and Trade Working Already December 15, 2009 10:14 AM across the country decreased emissions of SO2, a precursor to acid rain, to 7.6 million tons in 2008. #12;Overview of Acid Rain Phenomenon Most common term for acidification of the environment, which can occur

  10. BLUE: An Interactive Visualization System for Categorical Data Technical Note

    E-Print Network [OSTI]

    Kerbs, R. W.

    BLUE: An Interactive Visualization System for Categorical Data Technical Note Robert W. Kerbs. This paper introduces a prototype data visualization system, BLUE, to help induce meaningful decision trees from databases that contain primarily categorical attributes. BLUE is an interactive model creation

  11. Technical Note Correction of Eddy-Current Distortions in Diffusion

    E-Print Network [OSTI]

    Technical Note Correction of Eddy-Current Distortions in Diffusion Tensor Images Using the Known,2 Purpose: To correct eddy-current artifacts in diffusion ten- sor (DT) images without the need to obtain- tortions caused by eddy currents induced by large diffusion gradients. We propose a new postacquisition

  12. Scientific Notes 649 LEPIDOPTERA ASSOCIATED WITH AVOCADO FRUIT IN GUATEMALA

    E-Print Network [OSTI]

    Hoddle, Mark S.

    Scientific Notes 649 LEPIDOPTERA ASSOCIATED WITH AVOCADO FRUIT IN GUATEMALA MARK S. HODDLE1 History, Smithsonian Institution, Washington, DC 20013, U.S.A Avocados (Persea americana Miller) (Lau of Central America (Knight 2002). Humans moved avocados into northern South America by 4000 BC where plants

  13. BRIEFING NOTE SUMMARY OF MATTERS CONSIDERED BY THE MANAGEMENT BOARD

    E-Print Network [OSTI]

    a presentation on utility costs from Mr Roalfe and noted that, because of the increases in global energy costs REPORTS 1. Monthly Reports were received from the Faculty Principals, the Principal of the Business School had been received they would be presented to the Management Board. UTILITY COSTS 9. The Board received

  14. Scientific Notes 693 ASPECTS OF THE FIELD ECOLOGY OF

    E-Print Network [OSTI]

    Hoddle, Mark S.

    Scientific Notes 693 ASPECTS OF THE FIELD ECOLOGY OF STENOMA CATENIFER (LEPIDOPTERA: ELACHISTIDAE drop (Núñez 2008). Heavy infestations of stem-mining larvae can kill twigs and young avocado trees for moving this pest into new areas (Núñez 2008). To better understand the field ecology of S. catenifer

  15. ANOTHER NOTE ON THE DROOP QUOTA AND SVANTE JANSON

    E-Print Network [OSTI]

    Janson, Svante

    ANOTHER NOTE ON THE DROOP QUOTA AND ROUNDING SVANTE JANSON 1. Introduction Consider an election where v votes are cast and there are s seats to be filled. The standard Droop quota, as defined by Henry Droop [1], is v/(s+1) rounded up to the nearest strictly larger integer, i.e., v/(s + 1) + 1

  16. ANOTHER NOTE ON THE DROOP QUOTA AND SVANTE JANSON

    E-Print Network [OSTI]

    Janson, Svante

    ANOTHER NOTE ON THE DROOP QUOTA AND ROUNDING SVANTE JANSON 1. Introduction Consider an election where v votes are cast and there are s seats to be filled. The standard Droop quota, as defined by Henry Droop [1], is v/(s+1) rounded up to the nearest strictly larger integer, i.e., #v/(s + 1)# + 1

  17. A Note on Platt's Probabilistic Outputs for Support Vector Machines

    E-Print Network [OSTI]

    Abu-Mostafa, Yaser S.

    A Note on Platt's Probabilistic Outputs for Support Vector Machines Hsuan-Tien Lin (htlin, National Chengchi University, Taipei 116, Taiwan Abstract. Platt's probabilistic outputs for Support Vector Machines (Platt, 2000) has been popular for applications that require posterior class probabilities

  18. Software Verification and Testing Lecture Notes: Testing I

    E-Print Network [OSTI]

    Struth, Georg

    of Testing Methods dynamic testing: software component is executed with concrete input values (in a realSoftware Verification and Testing Lecture Notes: Testing I #12;Motivation verification: · powerful · automated techniques rather limited testing: (as "poor man's verification") · can only detect presence

  19. Lecture Notes: Support Tree Preconditioners for Laplacian Matrices

    E-Print Network [OSTI]

    Guattery, Steve

    , 1997 Recall that we are considering solving B \\Gamma1 Ax = B \\Gamma1 b using the Preconditioned the generalized definition of Laplacian from Keith Gremban's thesis). This week we will apply this background from Chapters 3 and 4 of Gremban's Ph.D. thesis unless otherwise noted. 1 Goals for Preconditioners We

  20. Laser Safety Training Notes for URI Laser Users

    E-Print Network [OSTI]

    Rhode Island, University of

    ;URI Radiation Safety Office 11 Laser Output · Continuous Wave (steady output) · Pulsed (short time extremely short laser pulses (typically a few nanoseconds in duration). The Q-switch may use a rotatingLaser Safety Training Notes for URI Laser Users #12;URI Radiation Safety Office 2 Laser The word

  1. Technical note Coolant void worth in fast breeder reactors

    E-Print Network [OSTI]

    Technical note Coolant void worth in fast breeder reactors and accelerator-driven transuranium as a function of fuel composition and core geometry for several model fast breeder reactors and accelerator to be inferior to those employing sodium for pitch-to-diameter ratios exceeding 1.4. It is shown that in reactor

  2. Technical Note Variational free energy and the Laplace approximation

    E-Print Network [OSTI]

    Penny, Will

    Technical Note Variational free energy and the Laplace approximation Karl Friston,a, Jérémie the variational free energy under the Laplace approximation, with a focus on accounting for additional model complexity induced by increasing the number of model parameters. This is relevant when using the free energy

  3. Short Notes Taxonomy of the Plethodontid Salamander Genus Hydromantes

    E-Print Network [OSTI]

    Wake, David B.

    Short Notes Taxonomy of the Plethodontid Salamander Genus Hydromantes (Caudata: Plethodontidae, when Dunn made a proposal that sta- bilized taxonomy (all species placed in Hy- dromantes) for over 60. His sugges- tion for the taxonomy of the group was to recog- nize a single genus, Hydromantoides

  4. Guidance Note 052 RISK ASSESSMENTS FOR HAZARDOUS CHEMICALS

    E-Print Network [OSTI]

    Guidance Note 052 RISK ASSESSMENTS FOR HAZARDOUS CHEMICALS as required under the CONTROL OF SUBSTANCES HAZARDOUS TO HEALTH REGULATIONS (COSHH) and the DANGEROUS SUBSTANCES AND EXPLOSIVE ATMOSPHERES Involving the Use of Hazardous Chemicals. COSHH requires health risks to be assessed and controlled

  5. INFORMATION NOTE United Nations/Nigeria Workshop on Space Law

    E-Print Network [OSTI]

    Glass, Ian S.

    1 INFORMATION NOTE United Nations/Nigeria Workshop on Space Law "Meeting international responsibilities and addressing domestic needs" Hosted by the Government of Nigeria 21-24 November 2005 Abuja, Nigeria Background Given the growing number of benefits derived from the use of space applications

  6. RIS-M-2411 A NOTE ON WIND GENERATOR INTERACTION

    E-Print Network [OSTI]

    #12;~ y . RISÃ?-M-2411 A NOTE ON WIND GENERATOR INTERACTION N.O. Jensen Abstract. A simple model for the wake behind a wind generator is given. The model is compared to some full scale experimen- tal results. The model is then used in an example where the production from a circular cluster of 10 wind generators

  7. A CAUTIONARY NOTE REGARDING THE DATA INTEGRITY CAPACITY

    E-Print Network [OSTI]

    Irvine, Cynthia E.

    assurance components, as well as the integrity of data read from high assurance repositories and displayedA CAUTIONARY NOTE REGARDING THE DATA INTEGRITY CAPACITY OF CERTAIN SECURE SYSTEMS Cynthia E. Irvine of architecture. We discuss the general integrity property that systems can only be trusted to manage modi able

  8. BRIEFING NOTE SUMMARY OF MATTERS CONSIDERED BY THE MANAGEMENT BOARD

    E-Print Network [OSTI]

    business plans for 2008-11. 4. The Board's attention was drawn to the increase in planned capital projects and noted that the planning and budgeting processes would be reviewed by the Planning and Finance Divisions YEAR BUSINESS PLAN 3. The Board considered an analysis of the submitted Faculty and Support Services

  9. Technical Note/ Impact of Coastal Land Reclamation on

    E-Print Network [OSTI]

    Jiao, Jiu Jimmy

    Technical Note/ Impact of Coastal Land Reclamation on Ground Water Level and the Sea Water Interface by Haipeng Guo1 and Jiu Jimmy Jiao2 Abstract Land reclamation in coastal areas may have water (Fetter 1972; Jiao and Tang 1999), but such an interaction may be modified by land reclamation

  10. Approved Test Procedures Version 1.1 Release Notes

    E-Print Network [OSTI]

    Approved Test Procedures Version 1.1 Release Notes 1 Change Reason for Change 302.a drugdrug, drug allergy In the Informative Test Description section Added clarification to the example. 302.c Problem List In the Informative Test Description section Added the sentence "The test also

  11. Notes From the Chair 2 Climate Change Impacts Could 2

    E-Print Network [OSTI]

    Notes From the Chair 2 Climate Change Impacts Could 2 Affect Columbia River Hydropower Generation hydropower dams, irrigates crops, provides habitat for fish and wild- life, and recreation, the implications and wildlife and hydropower. With the goal of protecting both resources, the Council has developed innovative

  12. Research Note Effects of Coastal Lighting on Foraging Behavior

    E-Print Network [OSTI]

    Branch, Lyn C.

    Research Note Effects of Coastal Lighting on Foraging Behavior of Beach Mice BRITTANY L. BIRD, LYN of artificial light into wildlife habitat represents a rapidly expanding form of human encroachment, particularly in coastal systems. Light pollution alters the behavior of sea turtles during nesting; therefore

  13. 1 ACIT Meeting Notes ACTION ITEMS ASSIGNED TO DELIVER BY

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    -12PM 212 Kerr Hall Advisory Committee for Information Technology Meeting Notes MEETING DATE: 5. OR is currently doing more research development, as well as drawing in Silicon Valley Initiatives. Mobile Apps [P Designs) is to make sure system design and case management tool are configured correctly and that software

  14. Notes from the 3rd Axion Strategy Meeting

    SciTech Connect (OSTI)

    Baker, O. K. [Department of Physics, Yale University, P.O. Box 208120, New Haven, CT 06520 (United States); Cantatore, G. [Universita and INFN Trieste, via Valerio 2, 34127 Trieste (Italy); Jaeckel, J. [Institute for Particle Physics Phenomenology, Durham University, Durham DH1 3LE (United Kingdom); Mueller, G. [Department of Physics, University of Florida, PO Box 118440, Gainesville, FL 32611 (United States)

    2010-08-30T23:59:59.000Z

    In this note we briefly summarize the main future targets and strategies for axion and general low energy particle physics identified in the ''3rd axion strategy meeting'' held during the AXIONS 2010 workshop. This summary follows a wide discussion with contributions from many of the workshop attendees.

  15. News & Notes April 7, 2008 The Halcyon Saxophone

    E-Print Network [OSTI]

    Azevedo, Ricardo

    News & Notes ­ April 7, 2008 The Halcyon Saxophone Quartet, under the direction of Karen Wylie, won, and develop professional leadership skills. Jim Vassallo, Randal Adams (BA, Spring `83), and Ali Jackson (BA, assistant director Teresa Chapman,* Jackie Nalett,* Karen Stokes,* Ton

  16. LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note

    E-Print Network [OSTI]

    Raizada, Manish N.

    LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note: The Luciferase enzyme is unstable-ground samples. 2. Collect liquid nitrogen from downstairs and place 24 frozen tissue samples inside. 3. Place the power. 14.The luminometer cuvettes can be reused, BUT ONLY if they have been thoroughly soaked

  17. Undergraduate Lecture Notes in Topological Quantum Field Theory

    E-Print Network [OSTI]

    Vladimir G. Ivancevic; Tijana T. Ivancevic

    2008-12-11T23:59:59.000Z

    These third-year lecture notes are designed for a 1-semester course in topological quantum field theory (TQFT). Assumed background in mathematics and physics are only standard second-year subjects: multivariable calculus, introduction to quantum mechanics and basic electromagnetism. Keywords: quantum mechanics/field theory, path integral, Hodge decomposition, Chern-Simons and Yang-Mills gauge theories, conformal field theory

  18. 221B Lecture Notes Quantum Field Theory III (Radiation Field)

    E-Print Network [OSTI]

    Murayama, Hitoshi

    221B Lecture Notes Quantum Field Theory III (Radiation Field) 1 Quantization of Radiation Field was quantized: photons. Now that we have gone through quantization of a classical field (Schr¨odinger field so far), we can proceed to quantize the Maxwell field. The basic idea is pretty much the same, except

  19. 221B Lecture Notes Quantum Field Theory IV (Radiation Field)

    E-Print Network [OSTI]

    Murayama, Hitoshi

    221B Lecture Notes Quantum Field Theory IV (Radiation Field) 1 Quantization of Radiation Field was quantized: photons. Now that we have gone through quantization of a classical field (Schr¨odinger field so far), we can proceed to quantize the Maxwell field. The basic idea is pretty much the same, except

  20. CDF Note 10796 Search for Standard Model Higgs Boson Production

    E-Print Network [OSTI]

    Fermilab

    CDF Note 10796 Search for Standard Model Higgs Boson Production in Association with a W± Boson present a search for the standard model Higgs boson produced in association with a W± boson. This search that at least one jet be identified to originate from a bottom quark. Discrimination between the Higgs boson