Powered by Deep Web Technologies
Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Practical quantum oblivious transfer and bit commitment protocols  

E-Print Network [OSTI]

We propose a practical quantum oblivious transfer and a bit commitment protocols which replace the single-photon source with weak coherent pulses and allow error and loss in channel and detectors. These protocols can be realized with available optoelectronic apparatus.

Ya-Qi Song; Li Yang

2015-02-09T23:59:59.000Z

2

Localized radio frequency communication using asynchronous transfer mode protocol  

DOE Patents [OSTI]

A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

Witzke, Edward L. (Edgewood, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM)

2007-08-14T23:59:59.000Z

3

Design and simulation of Header Processor for Xpress Transfer Protocol  

E-Print Network [OSTI]

cannot meet the demands of future applications. Contemporary protocols provide traditional error-control and flow- control functions but do not provide fast and implicit connection setup, rapid re- quest/response and reliable multicast operations... OF SCIENCE August 1993 Major Subject: Electrical Engineering DESIGN AND SIMULATION OF HEADER PROCESSOR FOR XPRESS TRANSFER PROTOCOL A Thesis by GIRISH R. CHANDANGOUDAR Approved ss to style and content by: Hosame Abu-Amara (Chair of Committee) Bar G...

Chandangoudar, Girish R.

1993-01-01T23:59:59.000Z

4

https://www.centennialhillshospital.com/Home  

National Nuclear Security Administration (NNSA)

5202011 https:www.centennialhillshospital.comHome Note: The information on this Web site is provided as general health guidelines and may not be applicable to your...

5

155: 422 Process Simulation & Control Spring 2014 Webpage: Sakai (https://sakai.rutgers.edu/portal)  

E-Print Network [OSTI]

12 20 Apr 7 Control design 12 21 Apr 9 RGA analysis and control pairing 13 22 Apr 14 Multivariable;microlab as well as remotely on https://apps.rutgers.edu/ (you will need to install a Java application 5 Laplace transforms 3 6 Feb 10 Transfer functions and state space models 4 7 Feb 12 Transfer

6

Design of the PSi Header Processor for Xpress Transfer Protocol(XTP)  

E-Print Network [OSTI]

for the Xpress Transfer Protocol for Local Area Networks. CHAPIER II BACKGROUND B n k frPr IPr With the availability of fiber optic technology, the data transmission rates in the order of 10g -109 bits per second are becoming a reality. Indeed, higher... segment in any packet is variable. The rniddle segment of the FIRST packet is mainly divided into an address segment and an optional data or padding information, as shown in Fig. 3 and each of which further contains sub-fields. address se ment (8*n b...

Rayaprolu, Murthy S.

1992-01-01T23:59:59.000Z

7

Experimental protocol for high-fidelity heralded photon-to-atom quantum state transfer  

E-Print Network [OSTI]

A quantum network combines the benefits of quantum systems regarding secure information transmission and calculational speed-up by employing quantum coherence and entanglement to store, transmit, and process information. A promising platform for implementing such a network are atom-based quantum memories and processors, interconnected by photonic quantum channels. A crucial building block in this scenario is the conversion of quantum states between single photons and single atoms through controlled emission and absorption. Here we present an experimental protocol for photon-to-atom quantum state conversion, whereby the polarization state of an absorbed photon is mapped onto the spin state of a single absorbing atom with >95% fidelity, while successful conversion is heralded by a single emitted photon. Heralded high-fidelity conversion without affecting the converted state is a main experimental challenge, in order to make the transferred information reliably available for further operations. We record >80/s successful state transfer events out of 18,000/s repetitions.

Christoph Kurz; Michael Schug; Pascal Eich; Jan Huwer; Philipp Müller; Jürgen Eschner

2014-10-10T23:59:59.000Z

8

https://zulu.ssc.nasa.gov/mrsid/ Gary Parker  

E-Print Network [OSTI]

https://zulu.ssc.nasa.gov/mrsid/ Gary Parker 2008 Bill Dietrich, Tetsuji Muto, Chuck Nittrouer://zulu.ssc.nasa.gov/mrsid/ "Blocked valley lake" Blake and Ollier (1971) Dietrich et al. (1999) blocked valley lake) #12; Google

Parker, Gary

9

Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol  

E-Print Network [OSTI]

We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automataframework of Lynch, Segala, and Vaandrager. This framework providestools for arguing rigorously ...

Canetti, Ran

2006-06-19T23:59:59.000Z

10

Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol  

E-Print Network [OSTI]

The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about their correctness using multiple levels of abstraction, based on implementation ...

Canetti, Ran

2007-02-16T23:59:59.000Z

11

Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol  

E-Print Network [OSTI]

The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about theircorrectness using multiple levels of abstraction, based on implementation ...

Canetti, Ran

2006-06-20T23:59:59.000Z

12

College of Arts & Science https://artsandscience.usask.ca/  

E-Print Network [OSTI]

College of Arts & Science https://artsandscience.usask.ca/ Department of Economics Assistant student supervision, and program development. For more information, please see: http://artsandscience.usask.ca to be sent. Submissions can be made at EconJobMarket.org, by e-mail to econ.job@usask.ca or by mail

Saskatchewan, University of

13

CC --3.0 CC https://isp.moe.edu.tw/ccedu/service.php  

E-Print Network [OSTI]

#12;#12; CC -- 3.0 CC https://isp.moe.edu.tw/ccedu/service.php #12 -- 3.0 CC https://isp.moe.edu.tw/ccedu/service.php x/rp=-1,y/rp=0 II ( )© Phil Armitage #12/JPL/Space Science Institute #12; A B Cassini Division C A CC -- 3.0 CC https://isp.moe.edu.tw/ccedu/service.php

Wang, Ming-Jye

14

INFORMATION FOR 2014 ACADEMIC PROMOTIONS ROUND Academic Promotions Policy: https://policies.anu.edu.au/ppl/document/ANUP_000363  

E-Print Network [OSTI]

INFORMATION FOR 2014 ACADEMIC PROMOTIONS ROUND Academic Promotions Policy: https://policies.anu.edu.au/ppl/document/ANUP_000363 Academic Promotions Procedure: https://policies.anu.edu.au/ppl/document/ANUP_000624 Academic

Botea, Adi

15

Efficient Data Transfer Protocols  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4: Networking for the FutureEdward Teller MedalsJunctionsEfficient

16

Effective Project Management Office Processes and Technology Transfer: Implementation of an Avaya Voice Over Internet Protocol Telephony System in Mexico  

E-Print Network [OSTI]

This project-thesis examines the technical requirements of a Voice over Internet Protocol (VoIP) solution and is it advantageous for a Multinational Corporation (MNC) to utilize the Project Management Office (PMO) processes as defined by the Project...

Perez, Mary Louise

2012-08-31T23:59:59.000Z

17

Company Name: General Dynamics Bath Iron Works Web Site: https://www.gdbiw.com  

E-Print Network [OSTI]

Company Name: General Dynamics Bath Iron Works Web Site: https://www.gdbiw.com Industry: Defense's largest city, Portland. Majors they typically recruit: Civil Engineering, Electrical Engineering, Mechanical Engineering Do they offer internships: Our summer internship program provides students

New Hampshire, University of

18

Fertility of Beef Recipients Following a Fixed-Time Embryo Transfer Protocol that Includes Follicle Stimulating Hormone Diluted in Hyaluronan  

E-Print Network [OSTI]

This study was performed to test the viability of administering a single 40 mg dose of Folltropin-V® (FSH, Bioniche Animal Health) diluted in SRF (MAP-5 50, Sodium Hyaluronate, Bioniche Animal Health) on day 5 of a recipient synchronization protocol...

Thorne, Jacob Westley

2013-05-06T23:59:59.000Z

19

8/11/2014 BarryOno Collection https://web.archive.org/web/20071117013221/http://www.bl.uk/collections/onoweb.html 1/2  

E-Print Network [OSTI]

8/11/2014 BarryOno Collection https://web.archive.org/web/20071117013221/http;8/11/2014 BarryOno Collection https://web.archive.org/web/20071117013221/http

20

Lineare Algebra I (lehramtsbezogen) https://www.mi.fu-berlin.de/kvv/course.htm?cid=10310  

E-Print Network [OSTI]

Lineare Algebra I (lehramtsbezogen) https://www.mi.fu-berlin.de/kvv/course.htm?cid=10310 -- kein@math.fu-berlin.de http://page.mi.fu-berlin.de/gmziegler/ FU Berlin, Winter 2011/2012 0. Lineare Geometrie des n¨uhrung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Mi, 19. Oktober 2. Feststellungstest

Ziegler, GĂĽnter M.

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Pouze informativn! Zvazn podmnky pijmacho zen viz https://is.cuni.cz/studium/podprij/index.php?do=info&fakulta=11320  

E-Print Network [OSTI]

Pouze informativní! Závazné podmínky pijímacího ízení viz https://is.cuni.cz/studium/podprij/index.php/2012 Praha 2010 #12;2 Pouze informativní! Závazné podmínky pijímacího ízení viz https://is.cuni.cz/studium/podprij/index.php ISBN 978-80-7378-125-5 #12;3 Pouze informativní! Závazné podmínky pijímacího ízení viz https://is.cuni.cz/studium/podprij/index.php

Cerveny, Vlastislav

22

Effective Date: July 5, 2011 Check the JPSS MIS Server at https://jpssmis.gsfc.nasa.gov/frontmenu_dsp.cfm to verify that this is the correct version prior to use.  

E-Print Network [OSTI]

://jpssmis.gsfc.nasa.gov/mainmenu_dsp.cfm ) Reviewed By: JPSS Ground System Craig Weikel C3S Manager (Electronic Approvals available online at https://jpssmis.gsfc.nasa.gov/mainmenu_dsp.cfm ) Patrick Coronado FTS Manager (Electronic Approvals available online at https://jpssmis.gsfc.nasa.gov/mainmenu_dsp.cfm ) William Sullivan JPSS CGS Program Manager (Electronic Approvals available online at https

23

Effective Date: March 31, 2011 Check the JPSS MIS Server at https://jpssmis.gsfc.nasa.gov/frontmenu_dsp.cfm to verify that this is the correct version prior to use.  

E-Print Network [OSTI]

System Craig Weikel C3S Manager (Electronic Approvals available online at https://jpssmis.gsfc.nasa.gov/mainmenu_dsp.cfm ) Patrick Coronado FTS Manager (Electronic Approvals available online at https://jpssmis.gsfc.nasa.gov/mainmenu_dsp.cfm ) William Sullivan JPSS CGS Program Manager (Electronic Approvals available online at https

24

1. Navigate to https://itsapps.unc.edu/vir/vendor. 2. Enter the PO, Invoice and Contact information.  

E-Print Network [OSTI]

1. Navigate to https://itsapps.unc.edu/vir/vendor. 2. Enter the PO, Invoice and Contact information, the system verifies that there is a valid PO associated with the Vendor ID. It also checks that the invoice, click the Invoice Complete button. Using the VISP Using the Vendor Invoice Submission Page (VISP) ver

McLaughlin, Richard M.

25

myUK: https://myuk.uky.edu/ Registration Help Line: (859) 257-7173 Registration Using myUK  

E-Print Network [OSTI]

myUK: https://myuk.uky.edu/ · Registration Help Line: (859) 257-7173 Registration Using myUK 1 not created an account, follow the instructions at the InformationTechnologyCustomerService Centersite:www.uky.edu/ukit/help.You may also e-mail the Help Desk at: helpdesk@uky.edu or call at (859) 218- 4357.Ifyoudonothavea

MacAdam, Keith

26

https://spectrum.stanford.edu/education-mentoring Contact us at Stanford-edplan-initiative@lists.stanford.edu  

E-Print Network [OSTI]

https://spectrum.stanford.edu/education-mentoring Contact us at Stanford-edplan-initiative@lists.stanford.edu IRB Update Wednesday, June 26, 2013 12:00PM ­ 1:00PM Li Ka Shing Center, Rm. 130 291 Campus Drive updates and FYIs to the research community on IRB-related topics. The workshop will provide guidance

Sonnenburg, Justin L.

27

FAQ Hufige Fragen: Wie melde ich mich im System an? ber das ESS Portal https://ess.tuwien.ac.at (gleicher Zugang wie  

E-Print Network [OSTI]

FAQ ­ Häufige Fragen: · Wie melde ich mich im System an? �ber das ESS Portal https://ess Auf Grund von laufenden Wartungs- und Servicearbeiten im ESS-Portal bitten wir Sie , die Meldungen

Szmolyan, Peter

28

Effective Protocols for Mobile Communications and Networking  

SciTech Connect (OSTI)

This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

Espinoza, J.; Sholander, P.; Van Leeuwen, B,

1998-12-01T23:59:59.000Z

29

11/30/12 11:58 AMQualtrics Survey Software Page 1 of 4https://duke.qualtrics.com/ControlPanel/PopUp.php?PopType=SurveyPrintPreview&WID=_blank  

E-Print Network [OSTI]

11/30/12 11:58 AMQualtrics Survey Software Page 1 of 4https://duke.qualtrics.com/ControlPanel/PopUp.php) #12;11/30/12 11:58 AMQualtrics Survey Software Page 2 of 4https://duke.qualtrics.com/ControlPanel/PopUp.php;11/30/12 11:58 AMQualtrics Survey Software Page 3 of 4https://duke.qualtrics.com/ControlPanel/PopUp.php

30

8/1/14 Google Maps https://www.google.com/maps/dir/Golden+Gate+Bridge,+San+Francisco,+CA+94129/UCSF%2FMission+Bay,+San+Francisco,+CA/@37.7996107,-122.4363906,... 1/2  

E-Print Network [OSTI]

8/1/14 Google Maps https://www.google.com/maps/dir/Golden+Gate+Bridge,+San+Francisco,+CA+94129/UCSF has tolls. Directions from Golden Gate Bridge to UCSF/Mission Bay San Francisco, CA 94129 Golden Gate;8/1/14 Google Maps https://www.google.com/maps/dir/Golden+Gate+Bridge,+San+Francisco,+CA+94129/UCSF%2FMission

Derisi, Joseph

31

Efficient Wide Area Data Transfer Protocols  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4: Networking for the FutureEdward Teller

32

Protocol for House Parties  

Broader source: Energy.gov [DOE]

Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

33

To link to this article: URL : https://www.jstage.jst.go.jp/article/isijinternational/51/2/51_2_242/_article  

E-Print Network [OSTI]

To link to this article: URL : https://www.jstage.jst.go.jp/article/isijinternational/51/2/51 with chunky graphite. (2010) ISIJ International, vol. 51 (n° 2). pp. 242-249. ISSN 0915-1559 Open Archive-defined transition from the outer unaffected area and the inner affected one. All previous works that looked

Mailhes, Corinne

34

THE RIMINI PROTOCOL Oil Depletion Protocol  

E-Print Network [OSTI]

Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict During the Second Half of the Age of Oil As proposed at the 2003 Pio Manzu Conference

Keeling, Stephen L.

35

Webinar: Hydrogen Refueling Protocols  

Broader source: Energy.gov [DOE]

Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

36

Application Protocol Reference Architecture Application Protocol Reference Architecture  

E-Print Network [OSTI]

Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

van Sinderen, Marten

37

Multiple protocol fluorometer and method  

DOE Patents [OSTI]

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

38

4. The Bounded Re-transmission Protocol Jean-Raymond Abrial  

E-Print Network [OSTI]

1 - The Bounded Re-transmission Protocol is a file transfer protocol - This is a problem dealing to handle that problem: timers. - We would like to see how we can formalize such timers #12;The Bounded. #12;Abortion of Protocol at the Sender Site 6 - The Sender can re-transmit the same data at most M

Southampton, University of

39

6. The Bounded Re-transmission Protocol Jean-Raymond Abrial  

E-Print Network [OSTI]

- The Bounded Re-transmission Protocol is a file transfer protocol - This is a problem dealing with fault that problem: timers. - We would like to see how we can formalize such timers #12;The Bounded Retransmission that the Receiver does not confuse (?) a new data with a retransmitted one. #12;Abortion of Protocol at the Sender

Southampton, University of

40

Image credits from left to right, top to bottom: https://en.wikipedia.org/wiki/File:Trek_Y_Foil.jpg; http://www.cantat-associates.com/gfrpbridge; http://science.howstuffworks.com/prosthetic-limb2.htm; https://en.wikipedia.org/wiki/File:Golf_clubs.jpg;  

E-Print Network [OSTI]

/skylarkseatrial1.JPG; https://en.wikipedia.org/wiki/File:X-51A_Waverider.jpg Ceramic Matrix Composites Research in everyday applications are ceramic matrix composites (CMCs). These composites are special types of materials, ceramic matrix composites are very expensive (e.g. $10,000 for a 1 ft. x 1 ft. sample). This limits

Roy, Subrata

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Question: What are the food options for Guest House guests? Answer: The following link https://home.ornl.gov/general/xmenu/ provides information about  

E-Print Network [OSTI]

://home.ornl.gov/general/xmenu/ provides information about ORNL Food Service. The ORNL Food Service is operated by Buddy's Café. Their onQuestion: What are the food options for Guest House guests? Answer: The following link https the front desk. Food may be ordered from these vendors between 6:00pm and 9:00pm. Payment of food from

Pennycook, Steve

42

APS Protocol for  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material...

43

Computationally Secure Oblivious Transfer Moni Naor y Benny Pinkas z  

E-Print Network [OSTI]

Computationally Secure Oblivious Transfer #3; Moni Naor y Benny Pinkas z Abstract We describe a new Information Retrieval (PIR) protocol to a Symmetric PIR (SPIR) protocol without increasing the number security de#12;nitions. Section 2 presents protocols for 1-out-of-N and k-out-of-N OT. Section 3 presents

44

Protocol design contests  

E-Print Network [OSTI]

In fields like data mining and natural language processing, design contests have been successfully used to advance the state of the art. Such contests offer an opportunity to bring the excitement and challenges of protocol ...

Winstein, Keith

45

White Paper: A Survey of 3D Sync IR Protocols  

E-Print Network [OSTI]

)..............................................................................................12 Sony Protocol (Standalone emitter

46

MAPS MANUAL 2010 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2010 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

47

MAPS MANUAL 2014 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2014 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

48

MAPS MANUAL 2008 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2008 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Jim Saracco

DeSante, David F.

49

MAPS MANUAL 2013 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2013 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

50

MAPS MANUAL 2011 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2011 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

51

MAPS MANUAL 2012 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2012 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

52

Trade war in the Pacific: ASEAN and the Trans-Pacific Partnership https://theconversation.edu.au/trade-war-in-the-pacific-asean-and-the-trans-pacific-partnership-10937[3/12/2012 11:38:09 AM  

E-Print Network [OSTI]

Trade war in the Pacific: ASEAN and the Trans-Pacific Partnership https://theconversation.edu.au/trade-war-in-the-pacific-asean-and-the-trans-pacific-partnership-10937[3/12/2012 11:38:09 AM] TC Home + Society Science + Technology Trade war in the Pacific: ASEAN and the Trans-Pacific Partnership 30 November

Botea, Adi

53

7/30/2014 Smart sensors that harvest power from sun, heat or vibrations https://ec.europa.eu/programmes/horizon2020/en/print/688 1/2  

E-Print Network [OSTI]

on Saturday, 01/03/2014 [1] European researchers have developed advanced energy harvesting technology. But what if sensors could harness energy directly from their environment ­ from the sun, from ambient heat and thermal energy as #12;7/30/2014 Smart sensors that harvest power from sun, heat or vibrations https

Rossi, Michele

54

Extremal quantum protocols  

E-Print Network [OSTI]

Generalized quantum instruments correspond to measurements where the input and output are either states or more generally quantum circuits. These measurements describe any quantum protocol including games, communications, and algorithms. The set of generalized quantum instruments with a given input and output structure is a convex set. Here we investigate the extremal points of this set for the case of finite dimensional quantum systems and generalized instruments with finitely many outcomes. We derive algebraic necessary and sufficient conditions for extremality.

Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

2011-01-25T23:59:59.000Z

55

Communication complexity protocols for qutrits  

SciTech Connect (OSTI)

Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

Tamir, Boaz [Department of History and Philosophy of Science, Bar-Ilan University, Ramat-Gan (Israel)

2007-03-15T23:59:59.000Z

56

Dynamic Protocol Tuning Algorithms for High Performance Data Transfers |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct:Directives Templates8.Sifting Slush:NewDust takesArgonne

57

Mensuration protocol National Forest Inventory  

E-Print Network [OSTI]

NFI: Mensuration protocol for the National Forest Inventory June 2010 E. D. Mackie, R. W. Matthews and A. Brewer1 FR Biometrics Division 1 IFOS, Forestry Commission #12;National Forest Inventory (NFI or square boundary. In the case of a section 2 #12;National Forest Inventory (NFI): Mensuration Protocol

58

Office Protocols | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in3.pdfEnergyDepartment of Energy(National1 -OSSGasofOffice Protocols Office Protocols

59

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

60

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Broader source: Energy.gov (indexed) [DOE]

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells This document describes test protocols...

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Broader source: Energy.gov (indexed) [DOE]

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Accelerated Stress Test Protocols for PEM...

62

Computer Networking : Principles, Protocols and Practice  

E-Print Network [OSTI]

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure December 24 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 3.8 The Transmission Control Protocol

Bonaventure, Olivier

63

Computer Networking : Principles, Protocols and Practice  

E-Print Network [OSTI]

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure September 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 3.8 The Transmission Control Protocol

Bonaventure, Olivier

64

Data Transfer  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINL is aID Service First DOIData Transfer

65

Transferring Data  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2Topo II: AnTraining andfor a CleanTransfer Service,

66

Transferring Data  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2Topo II: AnTraining andfor a CleanTransfer

67

Automated Eye-Movement Protocol Analysis  

E-Print Network [OSTI]

Automated Eye-Movement Protocol Analysis Dario D. Salvucci and John R. Anderson Carnegie Mellon analysis of eye-movement protocols. Although eye movements have be- come increasingly popular as a tool an ap- proach to automating eye-movement protocol analysis by means of tracing--re- lating observed eye

Salvucci, Dario D.

68

TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM  

E-Print Network [OSTI]

RFC: 793 TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 Admiralty Way Marina del Rey, California 90291 #12;#12;September 1981 Transmission Control Protocol TABLE ........................................... 12 2.9 Precedence and Security ...................................... 13 2.10 Robustness Principle

McBrien, Peter

69

Chapter 14: Chiller Evaluation Protocol  

SciTech Connect (OSTI)

This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

Tiessen, A.

2014-09-01T23:59:59.000Z

70

INEEL AIR MODELING PROTOCOL ext  

SciTech Connect (OSTI)

Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

C. S. Staley; M. L. Abbott; P. D. Ritter

2004-12-01T23:59:59.000Z

71

Fast population transfer engineering of three-level systems  

E-Print Network [OSTI]

We design, by invariant-based inverse engineering, resonant laser pulses to perform fast population transfers in three-level systems. The efficiency and laser intensities are examined for different protocols. The energy cost to improve the fidelity is quantified. The laser intensities can be reduced by populating the intermediate state and by multi-mode driving.

Xi Chen; J. G. Muga

2012-07-12T23:59:59.000Z

72

Transportation Protocols Working Group First Conference Call...  

Broader source: Energy.gov (indexed) [DOE]

Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

73

SSF Experimental Protocols -- Lignocellulosic Biomass Hydrolysis...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SSF Experimental Protocols - Lignocellulosic Biomass Hydrolysis and Fermentation Laboratory Analytical Procedure (LAP) Issue Date: 10302001 N. Dowe and J. McMillan Technical...

74

Superior Energy Performance Measurement and Verification Protocol...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

and Verification Protocol for Industry (November 2012) More Documents & Publications Energy Intensity Baselining and Tracking Guidance EnPI V4.0 Tool Algorithm Superior Energy...

75

Estimating Pedestrian Accident Exposure: Protocol Report  

E-Print Network [OSTI]

A Method of Measuring Exposure to Pedestrian Accident Risk.Accident Analysis and Prevention, Vol. 14, 1982, pp 397-405.Estimating Pedestrian Accident Exposure: Protocol Report,

Greene-Roesel, Ryan; Diogenes, Mara Chagas; Ragland, David R

2007-01-01T23:59:59.000Z

76

ANJE5.40. VAX VMS IBM NJE Protocol Emulator  

SciTech Connect (OSTI)

The Argonne NJE (Network Job Entry) communications software allows VAX/VMS systems to participate in a standard IBM peer-to-peer network and communicate with IBM computers with the VM/RSCS, MVS/JES2, MVS/JES3, or VSE/POWER operating systems or with CDC computers having the NJEF product by emulating the NJE protocol. The emulator has limited routing capability and forwards received files and messages to other nodes connected to it via DECnet. DECnet client nodes implementing the NJE system receive full NJE user services via the routing node including access to BITnet. All member nodes of VAX clusters involved in the NJE domain receive full NJE services as well. The emulator`s capabilities include immediate transfer of commands and messages and queued transfer of standard print and punch files. Jobs can be sent from VMS for execution at any node with batch services. The emulator receives files into user designated subdirectories. Two applications are distributed with ANJE. One is an RFC822-conforming interface that enables users of the VMS Mail Utility and either VM/SP NOTE or the IBM PROFS mail to exchange electronic mail. VMS Mail Utility users can also exchange electronic mail with users of BITnet. The other application is an emulator for the IBM Bulk Data Transfer product and IBM NETDATA protocol that enables transmission and reception of arbitrary sequential files with or without character translation. Data conversion subroutines are provided to aid users in converting their data from the binary format of one machine to that of the other.

Raffenetti, R.C.; Osudar, J. [Argonne National Lab., IL (United States)

1990-06-01T23:59:59.000Z

77

Protocol Number: (IBC office use only)  

E-Print Network [OSTI]

Protocol Number: (IBC office use only) 1 UNF Registration of Biosafety Level 2 (BSL-2) A-2 Form", describe the methods of inactivation. #12;Protocol Number: (IBC office use only) 2 10. Describe the mechanism for decontaminating lab waste prior to disposal. Yes No If "Yes", describe the methods

Asaithambi, Asai

78

Safe Operating Procedure SAFETY PROTOCOL: Rb-86  

E-Print Network [OSTI]

of hazardous and/or radioactive wastes are to be followed. Rb- 86 waste should be segregated from all otherSafe Operating Procedure (2/10) SAFETY PROTOCOL: Rb-86 this safety protocol or submit an alternative and equivalent procedure that you develop to meet your unique

Farritor, Shane

79

Advantages of a Leveled Commitment Contracting Protocol  

E-Print Network [OSTI]

Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R. Lesser 7, 1995 #12; Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R, contracts have traditionally been binding. Such contracts do not al­ low agents to efficiently accommodate

Massachusetts at Amherst, University of

80

The Bitcoin Backbone Protocol: Analysis and Applications  

E-Print Network [OSTI]

The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay.leonardos@gmail.com November 16, 2014 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Adaptive best effort protocols for video delivery  

E-Print Network [OSTI]

This thesis describes the design and implementation of ics. transport level protocols running on top of the IP layer to transmit video data over packet switched networks. These protocols address the issues of meeting real-time deadlines of the video...

Madhwaraj, Ashwin Raj

1998-01-01T23:59:59.000Z

82

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

83

Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project  

SciTech Connect (OSTI)

This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

1996-03-01T23:59:59.000Z

84

Cryptanalysis of the arbitrated quantum signature protocols  

SciTech Connect (OSTI)

As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

2011-08-15T23:59:59.000Z

85

Federal Laboratory Technology Transfer  

E-Print Network [OSTI]

Federal Laboratory Technology Transfer Fiscal Year 2008 Prepared by: National Institute to submit this fiscal year 2008 Technology Transfer Summary Report to the President and the Congress transfer authorities established by the Technology Transfer Commercialization Act of 2000 (P.L. 106

Perkins, Richard A.

86

The EMDEX Project: Technology transfer and occupational measurements  

SciTech Connect (OSTI)

The Electric and Magnetic Field Measurement Project for Utilities -- the EPRI EMDEX Project -- is a multifaceted project entailing technology transfer, measurement protocol design, data management, and exposure assessment analyses. The specific objectives of the project in order of priority were: (1) to transfer the EMDEX technology to utilities; (2) to develop measurement protocols and data management capabilities for large exposure data sets; and (3) to collect, analyze, and document 60-Hz electric and magnetic field exposures for a diverse population. Transfer of the EPRI Electric and Magnetic Field Digital Exposure system (EMDEX) technology to the participating utilities was accomplished through training and through extensive involvement in the exposure data collection effort. Documentation of the EMDEX Project is contained in three volumes: Volume 1 summarizes the methods and results, and provides and assessment of project objectives; Volume 2 provides detailed descriptions of methods, procedures, protocols, materials and analyses; and Volume 3 contains appendices with a complete set of project protocols, project materials, and extensive data tables. 8 refs., 12 figs., 2 tabs.

Bracken, T.D.

1990-11-01T23:59:59.000Z

87

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...  

Broader source: Energy.gov (indexed) [DOE]

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Webinar slides from the U.S. Department of Energy...

88

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...  

Open Energy Info (EERE)

Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol...

89

Protective Force Protocols for ESS Supported Performance Tests...  

Broader source: Energy.gov (indexed) [DOE]

Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12,...

90

access control protocols: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

91

access control protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

92

Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Poster...

93

Protocol for Addressing Induced Seismicity Associated with Enhanced...  

Office of Environmental Management (EM)

Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

94

NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys  

E-Print Network [OSTI]

NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys: Surf Clams and Ocean Quahogs December 19..................................................................................................................................... 1 NOAA Fisheries Hydro-dynamic Clam Dredge Survey Protocols

95

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007...

96

On the Security of Public Key Protocols  

E-Print Network [OSTI]

Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

Danny Dolev; et al.

1983-01-01T23:59:59.000Z

97

A Metaobject Protocol for C++ Shigeru Chiba  

E-Print Network [OSTI]

A Metaobject Protocol for C++ Shigeru Chiba Xerox PARC & University of Tokyo chiba@parc of the paper, we rst discuss what we want our 1 We use the term library to mean a collection of reusable code

Chiba, Shigeru

98

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

99

NREL Test-to-Failure Protocol (Presentation)  

SciTech Connect (OSTI)

The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

Hacke, P.

2012-03-01T23:59:59.000Z

100

PEP Classroom Observation Protocol Project # _______ District __________________________ School ________________________________________  

E-Print Network [OSTI]

PEP Classroom Observation Protocol Project # _______ District __________________________ School (mark all that apply) Demonstrate or confirm known concepts/procedures Demonstrate or confirm known concepts/procedures Explore ideas, test conjectures, look for patterns Explore ideas, test conjectures

Lee, Carl

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

IT Licentiate theses Ad Hoc Routing Protocol  

E-Print Network [OSTI]

IT Licentiate theses 2005-004 Ad Hoc Routing Protocol Validation OSKAR WIBLING UPPSALA UNIVERSITY SWEDEN Dissertation for the degree of Licentiate of Technology in Computer Science at Uppsala University

Flener, Pierre

102

The Kyoto Protocol and developing countries  

E-Print Network [OSTI]

Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

103

Internet Security Protocols Prof. Ravi Sandhu  

E-Print Network [OSTI]

INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2001 SECURE SOCKETS LAYER (SSL) v layered on top of TCP v SSL versions 1.0, 2.0, 3.0, 3.1 v Netscape protocol v later refitted as IETF standard TLS (Transport Layer Security) v TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

Sandhu, Ravi

104

Internet Security Protocols Prof. Ravi Sandhu  

E-Print Network [OSTI]

INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 3© Ravi Sandhu 2000

Sandhu, Ravi

105

Internet Security Protocols Prof. Ravi Sandhu  

E-Print Network [OSTI]

INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

Sandhu, Ravi

106

Field Monitoring Protocol: Heat Pump Water Heaters  

SciTech Connect (OSTI)

This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

2013-02-01T23:59:59.000Z

107

HEAT TRANSFER FLUIDS  

E-Print Network [OSTI]

The choice of heat transfer fluids has significant effects on the performance, cost, and reliability of solar thermal systems. In this chapter, we evaluate existing heat transfer fluids such as oils and molten salts based ...

Lenert, Andrej

2012-01-01T23:59:59.000Z

108

INL Technology Transfer  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Technology Transfer Through collaboration with industry partners, INL's Technology Deployment office makes available to American agencies and international organizations unique...

109

Heat Transfer Guest Editorial  

E-Print Network [OSTI]

Journal of Heat Transfer Guest Editorial We are indeed delighted in bringing out this special issue was showcased in diverse areas such as traditional heat and mass transfer, lab-on-chip, sensors, biomedical applica- tions, micromixers, fuel cells, and microdevices. Selected papers in the field of heat transfer

Kandlikar, Satish

110

Federal Laboratory Technology Transfer  

E-Print Network [OSTI]

Federal Laboratory Technology Transfer Fiscal Year 2007 Prepared by: National Institute to present to the President and the Congress this Federal Laboratory Technology Transfer Report summarizing the achievements of Federal technology transfer and partnering programs of the Federal research and development

Perkins, Richard A.

111

Federal Laboratory Technology Transfer  

E-Print Network [OSTI]

Federal Laboratory Technology Transfer Fiscal Year 2009 Prepared by: National Institute to submit this fiscal year 2009 Technology Transfer Summary Report to the President and the Congress in accordance with 15 USC Sec 3710(g)(2) for an annual summary on the implementation of technology transfer

Perkins, Richard A.

112

ENHANCING THE TRANSFER STUDENT  

E-Print Network [OSTI]

Efforts #12;Who Are Ohio State Transfer Students? #12;TRANSFER PROFILE DatafromSU12,AU12,SP13 3 as NFYS: 576 Average Transfer Hours of Enrolled Student: 52.2 Living on Campus: 470 Total # Sending Expectations (time management skills, balancing a more rigorous course load, study skills) 13.24% Majors (how

113

EnergyEfficient Initialization Protocols for Adhoc Radio Networks ?  

E-Print Network [OSTI]

Energy­Efficient Initialization Protocols for Ad­hoc Radio Networks ? J. L. Bordim 1 , J. Cui 1 , T contribution of this work is to propose energy­ efficient randomized initialization protocols for ad­hoc radio this protocol to de­ sign an energy­efficient initialization protocol that terminates, with high probability

Nakano, Koji

114

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan Vaidyanathan-point of proposing a new transport protocol called ATP #12;Outline Problems with TCP ATP design elements ATP Protocol to the characteristics of the reverse path in wireline networks #12;ATP: Ad-hoc Transport Protocol TCP's components

Sivakumar, Raghupathy

115

Heat transfer system  

DOE Patents [OSTI]

A heat transfer system for a nuclear reactor. Heat transfer is accomplished within a sealed vapor chamber which is substantially evacuated prior to use. A heat transfer medium, which is liquid at the design operating temperatures, transfers heat from tubes interposed in the reactor primary loop to spaced tubes connected to a steam line for power generation purposes. Heat transfer is accomplished by a two-phase liquid-vapor-liquid process as used in heat pipes. Condensible gases are removed from the vapor chamber through a vertical extension in open communication with the chamber interior.

McGuire, Joseph C. (Richland, WA)

1982-01-01T23:59:59.000Z

116

Heat transfer system  

DOE Patents [OSTI]

A heat transfer system for a nuclear reactor is described. Heat transfer is accomplished within a sealed vapor chamber which is substantially evacuated prior to use. A heat transfer medium, which is liquid at the design operating temperatures, transfers heat from tubes interposed in the reactor primary loop to spaced tubes connected to a steam line for power generation purposes. Heat transfer is accomplished by a two-phase liquid-vapor-liquid process as used in heat pipes. Condensible gases are removed from the vapor chamber through a vertical extension in open communication with the chamber interior.

Not Available

1980-03-07T23:59:59.000Z

117

Orthogonal-state-based protocols of quantum key agreement  

E-Print Network [OSTI]

Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

Chitra Shukla; Nasir Alam; Anirban Pathak

2013-10-05T23:59:59.000Z

118

Conditional transfer of quantum correlation in the intensity of twin beams  

E-Print Network [OSTI]

A conditional protocol of transferring quantum-correlation in continuous variable regime was experimentally demonstrated. The quantum-correlation in two pairs of twin beams, each characterized by intensity-difference squeezing of 7.0 dB, was transferred to two initially independent idler beams. The quantum-correlation transfer resulted in intensity-difference squeezing of 4.0 dB between two idler beams. The dependence of preparation probability and transfer fidellity on the selection bandwidth was also studied.

Yun Zhang; Kazuhiro Hayasaka; Katsuyuki Kasai

2005-04-06T23:59:59.000Z

119

Hybrid protocol of remote implementations of quantum operations  

E-Print Network [OSTI]

We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum state teleportation's (BQST) and Wang's one. The protocol is available for remote implemetations of quantum operations in the restricted sets specified in Sec. III. We also give the proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to BQST and Wang protocols.

Ning Bo Zhao; An Min Wang

2007-08-04T23:59:59.000Z

120

A calculus for cryptographic protocols: The spi calculus  

E-Print Network [OSTI]

We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as processes in the spi calculus and state their security properties in terms of coarsegrained notions of protocol equivalence.

Martin Abadi; Andrew D. Gordon

1999-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS  

E-Print Network [OSTI]

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS #12 ASSESSMENT IN THE NETHERLANDS Published VSNU, KNAW and NWO 2009 This document is available through internet: Royal Netherlands Academy of Arts and Sciences (KNAW) The Academy's mission: As the forum, conscience

Franssen, Michael

122

Chapter 22: Compressed Air Evaluation Protocol  

SciTech Connect (OSTI)

Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

Benton, N.

2014-11-01T23:59:59.000Z

123

Chapter 15: Commercial New Construction Protocol  

SciTech Connect (OSTI)

This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

Keates, S.

2014-09-01T23:59:59.000Z

124

Fuel transfer system  

DOE Patents [OSTI]

A nuclear fuel bundle fuel transfer system includes a transfer pool containing water at a level above a reactor core. A fuel transfer machine therein includes a carriage disposed in the transfer pool and under the water for transporting fuel bundles. The carriage is selectively movable through the water in the transfer pool and individual fuel bundles are carried vertically in the carriage. In a preferred embodiment, a first movable bridge is disposed over an upper pool containing the reactor core, and a second movable bridge is disposed over a fuel storage pool, with the transfer pool being disposed therebetween. A fuel bundle may be moved by the first bridge from the reactor core and loaded into the carriage which transports the fuel bundle to the second bridge which picks up the fuel bundle and carries it to the fuel storage pool. 6 figures.

Townsend, H.E.; Barbanti, G.

1994-03-01T23:59:59.000Z

125

Argonne integrated heterogeneous file transfer network  

SciTech Connect (OSTI)

This presentation describes the computing environment at Argonne National Laboratory and the actions underway to implement a coherent hierarchy of computing systems connected through a heterogeneous file transfer network. A major goal of the Computing Services Division is to integrate heterogeneous computing elements incrementally into a nework, with the goal of having everything somehow connected to everything else. Using standard IBM networking protocols, we have already built a full-function computer-to-computer file transfer network of IBM and DEC VAX systems. Currently, the users on the IBM MVS and VM/CMS systems can use standard IBM commands to send files and mail to DEC VAX users and output devices, and they can receive files from the DEC VAX's as if they had been sent from other IBM systems; similarly, the DEC VAX users can use standard DEC commands to send files and mail to IBM users and output devices, and they can receive files from the IBM systems as if they had been sent from other DEC VAX systems. In fact, the VAXes can exchange files and mail among themselves via the IBM NJE-based network without the need for DECnet links between the VAXes. Because this integrated heterogeneous file transfer network uses the standard IBM peer-to-peer communications protocol, all of the Laboratory's IBM and DEC computers easily communicate with the approximately 170 other computers in the Bitnet university network. Plans call for further integration of existing HP 3000 systems and future word processing systems such as Exxon, NBI, or Wang; we believe it is vitally important to provide smooth paths into this network for users of personal desktop computers. 17 references.

Schofield, J.

1984-01-01T23:59:59.000Z

126

HIGEE Mass Transfer  

E-Print Network [OSTI]

HIGEE MASS TRANSFER R.J. Mohr and R. Fowler GLITSCH, INC. Dallas, Texas ABSTRACT Distillation, absorption, and gas stripping have traditionally been performed in tall columns utilizing trays or packing. Columns perform satisfactorily... transfer system which utilizes a rotating bed of packing to achieve high efficiency separations, and consequent reduction in size and weight. INTRODUCTION HIGEE is probably one of the most interesting developments in mass transfer equipment made...

Mohr, R. J.; Fowler, R.

127

Protocol for New Degree Program Proposals When is a new degree program proposal needed?  

E-Print Network [OSTI]

Affairs Highlights' series in 2009, can be found at: https://www.cu.edu/articles/upload/BOR Academic://www.colorado.edu/GraduateSchool/academics/_docs/GuideforConcDeg.doc An informal overview of the new degree program approval process, provided by the system Academic Affairs office in their `Academic

Mojzsis, Stephen J.

128

MATERIALS TRANSFER AGREEMENT  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

MTAXX-XXX 1 MATERIAL TRANSFER AGREEMENT for Manufacturing Demonstration Facility and Carbon Fiber Technology Facility In order for the RECIPIENT to obtain materials, the RECIPIENT...

129

Bus transfer analysis  

SciTech Connect (OSTI)

This paper discusses bus transfer schemes and the methodology used in modeling and analysis. Due to the unavailability of generic acceptance criteria, simulations were performed to analyze the actual fast bus transfer operations at four operating nuclear power generating stations. Sample simulation results illustrating the transient variations in motors currents and torques are included. The analyses were performed to ensure that motors and other rotating parts are not subjected to excessive or accumulated stresses caused by bus transfer operations. A summary of the experience gained in the process of performing this work and suggested bus transfer acceptance criteria are also presented.

Weronick, R.; Hassan, I.D. [Raytheon Engineers and Constructors, Lyndhurst, NJ (United States)

1996-11-01T23:59:59.000Z

130

Technology Transfer Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Advanced Research Projects Agency-Energy (ARPA-E) Oil & Gas Technology Transfer Initiatives USEFUL LINKS Association of University Technology Managers (AUTM) Federal Laboratory...

131

Facility Survey & Transfer  

Broader source: Energy.gov [DOE]

As DOE facilities become excess, many that are radioactively and/or chemically contaminated will become candidate for transfer to DOE-EM for deactivation and decommissioning.

132

Russia's role in the Kyoto Protocol  

E-Print Network [OSTI]

As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

Bernard, Alain.

133

Measuring Transport Protocol Potential for Energy Efficiency  

E-Print Network [OSTI]

Measuring Transport Protocol Potential for Energy Efficiency S. Kontogiannis, L. Mamatas, I. Psaras, Greece {skontog, emamatas, ipsaras, vtsaousi}@ee.duth.gr Abstract. We investigate the energy-saving potential of transport pro- tocols. We focus on the system-related aspect of energy. Do we have to damage

Tsaoussidis, Vassilis

134

Optimal Decentralized Protocols for Electric Vehicle Charging  

E-Print Network [OSTI]

1 Optimal Decentralized Protocols for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low Abstract--We propose decentralized algorithms for optimally scheduling electric vehicle (EV) charging. The algorithms exploit the elasticity and controllability of electric vehicle loads in order to fill the valleys

Low, Steven H.

135

Utility, informativity and protocols Robert van Rooy  

E-Print Network [OSTI]

Utility, informativity and protocols Robert van Rooy ILLC/University of Amsterdam R particular natural assumptions the utility of questions and answers reduces to their informativity, and that the ordering relation induced by utility sometimes even reduces to the logical relation of entailment

van Rooij, Robert

136

Transport Control Protocol (TCP) In Heterogeneous Networks  

E-Print Network [OSTI]

Sprint Transport Control Protocol (TCP) In Heterogeneous Networks Objectives · Principles of TCP functional modules: slow start, congestion avoidance, fast transmission and fast recovery. ­ Maintain · Packet dropping is the only indication signal for network congestion (Maybe?) · Different transmission

Shihada, Basem

137

Web Applications and Security Web protocol overview  

E-Print Network [OSTI]

Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

Massachusetts at Amherst, University of

138

Northern Kentucky University Communicable Disease Protocol  

E-Print Network [OSTI]

Northern Kentucky University Communicable Disease Protocol Approved 12/6/2011 1.0 Scope To develop procedures and policies for Northern Kentucky University students who reside on or off- campus who have been those required as outlined in 902 KAR 2:020 to be reported to the Northern Kentucky Health Department

Boyce, Richard L.

139

Security proofs of cryptographic protocols Eva Jencusova  

E-Print Network [OSTI]

with FinePrint pdfFactory trial version http://www.fineprint.com #12;2 2 Database and logic abduction method is independent on used crypto-system in analyzing protocol. Our model DLA (=database and logic abduction that there exists knowledge to lead to an attack we use the logic abduction (top-down reasoning) to describe

140

A New Protocol for Evaluating Concrete Curing Effectiveness  

E-Print Network [OSTI]

and qualify the curing compound, a new evaluation protocol is introduced in this study. The new protocol consists of using measured relative humidity and temperature to calculate an effectiveness index (EI) which serves as an indicator of the effectiveness...

Sun, Peizhi

2013-07-22T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Coherent feedback that beats all measurement-based feedback protocols  

E-Print Network [OSTI]

We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, ...

Jacobs, Kurt

142

Protocols for the Equitable Assessment of Marine Energy Converters   

E-Print Network [OSTI]

This book contains the suite of protocols for the equitable evaluation of marine energy converters (based on either tidal or wave energy) produced by the EquiMar consortium led by the University of Edinburgh. These protocols ...

Ingram, David; Smith, George; Bittencourt-Ferreira, Claudio; Smith, Helen

143

Energetics and Dynamics of Electron Transfer and Proton Transfer...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transfer in Dissociation of Metal III (salen)-Peptide Complexes in the Energetics and Dynamics of Electron Transfer and Proton Transfer in Dissociation of Metal III (salen)-Peptide...

144

Coherent feedback that beats all measurement-based feedback protocols  

E-Print Network [OSTI]

We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, where the latter are defined in a strict sense. The superiority of the coherent protocol is due to the fact that it can exploit a geodesic path in Hilbert space, a path that measurement-based protocols cannot follow.

Kurt Jacobs; Xiaoting Wang; Howard M. Wiseman

2014-07-21T23:59:59.000Z

145

Technology transfer 1994  

SciTech Connect (OSTI)

This document, Technology Transfer 94, is intended to communicate that there are many opportunities available to US industry and academic institutions to work with DOE and its laboratories and facilities in the vital activity of improving technology transfer to meet national needs. It has seven major sections: Introduction, Technology Transfer Activities, Access to Laboratories and Facilities, Laboratories and Facilities, DOE Office, Technologies, and an Index. Technology Transfer Activities highlights DOE`s recent developments in technology transfer and describes plans for the future. Access to Laboratories and Facilities describes the many avenues for cooperative interaction between DOE laboratories or facilities and industry, academia, and other government agencies. Laboratories and Facilities profiles the DOE laboratories and facilities involved in technology transfer and presents information on their missions, programs, expertise, facilities, and equipment, along with data on whom to contact for additional information on technology transfer. DOE Offices summarizes the major research and development programs within DOE. It also contains information on how to access DOE scientific and technical information. Technologies provides descriptions of some of the new technologies developed at DOE laboratories and facilities.

Not Available

1994-01-01T23:59:59.000Z

146

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan, Vaidyanathan protocol for ad-hoc net- works called ATP (ad-hoc transport protocol). We show through ns2 based simulations that ATP outperforms both default TCP and TCP-ELFN. Categories and Subject Descriptors C.2

Sivakumar, Raghupathy

147

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

148

Utilisation des Protocoles HARQ pour la Radio Cognitive  

E-Print Network [OSTI]

Utilisation des Protocoles HARQ pour la Radio Cognitive Romain Tajan encadré/01/2012 #12;Plan 1 Introduction 2 La Radio Cognitive Techniques de la Radio Cognitive Méthodes d'accès 3 performances du protocole IR-HARQ 4 Utilisation des protocoles HARQ pour la Radio Cognitive Utilisation de l

Dobigeon, Nicolas

149

Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens,  

E-Print Network [OSTI]

to infinity. We call such protocols asymp- totic and the fraction of distilled Bell states per initial copy#12;#12;Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens, Jeroen: July 13, 2006) We present a new asymptotic bipartite entanglement distillation protocol

150

A Multi-Sender Asynchronous Extension to the AER Protocol  

E-Print Network [OSTI]

A Multi-Sender Asynchronous Extension to the AER Protocol John Lazzaro and John Wawrzynek Computer-event representation (AER) is an asynchronous point-to-point communi- cations protocol for silicon neural systems. This paper describes an extension of the AER protocol that allows multiple AER senders to share a common bus

Lazzaro, John

151

Using CSP for protocol analysis: the Needham-Schroeder  

E-Print Network [OSTI]

Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

Doran, Simon J.

152

The EMDEX Project: Technology transfer and occupational measurements  

SciTech Connect (OSTI)

The Electric and Magnetic Field Measurement Project for Utilities -- the EPRI EMDEX Project -- is a multifaceted project entailing technology transfer, measurement protocol design, data management, and exposure assessment analyses. The specific objectives of the project in order of priority were: to transfer the EMDEX technology to utilities; to develop measurement protocols and data management capabilities for large exposure data sets; and to collect, analyze, and document 60-Hz electric and magnetic field exposures for a diverse population. Transfer of the EPRI Electric and Magnetic Field Digital Exposure system (EMDEX) technology to the participating utilities was accomplished through training and through extensive involvement in the exposure data collection effort. Field exposure data measured by an EMDEX system were collected by volunteer utility employees at 59 sites in the US and three other countries between October 1988 and September 1989. Approximately 50,000 hours of magnetic field and 23,000 hours of electric field exposure records taken at 10-second intervals were obtained, of which 70% were from Work environments. Exposures and time spent in environments have been analyzed by Primary Work Environment, by occupied environment, and by job classification. Generally, the measured fields and exposures in the Generation, Transmission, Distribution and Substation environments were higher than in other occupational environments in utilities. The Nonwork fields and exposures for workers associated with various categories were comparable. Evaluation of the project by participants indicated general satisfaction with the EMDEX system and with this approach to technology transfer. This document, Volume 3 contains appendices with a complete set of project protocols, project materials, and extensive data tables.

Not Available

1990-11-01T23:59:59.000Z

153

Building America House Simulation Protocols (Revised)  

SciTech Connect (OSTI)

The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

Hendron, R.; Engebrecht, C.

2010-10-01T23:59:59.000Z

154

Lab protocols A. Preparation of competent Cells  

E-Print Network [OSTI]

for 30- 60 min. #12;Lab protocols C. Solutions RF1 Compound RbCl MnCl2 4H2O Potassium acetate CaCl2.2H2O-rinsed 0.22 u membrane. RF2 Compound MOPS RbCl CaCl2.2H2O Glycerol Amount/liter 20 ml of 0.5 M (pH6.8) 1

Oliver, Douglas L.

155

CREATION OF THE MODEL ADDITIONAL PROTOCOL  

SciTech Connect (OSTI)

In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

Houck, F.; Rosenthal, M.; Wulf, N.

2010-05-25T23:59:59.000Z

156

08/05/2011. Current Standard Operating Protocols (SOP), NCBS MS-Facility Proteomics Tryptic Digest Protocols  

E-Print Network [OSTI]

Digest Protocols Protocol: 1 Ingel Digestion Protocol with Incubation Overnight Reference: In-gel digestion for mass spectrometric characterization of proteins and proteomes. Shevchenko et al. Nature in vacuum centrifuge. 8. Samples are now ready for digestion. Alternatively, they can be stored at -20o C

Udgaonkar, Jayant B.

157

Technology Transfer Office November 2009  

E-Print Network [OSTI]

Technology Transfer Office November 2009 INVENTION AGREEMENT In consideration of my employment in writing to Dartmouth through the Technology Transfer Office any such discovery or invention and identify

Myers, Lawrence C.

158

Ames Lab 101: Technology Transfer  

ScienceCinema (OSTI)

Ames Laboratory Associate Laboratory Director, Sponsored Research Administration, Debra Covey discusses technology transfer. Covey also discusses Ames Laboratory's most successful transfer, lead-free solder.

Covey, Debra

2012-08-29T23:59:59.000Z

159

Ames Lab 101: Technology Transfer  

SciTech Connect (OSTI)

Ames Laboratory Associate Laboratory Director, Sponsored Research Administration, Debra Covey discusses technology transfer. Covey also discusses Ames Laboratory's most successful transfer, lead-free solder.

Covey, Debra

2010-01-01T23:59:59.000Z

160

VOLUNTARY LEAVE TRANSFER PROGRAM  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

VOLUNTARY LEAVE TRANSFER PROGRAM LIST Name Organization Fairbanks, Mary H. AU Garnett-Harris, Deborah A. AU James, Debra A. AU Johnston, Robyne AU May, Melanie P. AU Pickens,...

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


162

A Review of Perfect State Transfer and its Application as a Constructive Tool  

E-Print Network [OSTI]

We review the subject of perfect state transfer; how one designs the (fixed) interactions of a chain of spins so that a quantum state, initially inserted on one end of the chain, is perfectly transferred to the opposite end in a fixed time. The perfect state transfer systems are then used as a constructive tool to design Hamiltonian implementations of other primitive protocols such as entanglement generation and signal amplification in measurements, before showing that, in fact, universal quantum computation can be implemented in this way.

Alastair Kay

2010-06-16T23:59:59.000Z

163

https://pals.doe.gov/rptserver.asp  

Energy Savers [EERE]

1 Department of Energy FY 2014 Congressional Budget Request Laboratory Tables y Preliminary April 2013 Office of Chief Financial Officer DOECF-0091 Department of Energy FY 2014...

164

https://pals.doe.gov/rptserver.asp  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energyon ArmedWaste and Materials Disposition InformationWindWoodDepartmenteGallon: What1

165

https://pals.doe.gov/rptserver.asp  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energyon ArmedWaste and Materials Disposition InformationWindWoodDepartmenteGallon:

166

https://ndwis.ndep.nv.gov/DWW/  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Reviewwill help prepareA ReviewManualREMSCareersVersion 2.1

167

https://pals.doe.gov/rptserver.asp  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon Capture andDeepwaterfors67 From: JacksonIPI-1438/04 |1Laboratory

168

https://pals.doe.gov/rptserver.asp  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon Capture andDeepwaterfors67 From: JacksonIPI-1438/04

169

Proceedings of Heat Transfer 2003: ASME Summer Heat Transfer Conference  

E-Print Network [OSTI]

Proceedings of Heat Transfer 2003: ASME Summer Heat Transfer Conference Las Vegas, Nevada, USA July 21-23, 2003 HT2003-47449 HEAT TRANSFER FROM A MOVING AND EVAPORATING MENISCUS ON A HEATED SURFACE meniscus with complete evaporation of water without any meniscus break-up. The experimental heat transfer

Kandlikar, Satish

170

Resources, framing, and transfer p. 1 Resources, framing, and transfer  

E-Print Network [OSTI]

Resources, framing, and transfer p. 1 Resources, framing, and transfer David Hammer Departments. #12;Resources, framing, and transfer p. 2 Resources, framing, and transfer David Hammer, Andrew Elby of activating resources, a language with an explicitly manifold view of cognitive structure. In this chapter, we

Hammer, David

171

Analysis and behavioral modeling of the Finite State Machines of the Xpress Transfer Protocol  

E-Print Network [OSTI]

OF THE 3. 4 SPECIFICATION OF THE XTP FINITE STATE MACHINES . A. XTP Context Manager State Machine B. XTP Output State Machine C. XTP Sync State Machine. D. XTP Rate Control State Machine E. XTP Control-Send State Machine. . . F. XTP Input State... control parameters 26 II XTP context manager state transition table[12]. III XTP output state machine transition table [12]. IV XTP sync state machine transition table[12]. 40 V XTP rate control state machine transition table[12]. VI XTP control...

Madduri, Venkateswara Rao

1994-01-01T23:59:59.000Z

172

An ObjectOriented Implementation of the Xpress Transfer Protocol 1  

E-Print Network [OSTI]

, and CRADA No. 1136 between Sandia National Laboratories and AT&T Bell Labs. #12; This paper discusses

Strayer, William Timothy

173

An Object-Oriented Implementation of the Xpress Transfer Protocol1  

E-Print Network [OSTI]

, and CRADA No. 1 136 between Sandia National Laboratories and AT&T Bell Labs. #12;This paper discusses

Strayer, William Timothy

174

Design of the PSI connection processor for the Xpress transfer protocol  

E-Print Network [OSTI]

is retransrrrittcd data should uot preclude it frour checking whether tire remote application also has lost any data. It should not be the responsibility of the Input State Mact&inc Lo execute thc retcasecontezt. function. The state machine should signal the Wr&tc...

Brudeseth, Rolf

1994-01-01T23:59:59.000Z

175

Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols  

E-Print Network [OSTI]

................... 17 3 The flowchart of the proposed PSI protocol ........................................................... 30 4 The flowchart of the proposed SH protocol ............................................................ 50 5 A secret handshake protocol...-preserving element matching protocols ................................ 13 5 Comparison between PSI protocols ........................................................................ 33 6 Comparison between SH protocols...

Duan, Pu

2012-07-16T23:59:59.000Z

176

Soft-Decision-and-Forward Protocol for Cooperative Communication Networks Based on Alamouti Code  

E-Print Network [OSTI]

protocol called soft-decision-and- forward (SDF) is introduced. SDF protocol exploits the soft decision with low decoding complexity are proposed. From simulations, it can be seen that SDF protocol outperforms protocol called soft-decision- and-forward (SDF) is introduced. Unlike AF and DF protocols, SDF protocol

No, Jong-Seon

177

Technology transfer @ VUB Hugo Loosvelt  

E-Print Network [OSTI]

13/12/2012 Technology transfer @ VUB Hugo Loosvelt #12;VUB in Brussels www.vub.ac.be including or conclude licensing contracts #12;Technology transfer TTI assists academics to realise knowledge transfer by needed for R&D collaboration, licensing and spin-out company formation Technology transfer is the process

Steels, Luc

178

POSITION DESCRIPTION 2012 TRANSFER MENTOR  

E-Print Network [OSTI]

interest in the Transfer Mentor position with Orientation and Transition Programs' (OTP) Transfer Mentoring Program. The Transfer Mentor (TM) is a member of the Orientation and Transition Programs' staff to CSU including (but not limited to) helping transfer students explore study skills, time management

179

Richard Bland College Transfer Guide  

E-Print Network [OSTI]

and Technology-IDT Interdisciplinary Studies-IDS International Business-INBU International Studies-IS ItalianRichard Bland College Transfer Guide #12;Using the Transfer Guide Thank you for your interest in Old Dominion University!!! The ODU Transfer Guide is designed to assist students transferring to ODU

180

The EMDEX (Electric and Magnetic Field Digital Exposure) Project: Technology transfer and occupational measurements  

SciTech Connect (OSTI)

The Electric and Magnetic Field Measurement Project for Utilities -- the EPRI EMDEX Project -- is a multifaceted project entailing technology transfer, measurement protocol design, data management, and exposure assessment analyses. The specific objectives of the project in order to priority were: (1) to transfer the EMDEX technology to utilities; (2) to develop measurement protocols and data management capabilities for large exposure data sets; and (3) to collect, analyze, and document 60-Hz electric and magnetic field exposures for a diverse population. Transfer of the EPRI Electric and Magnetic Field Digital Exposure system (EMDEX) technology to the participating utilities was accomplished through training and through extensive involvement in the exposure data collection effort. Documentation of the EMDEX Project is contained in three volumes: Volume 1 summarizes the methods and results, and provides an assessment of project objectives; Volume 2 provides detailed descriptions of methods, procedures, protocols, materials and analyses, and Volume 3 contains appendices with a complete set of project protocols, project materials, and extensive data tables. 12 refs., 27 figs., 23 tabs.

Not Available

1990-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Privacy of encrypted Voice Over Internet Protocol  

E-Print Network [OSTI]

of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the gen- eration of tra c whenever the sender detects a voice inactivity period. We use the simple Bayesian classi er and the complex HMM... (Hidden Markov Models) classi er to evaluate the performance of our attack. Then we describe the usage of acoustic features in our attack to improve the performance. We conclude by presenting a number of problems that need in-depth study in order to be e...

Lella, Tuneesh Kumar

2008-10-10T23:59:59.000Z

182

2014 Building America House Simulation Protocols  

SciTech Connect (OSTI)

As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

2014-03-01T23:59:59.000Z

183

Security Proof of a Semi-Quantum Key Distribution Protocol  

E-Print Network [OSTI]

Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their security analysis is difficult and little is known concerning how secure they are compared to their fully quantum counterparts. In this paper we prove the unconditional security of a particular semi-quantum protocol. We derive an expression for the key rate of this protocol, in the asymptotic scenario, as a function of the quantum channel's noise. Finally, we will show that this semi-quantum protocol can tolerate a maximal noise level comparable to certain fully quantum protocols.

Walter O. Krawec

2014-11-30T23:59:59.000Z

184

Fibred Coalgebraic Logic and Quantum Protocols  

E-Print Network [OSTI]

Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

Daniel Marsden

2014-12-30T23:59:59.000Z

185

Chapter 18: Variable Frequency Drive Evaluation Protocol  

SciTech Connect (OSTI)

An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

Romberger, J.

2014-11-01T23:59:59.000Z

186

Separable states improve protocols with restricted randomness  

E-Print Network [OSTI]

It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterise the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models and separable, i.e. disentangled, states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that in particular, separable states may improve the so-called random access codes, which is a class of communication problems where one party tries to read a portion of the data held by another distant party in presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord.

T. K. Chuan; T. Paterek

2014-10-07T23:59:59.000Z

187

Device-independent entanglement-based Bennett 1992 protocol  

E-Print Network [OSTI]

In this paper we set forth a novel connection between the Bennett 1992 protocol and a Bell inequality. This allows us to extend the usual prepare-and-measure protocol to its entanglement-based formulation. We exploit a recent result in the frame of device-independent quantum key distribution to provide a simple, model-independent, security proof for the new protocol. The minimum efficiency required for a practical implementation of the scheme is the lowest reported to date.

Marco Lucamarini; Giuseppe Vallone; Ilaria Gianani; Giovanni Di Giuseppe; Paolo Mataloni

2012-10-05T23:59:59.000Z

188

ASHRAE's New Performance Measurement Protocols for Commercial Buildings  

E-Print Network [OSTI]

Services Administration. 10 IEA is the International Energy Agency. ESL-IC-08-10-11 Proceedings of the Eighth International Conference for Enhanced Building Operations, Berlin, Germany, October 20-22, 2008 2 The resultant protocols are intended to provide... Building Operations, Berlin, Germany, October 20-22, 2008 3 Chapter 1: Energy (Authors: MacDonald, Haberl). In Chapter 1 the protocols for measuring the building?s energy useare presented. These protocols begin with acollection of facility information...

Haberl, J.; Davies, H.; Owens, B.; Hunn, B.

189

DOE Transportation Protocols Topic Group Summary of Second Conference  

Broader source: Energy.gov (indexed) [DOE]

Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

190

DOE Transportation Protocols Topic Group Conference Call Summary...  

Broader source: Energy.gov (indexed) [DOE]

Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TECWG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the...

191

Decentralized Decision-making and Protocol Design for Recycled ...  

E-Print Network [OSTI]

Decentralized Decision-making and Protocol. Design for Recycled Material Flows. Reverse logistics networks often consist of several tiers with independent

ihong

2006-07-24T23:59:59.000Z

192

The Greenhouse Gas Protocol Initiative: Allocation of Emissions...  

Open Energy Info (EERE)

Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Allocation of...

193

A search for quantum coin-flipping protocols using optimization ...  

E-Print Network [OSTI]

Mar 3, 2014 ... We conduct two kinds of search: one for protocols. ?Department of ..... This operation maps a probability vector to a quantum state, see Sub-.

2014-03-02T23:59:59.000Z

194

Formal Modelling and Analysis of the NORM Multicast Protocol  

E-Print Network [OSTI]

Formal Modelling and Analysis of the NORM Multicast Protocol Using Real-Time Maude Elisabeth Lien . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 iii #12;2.3.2 Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Ă?lveczky, Peter Csaba

195

aureus decolonisation protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

196

addfam study protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

197

antineoplastic combined chemotherapy protocols: Topics by E-print...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

198

afinos study protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

199

agrobacterium-mediated transformation protocol: Topics by E-print...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

200

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Broader source: Energy.gov (indexed) [DOE]

CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) March 2007 Fuel cells, especially for...

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Broader source: Energy.gov (indexed) [DOE]

USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May...

202

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased...  

Open Energy Info (EERE)

Purchased Electricity Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity AgencyCompany...

203

BPA Response to Comments on Oversupply Management Protocol  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Wind energy producers, regional utilities, interest groups and others submitted approximately 90 comments on Bonneville Power Administration's Feb. 7 proposed protocol for...

204

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Broader source: Energy.gov (indexed) [DOE]

Accelerated Ash-Loading Protocol for Diesel Particulate Filters Bruce G. Bunting and Todd J. Toops Oak Ridge National Laboratory Adam Youngquist and Ke Nguyen University of...

205

NEMVP: North American energy measurement and verification protocol  

SciTech Connect (OSTI)

This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

NONE

1996-03-01T23:59:59.000Z

206

Urban Sewage Delivery Heat Transfer System (2): Heat Transfer  

E-Print Network [OSTI]

The thimble delivery heat-transfer (TDHT) system is one of the primary modes to utilize the energy of urban sewage. Using the efficiency-number of transfer units method ( ), the heat-transfer efficiencies of the parallel-flow and reverse-flow TDTH...

Zhang, C.; Wu, R.; Li, X.; Li, G.; Zhuang, Z.; Sun, D.

2006-01-01T23:59:59.000Z

207

Faculty Positions Heat Transfer and  

E-Print Network [OSTI]

Faculty Positions Heat Transfer and Thermal/Energy Sciences Naval Postgraduate School Monterey-track faculty position at the assistant professor level in the areas of Heat Transfer and Thermal/Fluid Sciences

208

WCD WHIMS  

Energy Science and Technology Software Center (OSTI)

003189WKSTN00 ProDeGe: A Computational Protocol for fully Automated Decontamination of Genomic Data  https://sourceforge.net/projects/singlecelldecontamination/ 

209

Plastic container bagless transfer  

DOE Patents [OSTI]

A process and apparatus are provided for transferring material from an isolated environment into a storage carrier through a conduit that can be sealed with a plug. The plug and conduit can then be severed to provide a hermetically sealed storage carrier containing the material which may be transported for storage or disposal and to maintain a seal between the isolated environment and the ambient environment.

Tibrea, Steven L.; D'Amelio, Joseph A.; Daugherty, Brent A.

2003-11-18T23:59:59.000Z

210

Analysis of the Impact of Hello Protocol Parameters over a Wireless Network Self-Organization  

E-Print Network [OSTI]

Analysis of the Impact of Hello Protocol Parameters over a Wireless Network Self of the HELLO protocol. This makes this HELLO protocol very important for wireless networks especially for self- organizing the network. Most of layer-3 protocols assume an ideal MAC layer. In such a case, HELLO protocol

Paris-Sud XI, Université de

211

Energy Aware Implementation of an Ad Hoc Routing Protocol  

E-Print Network [OSTI]

estimates of the potential for energy savings. We show potential savings of fifty six percent in energy functions of an energy aware ad hoc routing protocol are · Energy based link cost with transmit powerEnergy Aware Implementation of an Ad Hoc Routing Protocol by Shweta Bhandare Scriptor B

Brown, Timothy X.

212

Field and Lab Methods & Protocols University of Michigan  

E-Print Network [OSTI]

SAFETY AND ORDERING PROCEDURES 309 (VIII-4) HAZARDOUS MATERIALS AND WASTE 313 (VIII-5) PRINTERS 315 (VIIIField and Lab Methods & Protocols Kling Lab University of Michigan Updated: December 2012 In use from: May 2012 Protocol version: v2.9 Last update: 8 November 2013 1 #12;LAST UPDATE: 29 MAY 2013 1

Kling, George W.

213

Adaptive Data Collection Protocol using Reinforcement Learning for VANETs  

E-Print Network [OSTI]

Adaptive Data Collection Protocol using Reinforcement Learning for VANETs Ahmed Soua, and Hossam. Here, an Adap- tive Data cOllection Protocol using rEinforcement Learning (ADOPEL) is proposed that drivers can be alerted in advance. Since each vehicle in a vehicular environment can detect a hazardous

Boyer, Edmond

214

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

215

Evaluation des performances des protocoles de routage Ad hoc  

E-Print Network [OSTI]

Evaluation des performances des protocoles de routage Ad hoc Abdelali Boushaba1 , Mohammed Oumsis2 quatre protocoles de routage Ad hoc: DSR, AODV, OLSR et DSDV et d'autre part, d'examiner l'impact de la'activité. Mots-clés--Réseaux mobiles Ad hoc; DSR; AODV; DSDV; OLSR; évaluation des performances; simulation, NS-2

Paris-Sud XI, Université de

216

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks Yu Chen Google, UK chenyu in ad hoc networks. In our protocol, each node that has been assigned an address manages a disjoint of node's degree, regardless of the network size. I. INTRODUCTION A wireless mobile ad hoc network

Paris-Sud XI, Université de

217

Internet Protocol Adoption: Learning from Bitcoin Position Paper  

E-Print Network [OSTI]

This position paper discusses two related questions: 1. Using the framework of network economics, what are success factors behind the adoption of Bitcoin (a cryptographic curreny), and can we copy them for other protocols? 2. Can we design more successful protocols if we have inband payment mechanisms to internalize the externalities that emerge during adoption and in steady state? 1.

Rainer Böhme; Westfälische Wilhelms-universität Münster

218

A Locationaided Poweraware Routing Protocol in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

­hop wireless ad­hoc networks, designing energy­efficient rout­ ing protocols is critical since nodes are power be mobile, demanding the energy­efficient routing protocol to be fully distributed and adaptive­ spect to end­to­end energy­efficient routes. Finally, preliminary simulation results are presented

Nahrstedt, Klara

219

Uniform Leader Election Protocols for Radio Networks Koji Nakano  

E-Print Network [OSTI]

Uniform Leader Election Protocols for Radio Networks #3; Koji Nakano School of Information Science be distinguished by serial or manufacturing number. The leader election problem asks to designate one of the station as leader. A leader election protocol is said to be uniform if in each time slot every station

Nakano, Koji

220

Hello Again: Stabilization of the Hello Protocol in OSPF  

E-Print Network [OSTI]

Hello Again: Stabilization of the Hello Protocol in OSPF Jorge A. Cobb Mohamed G. Gouda Deepinder Sidhu § Abstract The Hello protocol in OSPF allows each router in a network to check whether it can periodi- cally send hello messages to every neighboring router in the network. Associated with the Hello

Cobb, Jorge Arturo

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Multi-Gas Assessment of the Kyoto Protocol John Reilly,*  

E-Print Network [OSTI]

Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

222

Modelling unbounded parallel sessions of security protocols in CSP  

E-Print Network [OSTI]

Modelling unbounded parallel sessions of security protocols in CSP E. Kleiner and A.W. Roscoe that a simplification to earlier CSP models designed to prove protocols correct on the FDR model checker is valid of injective authentication. Essentially for historical reasons, that paper created a model with both

Roscoe, Bill

223

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #  

E-Print Network [OSTI]

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

Kulkarni, Sandeep

224

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks  

E-Print Network [OSTI]

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

Kulkarni, Sandeep

225

5. Heat transfer Ron Zevenhoven  

E-Print Network [OSTI]

1/120 5. Heat transfer Ron Zevenhoven �bo Akademi University Thermal and Flow Engineering / Värme Three heat transfer mechanisms Conduction Convection Radiation 2/120 Pic: B�88 �bo Akademi University | Thermal and Flow Engineering | 20500 Turku | Finland #12;3/120 5.1 Conductive heat transfer �bo Akademi

Zevenhoven, Ron

226

Technology Transfer Ombudsman Program | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Technology Transfer Ombudsman Program Technology Transfer Ombudsman Program The Technology Transfer Commercialization Act of 2000, Public Law 106-404 (PDF) was enacted in November...

227

Improved protocols of secure quantum communication using W states  

E-Print Network [OSTI]

Recently, Hwang et al. [Eur. Phys. J. D. 61, 785 (2011)] and Yuan et al. [Int. J. Theo. Phys. 50, 2403 (2011)] have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.

Chitra Shukla; Anindita Banerjee; Anirban Pathak

2012-04-20T23:59:59.000Z

228

Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)  

E-Print Network [OSTI]

the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

Thomas, Andrew

229

ANSP Protocols for Analysis of NAWQA Algae Samples Protocol P-13-57 Patrick Center for Environmental Research 117  

E-Print Network [OSTI]

of associated pressure gauges, and monitor the volume of gas left in the tank. Replace cylinders as needed. Any hoods. 3.1.4. Gas suspension tables. 3.1.5. Slide warmers/hot plates. 3.2. Chemistry Laboratory. 3 recommended. Periodically clean oil #12;ANSP Protocols for Analysis of NAWQA Algae Samples Protocol P-13

Charles, Donald

230

An Experimental Implementation of Oblivious Transfer in the Noisy Storage Model  

E-Print Network [OSTI]

Cryptography's importance in our everyday lives continues to grow in our increasingly digital world. Oblivious transfer (OT) has long been a fundamental and important cryptographic primitive since it is known that general two-party cryptographic tasks can be built from this basic building block. Here we show the experimental implementation of a 1-2 random oblivious transfer (ROT) protocol by performing measurements on polarization-entangled photon pairs in a modified entangled quantum key distribution system, followed by all of the necessary classical post-processing including one-way error correction. We successfully exchange a 1,366 bits ROT string in ~3 min and include a full security analysis under the noisy storage model, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of using today's quantum technologies to implement secure two-party protocols.

C. Erven; Nelly Huei Ying Ng; N. Gigov; R. Laflamme; S. Wehner; G. Weihs

2014-05-18T23:59:59.000Z

231

Wireless Power Transfer  

SciTech Connect (OSTI)

Wireless Power Transfer is an innovative approach using magnetic resonance coupling of air core transformers designed for today's growing plug-in electric vehicle market. This technology can provide a convenient, safe and flexible means to charge electric vehicles under stationary and dynamic conditions. Plug-in Electric Vehicles (PEV) are burdened by the need for cable and plug charger, galvanic isolation of the on-board electronics, bulk and cost of this charger and the large energy storage system (ESS) packs needed. With a system where you have to physically plug in there are a number of occasions where the owner could very well forget to charge the vehicle. For stationary applications (like charging of a PHEV at home), ORNL's innovative wireless power transfer technology adds a convenience factor compared to actually plugging in which will mean that the vehicle will have a full charge every morning. Electric vehicle charging must be safe, compact and efficient in order to be convenient for customers. By reconfiguring the transformer and altering the resonance frequency, energy is transferred to the battery with lower energy losses and with fewer demands on the primary circuit by the rest of the transformer system. The ORNL discovery shows that sufficient power for the battery can be transferred from the primary to secondary circuits without significant energy losses if the operating frequency is set at 50% to 95% of the resonance frequency of the circuit. The electrical power is then transmitted to the chargeable battery, which is electrically coupled to the secondary circuit through the air core transformer. Some advantages include: Reduced energy losses during transfer of energy to the battery; A charge potential that is relatively unaffected by up to 25% misalignment of vehicle; and Other receiving components draw less power from the primary circuit. These advantages allow wireless power technology applications to expand at the workplace and beyond as the demand for EV rises. For vehicles that operate over a fixed route such as busses and shuttle vehicles, Wireless Power Transfer (WPT) means that a smaller battery pack can be used. In the traditional system, the battery pack is designed to accommodate the needs of the entire route or shift. With WPT the battery can be downsized because it can be charged when the vehicle stops on its route (a rental car shuttle bus, for example, can charge when it waits in the terminal and again when it waits at the rental car place. Thus the battery only needs enough charge to get to the next stop. This decrease in battery size means significant cost savings to electrify the vehicle. This technology enables efficient "opportunity charging stations" for predefined routes and planned stops reducing down time. Charging can occur in minutes. This improvement also eliminates the harmful emissions that occur in garages while buses are at idle during charging. In larger cities, dynamic charging offers an even greater impact utilizing existing infrastructure. As vehicles travel along busy freeways and interstate systems, wireless charging can occur while the vehicle is in motion. With this technology a vehicle essentially has unlimited electric range while using a relatively small battery pack. In-motion charging stations use vehicle sensors to alert the driver. Traveling at normal speeds, sensors establish in-motion charging. WPT transmit pads sequentially energize to the negotiated power level based on vehicle speed and its requested charging energy. Lower power when vehicle speed is slow and much higher power for faster moving vehicles. Vehicle to Infrastructure communications (V2I) coordinates WPT charging level according to on-board battery pack state-of-charge. V2I activates the roadway transmit pads placing them in standby mode and negotiates charging fee based on prevailing grid rate and vehicle energy demand. Dynamic charging would allow electricity to supply a very large fraction of the energy for the transportation sector and reduce greatly petroleum consump

None

2013-07-22T23:59:59.000Z

232

Wireless Power Transfer  

ScienceCinema (OSTI)

Wireless Power Transfer is an innovative approach using magnetic resonance coupling of air core transformers designed for today's growing plug-in electric vehicle market. This technology can provide a convenient, safe and flexible means to charge electric vehicles under stationary and dynamic conditions. Plug-in Electric Vehicles (PEV) are burdened by the need for cable and plug charger, galvanic isolation of the on-board electronics, bulk and cost of this charger and the large energy storage system (ESS) packs needed. With a system where you have to physically plug in there are a number of occasions where the owner could very well forget to charge the vehicle. For stationary applications (like charging of a PHEV at home), ORNL's innovative wireless power transfer technology adds a convenience factor compared to actually plugging in which will mean that the vehicle will have a full charge every morning. Electric vehicle charging must be safe, compact and efficient in order to be convenient for customers. By reconfiguring the transformer and altering the resonance frequency, energy is transferred to the battery with lower energy losses and with fewer demands on the primary circuit by the rest of the transformer system. The ORNL discovery shows that sufficient power for the battery can be transferred from the primary to secondary circuits without significant energy losses if the operating frequency is set at 50% to 95% of the resonance frequency of the circuit. The electrical power is then transmitted to the chargeable battery, which is electrically coupled to the secondary circuit through the air core transformer. Some advantages include: Reduced energy losses during transfer of energy to the battery; A charge potential that is relatively unaffected by up to 25% misalignment of vehicle; and Other receiving components draw less power from the primary circuit. These advantages allow wireless power technology applications to expand at the workplace and beyond as the demand for EV rises. For vehicles that operate over a fixed route such as busses and shuttle vehicles, Wireless Power Transfer (WPT) means that a smaller battery pack can be used. In the traditional system, the battery pack is designed to accommodate the needs of the entire route or shift. With WPT the battery can be downsized because it can be charged when the vehicle stops on its route (a rental car shuttle bus, for example, can charge when it waits in the terminal and again when it waits at the rental car place. Thus the battery only needs enough charge to get to the next stop. This decrease in battery size means significant cost savings to electrify the vehicle. This technology enables efficient "opportunity charging stations" for predefined routes and planned stops reducing down time. Charging can occur in minutes. This improvement also eliminates the harmful emissions that occur in garages while buses are at idle during charging. In larger cities, dynamic charging offers an even greater impact utilizing existing infrastructure. As vehicles travel along busy freeways and interstate systems, wireless charging can occur while the vehicle is in motion. With this technology a vehicle essentially has unlimited electric range while using a relatively small battery pack. In-motion charging stations use vehicle sensors to alert the driver. Traveling at normal speeds, sensors establish in-motion charging. WPT transmit pads sequentially energize to the negotiated power level based on vehicle speed and its requested charging energy. Lower power when vehicle speed is slow and much higher power for faster moving vehicles. Vehicle to Infrastructure communications (V2I) coordinates WPT charging level according to on-board battery pack state-of-charge. V2I activates the roadway transmit pads placing them in standby mode and negotiates charging fee based on prevailing grid rate and vehicle energy demand. Dynamic charging would allow electricity to supply a very large fraction of the energy for the transportation sector and reduce greatly petroleum consump

None

2013-11-19T23:59:59.000Z

233

Shortcomings of the Cartagena Protocol: Resolving the Liability Loophole at an International Level  

E-Print Network [OSTI]

Protocol both focus on the effects of transboundary shipping, hazardous wasteProtocol on Liability and Compensation for Damage Resulting from Transboundary Movements of Hazardous Wasteshazardous wastes and other wastes subject to the Convention. The Cartagena Protocol

Kohm, Katherine E.

2009-01-01T23:59:59.000Z

234

Data Transfer Examples  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINL is aID Service First DOIData Transfer»

235

Transfers | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyThe Sun andDepartment ofFanTransactive1/08Transfers

236

Transfer reactions at ATLAS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2Topo II: AnTraining andfor a CleanTransfer Service

237

NREL: Technology Transfer - Ombuds  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andData and ResourcesOther FederalNicheTechnology Transfer Ombuds

238

RADCAL Operations Manual Radiation Calibration Laboratory Protocol  

SciTech Connect (OSTI)

The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

Bogard, J.S.

1998-12-01T23:59:59.000Z

239

Polarization transfer NMR imaging  

DOE Patents [OSTI]

A nuclear magnetic resonance (NMR) image is obtained with spatial information modulated by chemical information. The modulation is obtained through polarization transfer from a first element representing the desired chemical, or functional, information, which is covalently bonded and spin-spin coupled with a second element effective to provide the imaging data. First and second rf pulses are provided at first and second frequencies for exciting the imaging and functional elements, with imaging gradients applied therebetween to spatially separate the nuclei response for imaging. The second rf pulse is applied at a time after the first pulse which is the inverse of the spin coupling constant to select the transfer element nuclei which are spin coupled to the functional element nuclei for imaging. In a particular application, compounds such as glucose, lactate, or lactose, can be labeled with .sup.13 C and metabolic processes involving the compounds can be imaged with the sensitivity of .sup.1 H and the selectivity of .sup.13 C.

Sillerud, Laurel O. (Los Alamos, NM); van Hulsteyn, David B. (Santa Fe, NM)

1990-01-01T23:59:59.000Z

240

E-Print Network 3.0 - aided routing protocol Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for: aided routing protocol Page: << < 1 2 3 4 5 > >> 1 Routing Protocols for Mobile Ad-hoc Networks: Current Development and Evaluation Summary: network. LAR: Location Aided...

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

E-Print Network 3.0 - applicable protocol fails Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

identical protocol is used for different purposes ... Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 2 Protocol Interactions and...

242

Tomography increases key rates of quantum-key-distribution protocols  

E-Print Network [OSTI]

We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

2008-07-22T23:59:59.000Z

243

Parallel decomposition of the logical link control protocol  

E-Print Network [OSTI]

INTRODUCTION II PROTOCOLS AND FINITE STATE MACHINES A. PROTOCOLS B. FINITE STATE MACHINES III LOGICAL LINK CONTROL PROTOCOL 1V LLC STATE TABLE DESCRIPTION A. LLC STATES V THE PS I ARCHITECTURE VI RESULTS A. LINK INITIALIZATION SUBMACHINES . . B... expressions that govern the transition are given below Bin I (A) SET ABME+ SET ABME (Ts=Vc=O, Vi=0) + SET ABME (Ts=Vc&, Vi =RIp). (B) DEACTIVATE LS. (G) ENTER LCL Busy + EXIT LCL Busy + LPDU Invalid + SEND XID + SET ADM+ Ti Expired+ Tl Expired+ TEST LINK...

Bajpai, Dhruv Haribanshnath

1991-01-01T23:59:59.000Z

244

Protocol for secure quantum machine learning at a distant place  

E-Print Network [OSTI]

The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A tradeoff between the inaccuracy and the learning time is also analyzed.

Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

2015-04-20T23:59:59.000Z

245

Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol  

SciTech Connect (OSTI)

This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

Osterwald, C. R.

2008-03-01T23:59:59.000Z

246

Proposals for Non-PGM Catalyst Target and Test Protocols  

Broader source: Energy.gov (indexed) [DOE]

Fuel Cell Tech Team Proposals for Non-PGM catalyst target and test protocols FCTT (USCAR) Shinichi Hirano (co-chair), Tarek Abdel-Baset, Balsu Lakshmanan, David Masten, Mark...

247

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard  

E-Print Network [OSTI]

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard Department of Computer Science (AA- MAS 2013), Ito, Jonker, Gini, and Shehory (eds.), May, 6­10, 2013, Saint Paul, Minnesota, USA

248

A scalable protocol for the synthesis and use of neomenthyldiphenylphosphine.  

E-Print Network [OSTI]

A scalable and reproducible protocol has been developed for the preparation of (-)- neomenthyldiphenylphosphine ((-)-1) from inexpensive starting materials. This ligand was then utilized in the nickel-catalyzed reductive ...

Van Dyke, Aaron R. (Aaron Robert)

2009-01-01T23:59:59.000Z

249

The Cost of Kyoto Protocol Targets: The Case of Japan  

E-Print Network [OSTI]

This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

Paltsev, Sergey.

250

Dynamic address allocation protocols for Mobile ad hoc networks  

E-Print Network [OSTI]

Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

Patchipulusu, Praveena

2001-01-01T23:59:59.000Z

251

Heat transfer probe  

DOE Patents [OSTI]

Apparatuses, systems, methods, and computer code for, among other things, monitoring the health of samples such as the brain while providing local cooling or heating. A representative device is a heat transfer probe, which includes an inner channel, a tip, a concentric outer channel, a first temperature sensor, and a second temperature sensor. The inner channel is configured to transport working fluid from an inner inlet to an inner outlet. The tip is configured to receive at least a portion of the working fluid from the inner outlet. The concentric outer channel is configured to transport the working fluid from the inner outlet to an outer outlet. The first temperature sensor is coupled to the tip, and the second temperature sensor spaced apart from the first temperature sensor.

Frank, Jeffrey I.; Rosengart, Axel J.; Kasza, Ken; Yu, Wenhua; Chien, Tai-Hsin; Franklin, Jeff

2006-10-10T23:59:59.000Z

252

Technology transfer 1995  

SciTech Connect (OSTI)

Technology Transfer 1995 is intended to inform the US industrial and academic sectors about the many opportunities they have to form partnerships with the US Department of Energy (DOE) for the mutual advantage of the individual institutions, DOE, and the nation as a whole. It also describes some of the growing number of remarkable achievements resulting from such partnerships. These partnership success stories offer ample evidence that Americans are learning how to work together to secure major benefits for the nation--by combining the technological, scientific, and human resources resident in national laboratories with those in industry and academia. The benefits include more and better jobs for Americans, improved productivity and global competitiveness for technology-based industries, and a more efficient government laboratory system.

Not Available

1995-01-01T23:59:59.000Z

253

Comparison of two wireless ad hoc routing protocols on a hardware test-bed  

E-Print Network [OSTI]

. These protocols are tested predominately using software simulation. Very few implementations have demonstratedComparison of two wireless ad hoc routing protocols on a hardware test-bed Shweta Bhandare (DSR) protocol and our Energy Aware Dynamic Source Routing protocol (EADSR). The implementation

Brown, Timothy X.

254

An Efficient Query Tree Protocol for RFID Tag Anti-Collision  

E-Print Network [OSTI]

An Efficient Query Tree Protocol for RFID Tag Anti-Collision Ming-Kuei Yeh National Taipei Query Tree (EQT) protocol to improve both the Query Tree (QT) protocol and the Collision Tree (CT and the energy consumption is lessened. In the EQT protocol, the timeslots structure, the query and responses

Jiang, Jehn-Ruey

255

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol and several new active

Schneier, Bruce

256

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol and several new active

Schneier, Bruce

257

Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches  

E-Print Network [OSTI]

Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient. Here, we have shown that the efficiency of Hassanpour Houshmand (HH) protocol is not high, and there exist several approaches through which more efficient protocols for the same task can be designed. To establish this point, we have proposed an efficient protocol of controlled deterministic secure quantum communication which is based on permutation of particles (PoP) technique and is considerably efficient compared to HH protocol. We have also generalized this protocol into its bidirectional counterpart. Interestingly, bipartite entanglement (Bell state) is sufficient for the realization of the proposed protocols, but HH protocol and other existing protocols require at least tripartite entanglement. Further, we have shown that it is possible to construct a large number of efficient protocols of unidirectional and bidirectional controlled deterministic secure quantum communication by using various alternative approaches and different quantum states. These alternative protocols can be realized by modifying the existing protocols of quantum secure direct communication and deterministic secure quantum communication. We have also shown that it is possible to design completely orthogonal-state-based protocols for unidirectional and bidirectional controlled deterministic secure quantum communication.

Anirban Pathak

2014-11-24T23:59:59.000Z

258

New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless  

E-Print Network [OSTI]

New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

Jain, Raj

259

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network [OSTI]

renewable energy. Instead, the Kyoto Protocol CDM process encourages carbon reduction in developing countries,

Ferrey, Steven

2010-01-01T23:59:59.000Z

260

THE UNLV FOUNDATION MONETARY TRANSFER FORM  

E-Print Network [OSTI]

THE UNLV FOUNDATION MONETARY TRANSFER FORM (Use one form for each account) Date Department Amount Transfer from Foundation Account Name UNLV Foundation Foundation Account Number Transfer to University contributions to this fund were accepted. Multiple Transfer A monetary transfer from the UNLV Foundation

Hemmers, Oliver

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

A Simplified Hierarchical Dynamic Quantum Secret Sharing Protocol with Added Features  

E-Print Network [OSTI]

Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.

Sandeep Mishra; Chitra Shukla; Anirban Pathak; R. Srikanth; Anu Venugopalan

2014-09-06T23:59:59.000Z

262

Proton-Coupled Electron Transfer  

SciTech Connect (OSTI)

Proton-Coupled Electron Transfer (PCET) describes reactions in which there is a change in both electron and proton content between reactants and products. It originates from the influence of changes in electron content on acid?base properties and provides a molecular-level basis for energy transduction between proton transfer and electron transfer. Coupled electron?proton transfer or EPT is defined as an elementary step in which electrons and protons transfer from different orbitals on the donor to different orbitals on the acceptor. There is (usually) a clear distinction between EPT and H-atom transfer (HAT) or hydride transfer, in which the transferring electrons and proton come from the same bond. Hybrid mechanisms exist in which the elementary steps are different for the reaction partners. EPT pathways such as PhO•/PhOH exchange have much in common with HAT pathways in that electronic coupling is significant, comparable to the reorganization energy with H{sub DA} ~ ?. Multiple-Site Electron?Proton Transfer (MS-EPT) is an elementary step in which an electron?proton donor transfers electrons and protons to different acceptors, or an electron?proton acceptor accepts electrons and protons from different donors. It exploits the long-range nature of electron transfer while providing for the short-range nature of proton transfer. A variety of EPT pathways exist, creating a taxonomy based on what is transferred, e.g., 1e{sup -}/2H{sup +} MS-EPT. PCET achieves “redox potential leveling” between sequential couples and the buildup of multiple redox equivalents, which is of importance in multielectron catalysis. There are many examples of PCET and pH-dependent redox behavior in metal complexes, in organic and biological molecules, in excited states, and on surfaces. Changes in pH can be used to induce electron transfer through films and over long distances in molecules. Changes in pH, induced by local electron transfer, create pH gradients and a driving force for long-range proton transfer in Photosysem II and through other biological membranes. In EPT, simultaneous transfer of electrons and protons occurs on time scales short compared to the periods of coupled vibrations and solvent modes. A theory for EPT has been developed which rationalizes rate constants and activation barriers, includes temperature- and driving force (?G)-dependences implicitly, and explains kinetic isotope effects. The distance-dependence of EPT is dominated by the short-range nature of proton transfer, with electron transfer being far less demanding.Changes in external pH do not affect an EPT elementary step. Solvent molecules or buffer components can act as proton donor acceptors, but individual H2O molecules are neither good bases (pK{sub a}(H{sub 3}O{sup +}) = ?1.74) nor good acids (pK{sub a}(H{sub 2}O) = 15.7). There are many examples of mechanisms in chemistry, in biology, on surfaces, and in the gas phase which utilize EPT. PCET and EPT play critical roles in the oxygen evolving complex (OEC) of Photosystem II and other biological reactions by decreasing driving force and avoiding high-energy intermediates.

Weinberg, Dave; Gagliardi, Christopher J.; Hull, Jonathan F; Murphy, Christine Fecenko; Kent, Caleb A.; Westlake, Brittany C.; Paul, Amit; Ess, Daniel H; McCafferty, Dewey Granville; Meyer, Thomas J

2012-01-01T23:59:59.000Z

263

TECH TRANSFER TECHNOLOGY TRANSFER PROGRAM INSTITUTE OF TRANSPORTATION STUDIES UNIVERSITY OF CALIFORNIA, BERKELEY  

E-Print Network [OSTI]

TECH TRANSFER TECHNOLOGY TRANSFER PROGRAM · INSTITUTE OF TRANSPORTATION STUDIES · UNIVERSITY THURSDAY SATURDAYFRIDAYWEDNESDAYTUESDAY TECHNOLOGY TRANSFER PROGRAM · INSTITUTE OF TRANSPORTATION STUDIES's to another year of working safer and smarter. Laura Melendy Director, Technology Transfer Program #12;AUGUST

California at Berkeley, University of

264

Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols  

SciTech Connect (OSTI)

Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

2013-05-01T23:59:59.000Z

265

Summary Report on Federal Laboratory Technology Transfer  

E-Print Network [OSTI]

Summary Report on Federal Laboratory Technology Transfer Agency Approaches; FY 2001 Activity Metrics and Outcomes 2002 Report to the President and the Congress under the Technology Transfer: FEDERAL LAB TECHNOLOGY TRANSFER TABLE OF CONTENTS LIST OF FIGURES AND TABLES

Perkins, Richard A.

266

Protocol development for evaluation of commercial catalytic cracking catalysts  

SciTech Connect (OSTI)

A complete, new set of testing protocols has been developed for qualification of catalysts for Ashland's commercial catalytic cracking units. The objective of this test development is to identify new generations of improved cracking catalysts. Prior test protocols have classically utilized microactivity (MAT) testing of steamed virgin catalysts, while more advanced methods have utilized fixed fluid bed and/or circulating pilot units. Each of these techniques, however, have been limited by their correlation to commercial operations, weaknesses in metallation and preparation of pseudo-equilibrium catalysts, and mechanical constraints on the use of heavy, vacuum bottoms-containing feedstocks. These new protocols have been baselined, compared to commercial Ashland results on known catalytic cracking catalysts, and utilized to evaluate a range of potentially new catalyst samples.

Mitchell, M.M. Jr.; Moore, H.F. (Ashland Petroleum Co., KY (USA))

1988-09-01T23:59:59.000Z

267

A practical approach to the interGroup protocols  

SciTech Connect (OSTI)

Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

Berket, Karlo; Agarwal, Deborah A.; Chevassut, Olivier

2001-11-12T23:59:59.000Z

268

Routing Protocols for Cognitive Radio Networks: A Survey  

E-Print Network [OSTI]

with the cognitive radio (CR) technology, a wireless system can exploit opportunistically the radio spectrum licensed to other systems. Thus, CR is regarded as a solution to the problems resulting from the limited available spectrum and the inefficiency in the spectrum usage. The multi-hop CR networks need some novel routing algorithms taking the open spectrum phenomenon into account. The main approach in designing the routing algorithm for the CR networks is the joint design of routing and spectrum management. Works on such issues have just started and are still in a rudimentary stage. In this paper, we survey comprehensively the existing research on the routing protocols for CR networks, especially with reference to CR ad hoc networks. We classify the routing protocols, discuss the essential features of the different protocols, and provide the future research directions.

Kamruzzaman, S M

2010-01-01T23:59:59.000Z

269

Shear Transformation Zones: State Determined or Protocol Dependent?  

E-Print Network [OSTI]

The concept of a Shear Transformation Zone (STZ) refers to a region in an amorphous solid that undergoes a plastic event when the material is put under an external mechanical load. An important question that had accompanied the development of the theory of plasticity in amorphous solids for many years now is whether an STZ is a {\\em region} existing in the material (which can be predicted by analyzing the unloaded material), or is it an {\\em event} that depends on the loading protocol (i.e., the event cannot be predicted without following the protocol itself). In this Letter we present strong evidence that the latter is the case. Infinitesimal changes of protocol result in macroscopically big jumps in the positions of plastic events, meaning that these can never be predicted from considering the unloaded material.

Oleg Gendelman; Prabhat K. Jaiswal; Itamar Procaccia; Bhaskar Sen Gupta; Jacques Zylberg

2014-08-18T23:59:59.000Z

270

MODERN DEVELOPMENTS IN MULTIPHASE FLOW & HEAT TRANSFER  

E-Print Network [OSTI]

MODERN DEVELOPMENTS IN MULTIPHASE FLOW & HEAT TRANSFER "ENGINEERING APPLICATIONS OF FRACTAL and multiphase flow & heat transfer will be stressed. This paper will begin by reviewing some important concepts

Lahey, Richard T.

271

Transferring Data from Batch Jobs at NERSC  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transferring Data from Batch Jobs Transferring Data from Batch Jobs Examples Once you are set up for automatic authentication (see HPSS Passwords) you can access HPSS within batch...

272

USDOE Technology Transfer, Working with DOE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Deployment SBIRSTTR - Small Business Innovation Research and Small Business Technology Transfer Advanced Research Projects Agency-Energy (ARPA-E) Oil & Gas Technology Transfer...

273

Technology Transfer Overview | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Technology Transfer Overview Technology Transfer Overview Through strategic investments in science and technology, the U.S. Department of Energy (DOE) helps power and secure...

274

Technology Transfer for Brownfields Redevelopment Project | Department...  

Broader source: Energy.gov (indexed) [DOE]

Technology Transfer for Brownfields Redevelopment Project Technology Transfer for Brownfields Redevelopment Project The U.S. Department of Energy has provided six computers to...

275

PAVEMENT TECHNOLOGY UPDATE This Technology Transfer Program  

E-Print Network [OSTI]

PAVEMENT TECHNOLOGY UPDATE This Technology Transfer Program publication is funded by the Division to them in California. TECHNOLOGY TRANSFER PROGRAM MAY 2011, VOL. 3, NO. 1 California's Transition

California at Berkeley, University of

276

Preparing for Transfer Biological Engineering  

E-Print Network [OSTI]

Environmental Engineering Game Design Industrial Systems & Information Technology Information Science MaterialsPreparing for Transfer Majors: Biological Engineering Chemical Engineering Civil Engineering Computer Science Electrical & Computer Engineering Engineering Physics Environmental Engineering

Walter, M.Todd

277

Electrohydrodynamically enhanced condensation heat transfer  

E-Print Network [OSTI]

In a condenser the thickness of the liquid condensate film covering the cooled surface constitutes a resistance to the heat transfer. By establishing a non uniform electric field in the vicinity of the condensation surface the extraction of liquid...

Wawzyniak, Markus

2012-06-07T23:59:59.000Z

278

Knowledge Capture and Transfer Program  

Broader source: Energy.gov [DOE]

The Office of Learning and Workforce Development is working with Heads of Departmental Elements, DOE senior leaders and subject-matter-experts to capture and transfer the knowledge and experiences...

279

Spring 2014 Heat Transfer -2  

E-Print Network [OSTI]

Spring 2014 Heat Transfer - 2 A thin electronic chip is in the shape of a square wafer, b = 1 cm surface of the chip with a heat transfer coefficient of h = 100 W/m2 -K. Assume the chip has a uniform per side with a mass of m = 0.3 grams and specific heat of C = 103 J/kg-K. The chip is mounted

Virginia Tech

280

A Fast Delivery Protocol for Total Order Broadcasting  

SciTech Connect (OSTI)

The conclusions of this report are: (1) Fast delivery protocol reduces the latency of message ordering for idle systems and keep comparable performances with communication history algorithms for busy systems; (2) The protocol optimizes the total ordering process by waiting for messages only from a subset of the machines in the group; and (3) The fast acknowledgment aggressively acknowledges total order messages to reduce the latency for idle system, and it is smart enough to hold the acknowledgments when the network communication is heavy.

Ou, Li [Tennessee Technological University; He, X. [Tennessee Technological University; Engelmann, Christian [ORNL; Scott, Stephen L [ORNL

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

A Hybrid Long-Distance Entanglement Distribution Protocol  

E-Print Network [OSTI]

We propose a hybrid (continuous-discrete variable) quantum repeater protocol for distribution of entanglement over long distances. Starting from entangled states created by means of single-photon detection, we show how entangled coherent state superpositions, also known as `Schr\\"odinger cat states', can be generated by means of homodyne detection of light. We show that near-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements.

Jonatan B. Brask; Ioannes Rigas; Eugene S. Polzik; Ulrik L. Andersen; Anders S. Sorensen

2010-04-01T23:59:59.000Z

282

Transferability of Data Related to the Underground Test Area Project, Nevada Test Site, Nye County, Nevada: Revision 0  

SciTech Connect (OSTI)

This document is the collaborative effort of the members of an ad hoc subcommittee of the Underground Test Area (UGTA) Technical Working Group (TWG). The UGTA Project relies on data from a variety of sources; therefore, a process is needed to identify relevant factors for determining whether material-property data collected from other areas can be used to support groundwater flow, radionuclide transport, and other models within a Corrective Action Unit (CAU), and for documenting the data transfer decision and process. This document describes the overall data transfer process. Separate Parameter Descriptions will be prepared that provide information for selected specific parameters as determined by the U.S. Department of Energy (DOE) UGTA Project Manager. This document and its accompanying appendices do not provide the specific criteria to be used for transfer of data for specific uses. Rather, the criteria will be established by separate parameter-specific and model-specific Data Transfer Protocols. The CAU Data Documentation Packages and data analysis reports will apply the protocols and provide or reference a document with the data transfer evaluations and decisions.

Stoller-Navarro Joint Venture

2004-06-24T23:59:59.000Z

283

A 3D radiative transfer framework: II. line transfer problems  

E-Print Network [OSTI]

Higher resolution telescopes as well as 3D numerical simulations will require the development of detailed 3D radiative transfer calculations. Building upon our previous work we extend our method to include both continuum and line transfer. We present a general method to calculate radiative transfer including scattering in the continuum as well as in lines in 3D static atmospheres. The scattering problem for line transfer is solved via means of an operator splitting (OS) technique. The formal solution is based on a long-characteristics method. The approximate $\\Lambda$ operator is constructed considering nearest neighbors {\\em exactly}. The code is parallelized over both wavelength and solid angle using the MPI library. We present the results of several test cases with different values of the thermalization parameter and two choices for the temperature structure. The results are directly compared to 1D spherical tests. With our current grid setup the interior resolution is much lower in 3D than in 1D, nevertheless the 3D results agree very well with the well-tested 1D calculations. We show that with relatively simple parallelization that the code scales to very large number of processors which is mandatory for practical applications. Advances in modern computers will make realistic 3D radiative transfer calculations possible in the near future. Our current code scales to very large numbers of processors, but requires larger memory per processor at high spatial resolution.

E. Baron; Peter H. Hauschildt

2007-03-16T23:59:59.000Z

284

Shor-Preskill Type Security-Proofs for Concatenated Bennett-Brassard 1984 Quantum Key Distribution Protocol  

E-Print Network [OSTI]

We discuss long code problems in the Bennett-Brassard 1984 (BB84) quantum key distribution protocol and describe how they can be overcome by concatenation of the protocol. Observing that concatenated modified Lo-Chau protocol finally reduces to the concatenated BB84 protocol, we give the unconditional security of the concatenated BB84 protocol.

W. -Y. Hwang; K. Matsumoto; H. Imai; J. Kim; H. -W. Lee

2002-10-31T23:59:59.000Z

285

Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas  

E-Print Network [OSTI]

Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas Abdel Ilah Alshbatat and Liang Dong, Senior Member, IEEE Abstract-- Unmanned aerial vehicle (UAV) has been used inspection and range extension. Moreover, UAVs are suited for situations that are too dangerous for direct

Dong, Liang

286

Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol  

SciTech Connect (OSTI)

The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

Romberger, J.

2014-11-01T23:59:59.000Z

287

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

288

A Review of Embedded Automotive Protocols Nicolas Navet  

E-Print Network [OSTI]

A Review of Embedded Automotive Protocols Nicolas Navet 1 , Françoise Simonot-Lion 2 April 14, 2008 of a large number of automotive networks such as LIN, J1850, CAN, FlexRay, MOST, etc.. This pa- per rst is given. Next, the current eorts of the automotive industry on middleware technologies which may

Navet, Nicolas

289

Air to Air Communication Protocol Arjan Durresi1  

E-Print Network [OSTI]

1 Air to Air Communication Protocol Arjan Durresi1 , Vamsi Paruchuri1 , Leonard Barolli2 and Raj. Louis, MO 63130, USA 314-935-4963, jain@cse.wustl.edu Abstract--We present Air to Air Communication (AAC........................................................2 3. AIR TO AIR COMMUNICATION..............................3 4. SIMULATIONS

Jain, Raj

290

Reply to "Comment on Protocol for Direct Counterfactual Quantum Communication"  

E-Print Network [OSTI]

In reply to Vaidman's Comment [arXiv:1304.6689], we show that his claim that our Protocol for Direct Counterfactual Quantum Communication [PRL 110, 170502 (2013), arXiv:1206.2042] is counterfactual only for one type of information bit is wrong.

Hatim Salih; Zheng-Hong Li; M. Al-Amri; M. Suhail Zubairy

2014-04-28T23:59:59.000Z

291

Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''  

E-Print Network [OSTI]

Biomolecular free energy profiles by a shootingĂ?umbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

Schlick, Tamar

292

Survivability validation protocol issues for a system-of-systems  

SciTech Connect (OSTI)

This paper illuminates the various issues confronting a protocol developer as he attempts to construct a system-of-systems (SOS) survivability validation protocol. These issues are considered in the context of a Battle Management Command, Control, and Communications (BMC{sup 3}) network in the form of a Hypothetical System Architecture consisting of air, sea, ground, and space platforms. The purpose of the protocol of concem is to validate the nuclear survivability of the BMC{sup 3} SOS. To achieve this validation, the combined susceptibilities of the SOS platforms and communications links must be considered. A basic SOS simulation concept is described, which assumes individual platform survivability. The nuclear environments to be considered in the simulation are outlined with a discussion of the relationship to basic system susceptibility. Various validation concepts for the SOS protocol are summarized in relation to the life cycle phase during which they would be utilized. Computer simulation issues are discussed, including the environments to be modeled, validation of the codes, documentation, and configuration control. Concluding remarks center on the most likely way of simulating nuclear effects and on treating simulation tools like mission critical items.

Brock, G.; Ianacone, K.J.; Stringer, T.A. [Kaman Sciences Corp., Colorado Springs, CO (United States)

1993-08-01T23:59:59.000Z

293

WLDF 311 Treefrog Study; Fall 2007 PVC Pipe Deployment Protocol  

E-Print Network [OSTI]

WLDF 311 Treefrog Study; Fall 2007 PVC Pipe Deployment Protocol: 1. Arrange time to meet should include: a. 12 pipes with caps (there should be ~3 pipes on "your" transects out in the field & place trap on the stake (using hole near top of pipe for screw head). e. Record UTM positions (easting

Johnson, Matthew

294

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks Yongjun Dai, Changhee Joo prevalent, TCP performance over mobile ad hoc networks attracts more attention. The earlier studies on TCP in wireless networks have shown that it performs poorly in ad hoc networks. They tackled the problem

Bahk, Saewoong

295

STOCKER FLY BRAIN IMMUNOFLUORESCENCE PROTOCOL January 8, 2001  

E-Print Network [OSTI]

1 STOCKER FLY BRAIN IMMUNOFLUORESCENCE PROTOCOL January 8, 2001 Vosshall Lab 1. Anesthetize flies the brain, starting with the removal of the proboscis. Gently peel away the cuticle at the back of the fly the esophagus (hole in brain). Once all the cuticle has been removed, gently remove the fat body and trachea

296

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony executed corresponding other actions (e.g., a payment gateway approves a charge to customer C's account

Stoller, Scott

297

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony- ously executed corresponding other actions (e.g., a payment gateway approves a charge to customer C

Stoller, Scott

298

WHOP: Wormhole Attack Detection Protocol using Hound Packet  

E-Print Network [OSTI]

WHOP: Wormhole Attack Detection Protocol using Hound Packet Saurabh Gupta Indian Institute infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack

Dharmaraja, S.

299

BAAP: Blackhole Attack Avoidance Protocol for Wireless Network  

E-Print Network [OSTI]

BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute infrastructure in adhoc net- work makes it vulnerable to various attacks. MANET routing disrupts attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh

Dharmaraja, S.

300

A Hierarchical Checkpointing Protocol for Parallel Applications in Cluster Federations  

E-Print Network [OSTI]

A Hierarchical Checkpointing Protocol for Parallel Applications in Cluster Federations S federation. As a cluster federation comprises of a large number of nodes, there is a high probability fits to the characteristics of a cluster federation (large number of nodes, high latency and low

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

CARD-FISH and Microautoradiography Protocol for Bacteria and Archaea  

E-Print Network [OSTI]

1 CARD-FISH and Microautoradiography Protocol for Bacteria and Archaea by Gerhard Herndl Lab @ www FISH Hybridization www.microbial-oceanography.eu 2007 2 Sample Fixation 1. Fix samples in Ethanol 95% 7. Dry and mount in DAPI mix #12;CARD FISH Buffers and Chemicals www

Herndl, Gerhard

302

Reliable and Energy-Efficient Routing Protocol in Dense  

E-Print Network [OSTI]

Reliable and Energy-Efficient Routing Protocol in Dense Wireless Sensor Networks Min Chen, Taekyoung Kwon, Shiwen Mao, + Yong Yuan, Victor C.M. Leung* Department of Electrical and Computer@snu.ac.kr Department of Electrical and Computer Engineering Auburn University, 200 Broun Hall, Auburn, AL 36849

Chen, Min

303

LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note  

E-Print Network [OSTI]

LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note: The Luciferase enzyme is unstable-ground samples. 2. Collect liquid nitrogen from downstairs and place 24 frozen tissue samples inside. 3. Place the power. 14.The luminometer cuvettes can be reused, BUT ONLY if they have been thoroughly soaked

Raizada, Manish N.

304

A Self-Healing Load Balancing Protocol and Implementation  

E-Print Network [OSTI]

in the opposite direction exhibits a rate of r2 = c2x2. It can be shown that the overall reaction system spanned Comparison In order to illustrate the principle of the two protocols, we carried out OMNeT++ [2] simulations this unbounded growth, we apply a "non-selective dilution flow" to the reactor which randomly destroys a molecule

Vetter, Thomas

305

GUV formation protocol: -Ethanol, DI water and Kimwipes for cleaning  

E-Print Network [OSTI]

GUV formation protocol: Materials: - Ethanol, DI water and Kimwipes for cleaning - 5-10 µl glass with ethanol and DI water using Kimwipes alternating the solvents at least twice to make sure any grease-ring using a Kimwipe and ethanol. Use Que-tip or grease slide to apply a thin layer of vacuum grease to one

Movileanu, Liviu

306

An adaptive protocol for distributed beamforming Stephan Sigg1  

E-Print Network [OSTI]

settings and propose a protocol that utilises organic computing principles to find optimum parameters is the approach to combine transmission signals from distinct transmit antennas simultaneously in order to create transmission [7, 8, 2]. Several open-loop and closed-loop carrier synchronisation approaches have been proposed

Beigl, Michael

307

How to Use Bitcoin to Design Fair Protocols Iddo Bentov  

E-Print Network [OSTI]

How to Use Bitcoin to Design Fair Protocols Iddo Bentov idddo@cs.technion.ac.il Ranjit Kumaresan then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-or-refund"), that formalizes and abstracts the exact properties we require from the Bitcoin network to achieve our goals

308

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

309

US - Voice Over Internet Protocol Phone Service Providers Market Analysis  

E-Print Network [OSTI]

This report explains the overview of Voice over internet protocol (VoIP) and the challenges the VoIP Phone Service providers face to become market leaders. The report provides an overview of new services offering, both residential and business...

Srinivasan, Vijaybabu

2006-05-19T23:59:59.000Z

310

Safeguards Agreement and Protocol with the International Atomic Energy Agency  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

2004-01-07T23:59:59.000Z

311

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

312

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

313

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

314

WSN-inspired Sleep Protocols for Heterogeneous LTE Networks  

E-Print Network [OSTI]

architecture becomes heterogenous, in particular 4G networks where LTE micro eNodeBs are deployed to strengthen algorithm to dynamically switch off and on the micro eNodeBs of an LTE heterogeneous network followingWSN-inspired Sleep Protocols for Heterogeneous LTE Networks Iulia Tunaru CEA CEA-Leti, Minatec

Paris-Sud XI, Université de

315

On the construction of digest functions for manual authentication protocols  

E-Print Network [OSTI]

On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16­32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

Jeavons, Peter

316

On Runtime Adaptation of Application-Layer Multicast Protocol  

E-Print Network [OSTI]

¨ubsch, Christoph P. Mayer, and Oliver P. Waldhorst Institute of Telematics, Karlsruhe Institute of Technology (KIT), Germany {huebsch,mayer,waldhorst}@kit.edu Reasonable choice of protocol parameters is crucial., a clean implementation of multicast communication within the Internet architecture has been proposed

Paris-Sud XI, Université de

317

An Energy-Aware Simulation Model and Transaction Protocol  

E-Print Network [OSTI]

1 An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution of Southern California Oct. 15, 2003 Outline ! Introduction ! MANET Simulation Model ! Energy-aware Network of analytical approaches ! We presents a simulation model to evaluating power management policies for a MANET

Pedram, Massoud

318

UNFINISHED BUSINESS: The Economics of The Kyoto Protocol  

SciTech Connect (OSTI)

The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of carbon if a global system of emissions mitigation could be quickly and effectively implemented. But it could also exceed $250 per tonne of carbon if the US must meet its emissions limitations entirely through domestic actions, and if mitigation obligations are not adequately anticipated by decision-makers.

JA Edmonds; CN MacCracken; RD Sands; SH Kim

2000-07-06T23:59:59.000Z

319

Technology Transfer Office FY2011 Annual Report  

E-Print Network [OSTI]

Technology Transfer Office FY2011 Annual Report #12;TECHNOLOGY TRANSFER ADVISORY COMMITTEES The UC San Diego Technology Transfer Advisory Committee (TTAC) is responsible for general oversight of the universityĂ? s technology transfer program. This standing committee is appointed by the chancellor

Hasty, Jeff

320

Technology Transfer office 2008 Annual Report  

E-Print Network [OSTI]

Technology Transfer office 2008 Annual Report #12;The UC San Diego Technology Transfer Advisory Committee (TTAC) is responsible for general oversight of the university's technology transfer program. It meets periodically to assess UC San Diego's technology transfer practices and guides the overall

Fainman, Yeshaiahu

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Technology Transfer and Intellectual Property Services  

E-Print Network [OSTI]

Technology Transfer and Intellectual Property Services B I E N N I A L R E P O R T 03­04 #12;University of California, San Diego Technology Transfer Advisory Committee The UCSD Technology Transfer Advisory Committee (TTAC) is responsible for general oversight of the UCSD Technology Transfer Program

Fainman, Yeshaiahu

322

Nanoscale heat transfer - from computation to experiment  

E-Print Network [OSTI]

Heat transfer can differ distinctly at the nanoscale from that at the macroscale. Recent advancement in

Luo, Tengfei

2013-04-09T23:59:59.000Z

323

CANISTER TRANSFER SYSTEM DESCRIPTION DOCUMENT  

SciTech Connect (OSTI)

The Canister Transfer System receives transportation casks containing large and small disposable canisters, unloads the canisters from the casks, stores the canisters as required, loads them into disposal containers (DCs), and prepares the empty casks for re-shipment. Cask unloading begins with cask inspection, sampling, and lid bolt removal operations. The cask lids are removed and the canisters are unloaded. Small canisters are loaded directly into a DC, or are stored until enough canisters are available to fill a DC. Large canisters are loaded directly into a DC. Transportation casks and related components are decontaminated as required, and empty casks are prepared for re-shipment. One independent, remotely operated canister transfer line is provided in the Waste Handling Building System. The canister transfer line consists of a Cask Transport System, Cask Preparation System, Canister Handling System, Disposal Container Transport System, an off-normal canister handling cell with a transfer tunnel connecting the two cells, and Control and Tracking System. The Canister Transfer System operating sequence begins with moving transportation casks to the cask preparation area with the Cask Transport System. The Cask Preparation System prepares the cask for unloading and consists of cask preparation manipulator, cask inspection and sampling equipment, and decontamination equipment. The Canister Handling System unloads the canister(s) and places them into a DC. Handling equipment consists of a bridge crane hoist, DC loading manipulator, lifting fixtures, and small canister staging racks. Once the cask has been unloaded, the Cask Preparation System decontaminates the cask exterior and returns it to the Carrier/Cask Handling System via the Cask Transport System. After the DC is fully loaded, the Disposal Container Transport System moves the DC to the Disposal Container Handling System for welding. To handle off-normal canisters, a separate off-normal canister handling cell is located adjacent to the canister transfer cell and is interconnected to the transfer cell by means of the off-normal canister transfer tunnel. All canister transfer operations are controlled by the Control and Tracking System. The system interfaces with the Carrier/Cask Handling System for incoming and outgoing transportation casks. The system also interfaces with the Disposal Container Handling System, which prepares the DC for loading and subsequently seals the loaded DC. The system support interfaces are the Waste Handling Building System and other internal Waste Handling Building (WHB) support systems.

B. Gorpani

2000-06-23T23:59:59.000Z

324

Polarisation Transfer in Proton Compton Scattering at High Momentum Transfer  

SciTech Connect (OSTI)

The Jefferson Lab Hall A experiment E99-114 comprised a series of measurements to explore proton Compton scattering at high momentum transfer. For the first time, the polarisation transfer observables in the p (~ 0 ~ p) reaction were measured in the GeV energy range, where it is believed that quark-gluon degrees of freedom begin to dominate. The experiment utilised a circularly polarised photon beam incident on a liquid hydrogen target, with the scattered photon and recoil proton detected in a lead-glass calorimeter and a magnetic spectrometer, respectively.

David Hamilton

2004-12-31T23:59:59.000Z

325

Mass Transfer by Stellar Wind  

E-Print Network [OSTI]

I review the process of mass transfer in a binary system through a stellar wind, with an emphasis on systems containing a red giant. I show how wind accretion in a binary system is different from the usually assumed Bondi-Hoyle approximation, first as far as the flow's structure is concerned, but most importantly, also for the mass accretion and specific angular momentum loss. This has important implications on the evolution of the orbital parameters. I also discuss the impact of wind accretion, on the chemical pollution and change in spin of the accreting star. The last section deals with observations and covers systems that most likely went through wind mass transfer: barium and related stars, symbiotic stars and central stars of planetary nebulae (CSPN). The most recent observations of cool CSPN progenitors of barium stars, as well as of carbon-rich post-common envelope systems, are providing unique constraints on the mass transfer processes.

Boffin, Henri M J

2014-01-01T23:59:59.000Z

326

An object-oriented implementation of a Low Level Reader Protocol (LLRP) library  

E-Print Network [OSTI]

This Master of Engineering Thesis describes the design and implementation of an object-oriented Low Level Reader Protocol (LLRP) library. LLRP is a recently released protocol which standardizes the formats and methods of ...

Constantinou, Fivos

2007-01-01T23:59:59.000Z

327

Performance analysis of distributed time division multiple access protocols in mobile ad hoc environments  

E-Print Network [OSTI]

Tactical wireless mobile ad hoc networks rely upon distributed medium access control (MAC) protocols for coordination and assignment of channel resources among dispersed and mobile users. One such protocol is the distributed ...

Dastangoo, Siamak

328

Multicast Protocols for Scalable On-Demand Download Niklas Carlsson Derek L. Eager  

E-Print Network [OSTI]

not model packet loss recovery, although our analyses and protocols are compatible with erasure coded data bandwidth and maximum client delay for this batching with constant batch delay (bcd) protocol, as follows

Vernon, Mary K.

329

The role of social factors in a dyadic training protocol: implications for computer-based instruction  

E-Print Network [OSTI]

of the active interlocked modeling (AIM) protocol were examined using a complex perceptual-motor task. A total of 105 male participants were randomly assigned to either the AIM protocol or an individual-based control condition. Verbal communication...

Tubre, Travis Charles

1997-01-01T23:59:59.000Z

330

Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on Diesel Aftertreatment (Agreement 13415) Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on...

331

Journal of Heat Transfer1999 JHT Heat Transfer Gallery Department of Mechanical 8. Aerospace Engineering  

E-Print Network [OSTI]

Journal of Heat Transfer1999 JHT Heat Transfer Gallery S. M. You Department of Mechanical 8 Transfer Visualization Committee organized two photo gallery sessions in 1998. The International Heat Transfer Photo Gallery was held at the l la' International Heat Transfer Conference (IHTC) in Kyongju

Kihm, IconKenneth David

332

Technology Transfer award funding data* Figure 1. Current Technology Transfer awards  

E-Print Network [OSTI]

6 1 4 3 48 23 30 10 Technology Transfer award funding data* Figure 1. Current Technology Transfer awards Numbers represent active grants as at 1 October 2013 Figure 2. Technology Transfer award Transfer funding division. In the 2012/13 financial year Technology Transfer approved awards worth a total

Rambaut, Andrew

333

PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS  

SciTech Connect (OSTI)

The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

Mickalonis, J.

2014-09-16T23:59:59.000Z

334

Performance Test Protocol for Evaluating Inverters Used in Grid-Connected  

E-Print Network [OSTI]

Performance Test Protocol for Evaluating Inverters Used in Grid-Connected Photovoltaic Systems....................................................................................... 6 4.1 Inverter Size

335

A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks Murat Abstract RTS-CTS handshake based protocols achieve "reliable unicast" by eliminating the hidden node. Here we present a simple, light-weight, and self- stabilizing MAC protocol, namely Busy Elimination

Demirbas, Murat

336

A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments  

SciTech Connect (OSTI)

A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

Top, P; Kohlhepp, V; Dowla, F

2005-09-30T23:59:59.000Z

337

Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky  

E-Print Network [OSTI]

Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing pro- tocols and workload balancing techniques for improving MANET routing protocols and energy efficiency. We give new routing protocol

Zelikovsky, Alexander

338

QoS-aware Optimization Strategy for Security Ranking in SSL Protocol , Zhe Tang 1  

E-Print Network [OSTI]

QoS-aware Optimization Strategy for Security Ranking in SSL Protocol Fang Qi 1 , Zhe Tang 1 socket layer protocol (SSL) is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the SSL handshake protocol is the server's RSA

Wu, Jie

339

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised November 19, 1996 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol

Wagner, David

340

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised April 15, 1997 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol

Boult, Terrance E.

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised April 15, 1997 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol

Schneier, Bruce

342

PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks Lei Tang-MAC (Predictive-Wakeup MAC), a new energy-efficient MAC protocol based on asyn- chronous duty cycling. In PW it to X-MAC, WiseMAC, and RI-MAC, three previous energy-efficient MAC protocols, under multiple concurrent

Shihada, Basem

343

THE PERFORMANCE AND SCALABILITY OF DISTRIBUTED SHARED MEMORY CACHE COHERENCE PROTOCOLS  

E-Print Network [OSTI]

coherence protocol is often made based on implementation ease rather than performance. Most DSM machines run a fixed protocol, encoded in hardware finite state machines, so trying to compare the performance of differ- ent protocols involves comparing performance across different machines. Unfortunately

Heinrich, Mark

344

Internalising agents in CSP protocol models P.J. Broadfoot and A.W. Roscoe  

E-Print Network [OSTI]

. . An essential part of our CSP models is knowing what a given agent believes about the progress of its protocolInternalising agents in CSP protocol models P.J. Broadfoot and A.W. Roscoe Oxford University of cryptographic protocols using CSP [11] and FDR [5], often via extensions to Casper [6]. Since FDR can only check

Roscoe, Bill

345

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi the necessary features of an on-demand minimum energy routing protocol and suggests mechanisms the performance of an on-demand minimum energy routing protocol in terms of energy savings with an existing on

Brown, Timothy X.

346

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi of an on-demand minimum energy routing protocol and suggests mechanisms for their imple- mentation. We of an on-demand minimum energy routing protocol in terms of energy savings with an existing on-demand ad

347

Decoherence problem in quantum state transfer via an engineered spin chain  

E-Print Network [OSTI]

A perfect quantum state transfer(QST) has been shown in an engineered spin chain with "always-on interaction". Here, we consider a more realistic problem for such a protocol, the quantum decoherence induced by a spatially distributed environment, which is universally modeled as a bath of harmonic oscillators. By making use of the irreducible tensor method in angular momentum theory, we investigate the effect of decoherence on the efficiency of QST for both cases at zero and finite temperatures. We not only show the generic exponential decay of QST efficiency as the number of sites increase, but also find some counterintuitive effect, the QST can be enhanced as temperature increase.

Lan Zhou; Jing Lu; Tao Shi; C. P. Sun

2006-08-17T23:59:59.000Z

348

Submersible canned motor transfer pump  

DOE Patents [OSTI]

A transfer pump used in a waste tank for transferring high-level radioactive liquid waste from a waste tank and having a column assembly, a canned electric motor means, and an impeller assembly with an upper impeller and a lower impeller connected to a shaft of a rotor assembly. The column assembly locates a motor housing with the electric motor means adjacent to the impeller assembly which creates an hydraulic head, and which forces the liquid waste, into the motor housing to cool the electric motor means and to cool and/or lubricate the radial and thrust bearing assemblies. Hard-on-hard bearing surfaces of the bearing assemblies and a ring assembly between the upper impeller and electric motor means grind large particles in the liquid waste flow. Slots in the static bearing member of the radial bearing assemblies further grind down the solid waste particles so that only particles smaller than the clearances in the system can pass therethrough, thereby resisting damage to and the interruption of the operation of the transfer pump. The column assembly is modular so that sections can be easily assembled, disassembled and/or removed. A second embodiment employs a stator jacket which provides an alternate means for cooling the electric motor means and lubricating and/or cooling the bearing assemblies, and a third embodiment employs a variable level suction device which allows liquid waste to be drawn into the transfer pump from varying and discrete levels in the waste tank.

Guardiani, Richard F. (Ohio Township, Allegheny County, PA); Pollick, Richard D. (Sarver, PA); Nyilas, Charles P. (Monroeville, PA); Denmeade, Timothy J. (Lower Burrell, PA)

1997-01-01T23:59:59.000Z

349

Spring 2014 Heat Transfer -1  

E-Print Network [OSTI]

Spring 2014 1 Heat Transfer - 1 Consider a cylindrical nuclear fuel rod of length L and diameter df and the tube at a rate m , and the outer surface of the tube is well insulated. Heat generation occurs within. The specific heat of water pc , and the thermal conductivity of the fuel rod fk are constants. The system

Virginia Tech

350

Entrepreneurial separation to transfer technology.  

SciTech Connect (OSTI)

Entrepreneurial separation to transfer technology (ESTT) program is that entrepreneurs terminate their employment with Sandia. The term of the separation is two years with the option to request a third year. Entrepreneurs are guaranteed reinstatement by Sandia if they return before ESTT expiration. Participants may start up or helpe expand technology businesses.

Fairbanks, Richard R.

2010-09-01T23:59:59.000Z

351

Mass Transfer from Giant Donors  

E-Print Network [OSTI]

The stability of mass transfer in binaries with convective giant donors remains an open question in modern astrophysics. There is a significant discrepancy between what the existing methods predict for a response to mass loss of the giant itself, as well as for the mass transfer rate during the Roche lobe overflow. Here we show that the recombination energy in the superadiabatic layer plays an important and hitherto unaccounted-for role in he donor's response to mass loss, in particular on its luminosity and effective temperature. Our improved optically thick nozzle method to calculate the mass transfer rate via $L_1$ allows us to evolve binary systems for a substantial Roche lobe overflow. We propose a new, strengthened criterion for the mass transfer instability, basing it on whether the donor experiences overflow through its outer Lagrangian point. We find that with the new criterion, if the donor has a well-developed outer convective envelope, the critical initial mass ratio for which a binary would evolv...

Pavlovskii, K

2014-01-01T23:59:59.000Z

352

Transfer Guide: Philosophy: General Philosophy Concentration Revised: 1 December 2009 TRANSFER GUIDE AND PLANNING WORKSHEET  

E-Print Network [OSTI]

Transfer Guide: Philosophy: General Philosophy Concentration Revised: 1 December 2009 TRANSFER Degree ­ Philosophy general philosophy concentration This planning worksheet represents a guide for community college students transferring to Colorado State University and majoring in Philosophy: general

353

Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution  

SciTech Connect (OSTI)

The effect of scintillation, arising from propagation through atmospheric turbulence, on the sift and error probabilities of a quantum key distribution (QKD) system that uses the weak-laser-pulse version of the Bennett-Brassard 1984 (BB84) protocol is evaluated. Two earth-space scenarios are examined: satellite-to-ground and ground-to-satellite transmission. Both lie in the far-field power-transfer regime. This work complements previous analysis of turbulence effects in near-field terrestrial BB84 QKD [J. H. Shapiro, Phys. Rev. A 67, 022309 (2003)]. More importantly, it shows that scintillation has virtually no impact on the sift and error probabilities in earth-space BB84 QKD, something that has been implicitly assumed in prior analyses for that application. This result contrasts rather sharply with what is known for high-speed laser communications over such paths, in which deep, long-lived scintillation fades present a major challenge to high-reliability operation.

Shapiro, Jeffrey H. [Research Laboratory of Electronics, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 (United States)

2011-09-15T23:59:59.000Z

354

A Sensing Error Aware MAC Protocol for Cognitive Radio Networks  

E-Print Network [OSTI]

Cognitive radios (CR) are intelligent radio devices that can sense the radio environment and adapt to changes in the radio environment. Spectrum sensing and spectrum access are the two key CR functions. In this paper, we present a spectrum sensing error aware MAC protocol for a CR network collocated with multiple primary networks. We explicitly consider both types of sensing errors in the CR MAC design, since such errors are inevitable for practical spectrum sensors and more important, such errors could have significant impact on the performance of the CR MAC protocol. Two spectrum sensing polices are presented, with which secondary users collaboratively sense the licensed channels. The sensing policies are then incorporated into p-Persistent CSMA to coordinate opportunistic spectrum access for CR network users. We present an analysis of the interference and throughput performance of the proposed CR MAC, and find the analysis highly accurate in our simulation studies. The proposed sensing error aware CR MAC p...

Hu, Donglin

2011-01-01T23:59:59.000Z

355

Single-step distillation protocol with generalized beam splitters  

SciTech Connect (OSTI)

We develop a distillation protocol for multilevel qubits (qudits) using generalized beam splitters like in the proposal of Pan et al. for ordinary qubits. We find an acceleration with respect to the scheme of Bennet et al. when extended to qudits. It is also possible to distill entangled pairs of photons carrying orbital angular momenta states that conserve the total angular momenta as those produced in recent experiments.

Martin-Delgado, M. A.; Navascues, M. [Departamento de Fisica Teorica I, Universidad Complutense, 28040 Madrid, (Spain)

2003-07-01T23:59:59.000Z

356

WLDF 311 Treefrog Study; Fall 2007 Pipe Checking Protocol  

E-Print Network [OSTI]

WLDF 311 Treefrog Study; Fall 2007 Pipe Checking Protocol: 1. Arrange time to meet/travel to study that each pipe is checked. If there is a frog(s), then: a. Take the trap off the stake without letting frogs). If the frogs don't come out, put some more water in the pipe, swirl and "swoosh" them out. b. Pick up each frog

Johnson, Matthew

357

Building America 2014 House Simulation Protocols | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in Review: Top Five EEREDepartmentFebruary 4,Brent Nelson About2014 House Simulation Protocols

358

Superior Energy Performance Certification Protocol | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: AlternativeEnvironment,Institutes and1 Special Report:StepRenewable EnergyofCertification Protocol

359

Geo energy research and development: technology transfer  

SciTech Connect (OSTI)

Sandia Geo Energy Programs related to geothermal, coal, oil and gas, and synfuel resources have provided a useful mechanism for transferring laboratory technologies to private industry. Significant transfer of hardware, computer programs, diagnostics and instrumentation, advanced materials, and in situ process understanding has occurred through US/DOE supported programs in the past five years. The text briefly reviews the technology transfer procedures and summarizes 32 items that have been transferred and another 20 technologies that are now being considered for possible transfer to industry. A major factor in successful transfer has been personal interactions between Sandia engineers and the technical staff from private industry during all aspects of the technology development.

Traeger, R.K.

1982-03-01T23:59:59.000Z

360

Protocols of radiocontaminant air monitoring for inhalation exposure estimates  

SciTech Connect (OSTI)

Monitoring the plutonium and americium particle emissions from soils contaminated during atmospheric nuclear testing or due to accidental releases is important for several reasons. First, it is important to quantify the extent of potential human exposure from inhalation of alpha-emitting particles, which is the major exposure pathway from transuranic radionuclides. Second, the information provided by resuspension monitoring is the basis of criteria that determine the target soil concentrations for management and cleanup of contaminated soil sites. There are other radioactive aerosols, such as the fission products (cesium and strontium) and neutron-activation products (europium isotopes), which may be resuspended and therefore necessary to monitor as well. This Standard Protocol (SP) provides the method used for radiocontaminant air monitoring by the Health and Ecological Assessment Division (formerly Environmental Sciences Division), Lawrence Livermore National Laboratory, as developed and tested at Nevada Test Site (NTS) and in the Marshall Islands. The objective of this SP is to document the applications and methods of monitoring of all the relevant variables. This protocol deals only with measuring air concentrations of radionuclides and total suspended particulates (TSP, or {open_quotes}dust{close_quotes}). A separate protocol presents the more difficult measurements required to determine transuranic aerosol emission rates, or {open_quotes}resuspension rate{close_quotes}.

Shinn, J.H.

1995-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

ASSEMBLY TRANSFER SYSTEM DESCRIPTION DOCUMENT  

SciTech Connect (OSTI)

The Assembly Transfer System (ATS) receives, cools, and opens rail and truck transportation casks from the Carrier/Cask Handling System (CCHS). The system unloads transportation casks consisting of bare Spent Nuclear Fuel (SNF) assemblies, single element canisters, and Dual Purpose Canisters (DPCs). For casks containing DPCs, the system opens the DPCs and unloads the SNF. The system stages the assemblies, transfer assemblies to and from fuel-blending inventory pools, loads them into Disposal Containers (DCs), temporarily seals and inerts the DC, decontaminates the DC and transfers it to the Disposal Container Handling System. The system also prepares empty casks and DPCs for off-site shipment. Two identical Assembly Transfer System lines are provided in the Waste Handling Building (WHB). Each line operates independently to handle the waste transfer throughput and to support maintenance operations. Each system line primarily consists of wet and dry handling areas. The wet handling area includes a cask transport system, cask and DPC preparation system, and a wet assembly handling system. The basket transport system forms the transition between the wet and dry handling areas. The dry handling area includes the dry assembly handling system, assembly drying system, DC preparation system, and DC transport system. Both the wet and dry handling areas are controlled by the control and tracking system. The system operating sequence begins with moving transportation casks to the cask preparation area. The cask preparation operations consist of cask cavity gas sampling, cask venting, cask cool-down, outer lid removal, and inner shield plug lifting fixture attachment. Casks containing bare SNF (no DPC) are filled with water and placed in the cask unloading pool. The inner shield plugs are removed underwater. For casks containing a DPC, the cask lid(s) is removed, and the DPC is penetrated, sampled, vented, and cooled. A DPC lifting fixture is attached and the cask is placed into the cask unloading pool. In the cask unloading pool the DPC is removed from the cask and placed in an overpack and the DPC lid is severed and removed. Assemblies are removed from either an open cask or DPC and loaded into assembly baskets positioned in the basket staging rack in the assembly unloading pool. A method called ''blending'' is utilized to load DCs with a heat output of less than 11.8 kW. This involves combining hotter and cooler assemblies from different baskets. Blending requires storing some of the hotter fuel assemblies in fuel-blending inventory pools until cooler assemblies are available. The assembly baskets are then transferred from the basket staging rack to the assembly handling cell and loaded into the assembly drying vessels. After drying, the assemblies are removed from the assembly drying vessels and loaded into a DC positioned below the DC load port. After installation of a DC inner lid and temporary sealing device, the DC is transferred to the DC decontamination cell where the top area of the DC, the DC lifting collar, and the DC inner lid and temporary sealing device are decontaminated, and the DC is evacuated and backfilled with inert gas to prevent prolonged clad exposure to air. The DC is then transferred to the Disposal Container Handling System for lid welding. In another cask preparation and decontamination area, lids are replaced on the empty transportation casks and DPC overpacks, the casks and DPC overpacks are decontaminated, inspected, and transferred to the Carrier/Cask Handling System for shipment off-site. All system equipment is designed to facilitate manual or remote operation, decontamination, and maintenance. The system interfaces with the Carrier/Cask Handling System for incoming and outgoing transportation casks and DPCs. The system also interfaces with the Disposal Container Handling System, which prepares the DC for loading and subsequently seals the loaded DC. The system support interfaces are the Waste Handling Building System and other internal WHB support systems.

B. Gorpani

2000-06-26T23:59:59.000Z

362

Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems  

SciTech Connect (OSTI)

The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

2014-06-01T23:59:59.000Z

363

Modelling of Radiative Transfer in Light Sources  

E-Print Network [OSTI]

of equations . . . . . . . . . . . . . . . . . 19 2.4 Transport equations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 3.2 The equation for radiative transfer . . . . . . . . . . . . . . . . . . . . . . . . 44 3Modelling of Radiative Transfer in Light Sources PROEFSCHRIFT ter verkrijging van de graad van

Eindhoven, Technische Universiteit

364

Attn Technology Transfer Questions.txt - Notepad  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Attn Technology Transfer Questions.txt From: eschaput esandc@prodigy.net Sent: Monday, January 26, 2009 10:31 PM To: GC-62 Subject: Attn: Technology Transfer Questions We have...

365

Technology Application Centers: Facilitating Technology Transfer  

E-Print Network [OSTI]

transfer plus technology application. A&C Enercom has learned from experience that technology deployment will not occur unless utilities achieve both technology transfer (e.g, the dissemination of information) and technology application (e.g., the direct...

Kuhel, G. J.

366

Power transfer through strongly coupled resonances  

E-Print Network [OSTI]

Using self-resonant coils in a strongly coupled regime, we experimentally demonstrate efficient non-radiative power transfer over distances of up to eight times the radius of the coils. We use this system to transfer 60W ...

Kurs, André

2007-01-01T23:59:59.000Z

367

Direct transfer of graphene onto flexible substrates  

E-Print Network [OSTI]

In this paper we explore the direct transfer via lamination of chemical vapor deposition graphene onto different flexible substrates. The transfer method investigated here is fast, simple, and does not require an intermediate ...

Araujo, P. T.

368

Emulating quantum state transfer through a spin-1 chain on a 1D lattice of superconducting qutrits  

E-Print Network [OSTI]

Spin-1 systems, in comparison to spin-1/2 systems, offer a better security for encoding and transfer of quantum information, primarily due to their larger Hilbert spaces. Superconducting artificial atoms possess multiple energy-levels, thereby capable of emulating higher-spin systems. Here we consider a 1D lattice of nearest-neighbor-coupled superconducting transmon systems, and devise a scheme to transfer an arbitrary qutrit-state (a state encoded in a three-level quantum system) across the chain. We assume adjustable couplings between adjacent transmons, derive an analytic constraint for the control-pulse, and show how to satisfy the constraint to achieve a high-fidelity state-transfer under current experimental conditions. Our protocol thus enables enhanced quantum communication and information processing with promising superconducting qutrits.

Joydip Ghosh

2014-11-26T23:59:59.000Z

369

State Transfer and Spin Measurement  

E-Print Network [OSTI]

We present a Hamiltonian that can be used for amplifying the signal from a quantum state, enabling the measurement of a macroscopic observable to determine the state of a single spin. We prove a general mapping between this Hamiltonian and an exchange Hamiltonian for arbitrary coupling strengths and local magnetic fields. This facilitates the use of existing schemes for perfect state transfer to give perfect amplification. We further prove a link between the evolution of this fixed Hamiltonian and classical Cellular Automata, thereby unifying previous approaches to this amplification task. Finally, we show how to use the new Hamiltonian for perfect state transfer in the, to date, unique scenario where total spin is not conserved during the evolution, and demonstrate that this yields a significantly different response in the presence of decoherence.

A. Kay

2006-04-21T23:59:59.000Z

370

Waste Feed Delivery Transfer System Analysis  

SciTech Connect (OSTI)

This document provides a documented basis for the required design pressure rating and pump pressure capacity of the Hanford Site waste-transfer system in support of the waste feed delivery to the privatization contractor for vitrification. The scope of the analysis includes the 200 East Area double-shell tank waste transfer pipeline system and the associated transfer system pumps for a11 Phase 1B and Phase 2 waste transfers from AN, AP, AW, AY, and A2 Tank Farms.

JULYK, L.J.

2000-05-05T23:59:59.000Z

371

Idaho Administrator's Memorandum on Transfer Processing Policies...  

Open Energy Info (EERE)

Administrator's Memorandum on Transfer Processing Policies and Procedures Author Idaho Water Management Division Administrator Recipient Water Management Division Published...

372

Enhanced heat transfer using nanofluids  

DOE Patents [OSTI]

This invention is directed to a method of and apparatus for enhancing heat transfer in fluids such as deionized water. ethylene glycol, or oil by dispersing nanocrystalline particles of substances such as copper, copper oxide, aluminum oxide, or the like in the fluids. Nanocrystalline particles are produced and dispersed in the fluid by heating the substance to be dispersed in a vacuum while passing a thin film of the fluid near the heated substance. The fluid is cooled to control its vapor pressure.

Choi, Stephen U. S. (Lisle, IL); Eastman, Jeffrey A. (Naperville, IL)

2001-01-01T23:59:59.000Z

373

Submersible canned motor transfer pump  

DOE Patents [OSTI]

A transfer pump is described which is used in a waste tank for transferring high-level radioactive liquid waste from a waste tank and having a column assembly, a canned electric motor means, and an impeller assembly with an upper impeller and a lower impeller connected to a shaft of a rotor assembly. The column assembly locates a motor housing with the electric motor means adjacent to the impeller assembly which creates an hydraulic head, and which forces the liquid waste, into the motor housing to cool the electric motor means and to cool and/or lubricate the radial and thrust bearing assemblies. Hard-on-hard bearing surfaces of the bearing assemblies and a ring assembly between the upper impeller and electric motor means grind large particles in the liquid waste flow. Slots in the static bearing member of the radial bearing assemblies further grind down the solid waste particles so that only particles smaller than the clearances in the system can pass there through, thereby resisting damage to and the interruption of the operation of the transfer pump. The column assembly is modular so that sections can be easily assembled, disassembled and/or removed. A second embodiment employs a stator jacket which provides an alternate means for cooling the electric motor means and lubricating and/or cooling the bearing assemblies, and a third embodiment employs a variable level suction device which allows liquid waste to be drawn into the transfer pump from varying and discrete levels in the waste tank. 17 figs.

Guardiani, R.F.; Pollick, R.D.; Nyilas, C.P.; Denmeade, T.J.

1997-08-19T23:59:59.000Z

374

Successfully transfer HPI proprietary technology  

SciTech Connect (OSTI)

Intellectual property such as petrochemical/refining licensed technologies are revenue generators for many operating and E/C companies. Successful transfers of available technologies involve many critical elements beyond the basic design engineering stages. Buyers and sellers both have obligations to the licensing agreements. These obligations will vary widely as to the clients` needs and strengths, especially for facilities to be constructed in developing areas. Using the author`s guidelines can streamline new technology evaluations and acquisitions.

Hassan, N. [BE and K, Newark, DE (United States)

1997-02-01T23:59:59.000Z

375

ME 519: THEORY OF HEAT TRANSFER Instructor  

E-Print Network [OSTI]

ME 519: THEORY OF HEAT TRANSFER Fall 2014 Instructor: Class time: Classroom: Office Hours: Prof Tuesday 4­5pm or by appointment Class description This course will cover the fundamentals of heat transfer. An introductory course in heat transfer (ME 419 or equivalent) is pre-requisite. Grading 20% Homework 25% Exam 1

Lin, Xi

376

THE UNLV FOUNDATION MONETARY TRANSFER FORM  

E-Print Network [OSTI]

THE UNLV FOUNDATION MONETARY TRANSFER FORM (Use one form for each account) Date Department Amount Transfer from Foundation Account Name UNLV Foundation Foundation Account Number Transfer to University contributions to this fund were accepted. If Foundation account number does not equal BOR account number

Walker, Lawrence R.

377

Spin-out Company Portfolio Technology Transfer  

E-Print Network [OSTI]

Spin-out Company Portfolio 2012 Technology Transfer The Sir Colin Campbell Building The University `Entrepreneurial University of the Year' in 2008. The Technology Transfer Office (TTO) has close links detail. Dr Susan Huxtable Director, Technology Transfer Tel: +44 (0)115 84 66388 Email: susan

Aickelin, Uwe

378

Technology Transfer and Intellectual Property Services  

E-Print Network [OSTI]

Technology Transfer and Intellectual Property Services 2005 A n n u a l R e p o r t #12;The UCSD Technology Transfer Advisory Committee (TTAC) is responsible for general oversight of the UCSD Technology chancellor of Research. It meets periodically to assess UCSD technology transfer policy and guide

Fainman, Yeshaiahu

379

Frequently Asked Questions 1. Technology Transfer  

E-Print Network [OSTI]

Frequently Asked Questions 1. Technology Transfer 2. Patent 3. Requirements for obtaining a patent is not addressed, please contact Colleen Michael at 631-344 -4919. #12;What is Technology Transfer? Technology Transfer is the process of developing practical applications for the results of scientific research

380

Bidirectional Technology Transfer: Sabbaticals in Industry  

E-Print Network [OSTI]

Bidirectional Technology Transfer: Sabbaticals in Industry Mark D. Hill University of Wisconsin---not just technology transfer---through a ten­month sabbatical in an industrial product group. I advocate product group. The next sections discuss technology transfer, my recent sabbatical, and conclude

Hill, Mark D.

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Requirements Engineering Technology Transfer: An Experience Report  

E-Print Network [OSTI]

Requirements Engineering Technology Transfer: An Experience Report Francisco A. C. Pinheiro1 Julio of software engineering technology transfer was identified by Pfleeger (1999). She came to the con- clusion Journal of Technology Transfer, 28, 159­165, 2003 ©2003 Kluwer Academic Publishers. Manufactured

Leite, Julio Cesar Sampaio do Prado

382

Technology Transfer at Penn State University  

E-Print Network [OSTI]

Technology Transfer at Penn State University An Inventor's Guide to #12;Our mission is to protect on the University of Michigan's "Inventor's Guide to Technology Transfer," with adaptation for Penn State, and the staff of the UM Office of Technology Transfer for their kind permission to use their excellent material

Lee, Dongwon

383

Summary Report on Federal Laboratory Technology Transfer  

E-Print Network [OSTI]

Summary Report on Federal Laboratory Technology Transfer FY 2003 Activity Metrics and Outcomes 2004 Report to the President and the Congress under the Technology Transfer and Commercialization Act Office Chapter 2. Trends in Federal Lab Technology Transfer 2.1 Cooperative Research and Development

Perkins, Richard A.

384

An Inventor's Guide to Technology Transfer  

E-Print Network [OSTI]

An Inventor's Guide to Technology Transfer at the Massachusetts Institute of Technology on the University of Michigan's "Inventor's Guide to Technology Transfer," with adaptations for MIT and the MIT of Technology Transfer for their kind permission to use their excellent material and to the University

Reuter, Martin

385

Technology Transfer from the University of Oxford  

E-Print Network [OSTI]

Technology Transfer from the University of Oxford www.isis-innovation.com #12;Isis Innovation Ltd Oxford Technology Transfer IP, Patents, Licences, Spin-outs, Material Sales, Seed Funds, Isis Angels Network Oxford Expertise Consulting, Services Isis Consulting Business Technology Transfer and Innovation

Paxton, Anthony T.

386

Research and Technology Transfer Faculty Conference  

E-Print Network [OSTI]

Research and Technology Transfer Faculty Conference August 18th 2014 Bruce D. Honeyman Office of the VPRTT #12;Role of the Office of the Vice President for Research and Technology Transfer · `The role Poate. · Support Mines' Strategic Plan Office of the Vice President of Research and Technology Transfer

387

WHICH MODEL OF TECHNOLOGY TRANSFER FOR NANOTECHNOLOGY?  

E-Print Network [OSTI]

1 WHICH MODEL OF TECHNOLOGY TRANSFER FOR NANOTECHNOLOGY? A Comparison with Biotech, where technology transfer and knowledge-bridging will play a pivotal role in the industrial dynamics of the microelectronics sector. Keywords. Nanotechnology ­ biotechnology ­ microelectronics ­ technology transfer

Paris-Sud XI, Université de

388

Trinity Technology Transfer News December 2012  

E-Print Network [OSTI]

Trinity Technology Transfer News December 2012 SRS was set up by Dr Paul Sutton and Prof Linda licensing fees. Dr. Margaret Woods | Technology Transfer Manager mjwoods@tcd.ie Ms. Audrey Crosbie;Trinity Technology Transfer News December 2012 Trinity Campus Company Funding Round EmpowerTheUser (www

O'Mahony, Donal E.

389

PAVEMENT TECHNOLOGY UPDATE This Technology Transfer Program  

E-Print Network [OSTI]

PAVEMENT TECHNOLOGY UPDATE This Technology Transfer Program publication is funded by the Division of asphalt pavements. TECHNOLOGY TRANSFER PROGRAM JULY 2010, VOL. 2, NO. 1 Warm Mix Asphalt Hits the Road, and California LTAP Field Engineer, Technology Transfer Program, Institute of Transportation Studies, UC Berkeley

California at Berkeley, University of

390

PAVEMENT TECHNOLOGY UPDATE This Technology Transfer Program  

E-Print Network [OSTI]

PAVEMENT TECHNOLOGY UPDATE This Technology Transfer Program publication is funded by the Division solve the very serious problem of waste tire disposal. TECHNOLOGY TRANSFER PROGRAM SEPTEMBER 2009, VOL, University of California Pavement Research Center, and California LTAP Field Engineer, Technology Transfer

California at Berkeley, University of

391

Transferring to The University of New Mexico  

E-Print Network [OSTI]

Transferring to The University of New Mexico From Central New Mexico College A Transfer Articulation Guide based on Central New Mexico Community College Catalog Year 2007 ­ 2009 Apply to UNM on-line at www.unm.edu #12;Transferring to The University of New Mexico from Central New Mexico Community College

New Mexico, University of

392

Transferring to The University of New Mexico  

E-Print Network [OSTI]

Transferring to The University of New Mexico From Central New Mexico College A Transfer Articulation Guide based on Central New Mexico Community College Catalog Year 2009 ­ 2011 Apply to UNM on-line at www.unm.edu #12;Transferring to The University of New Mexico from Central New Mexico Community College

New Mexico, University of

393

Heat transfer via dropwise condensation on hydrophobic microstructured surfaces  

E-Print Network [OSTI]

Dropwise condensation has the potential to greatly increase heat transfer rates. Heat transfer coefficients by dropwise condensation and film condensation on microstructured silicon chips were compared. Heat transfer ...

Ruleman, Karlen E. (Karlen Elizabeth)

2009-01-01T23:59:59.000Z

394

Radiative Heat Transfer in Enhanced Hydrogen Outgassing of Glass  

E-Print Network [OSTI]

Kaviany and B.P. Singh, “Radiative heat transfer in porousmedia”, Advances in Heat Transfer, vol. 23, no. 23, pp. 133–Thermal radiation heat transfer, Hemisphere Publishing Co. ,

Kitamura, Rei; Pilon, Laurent

2009-01-01T23:59:59.000Z

395

Climate Change: A Challenge to the Means of Technology Transfer  

E-Print Network [OSTI]

TO THE MEANS OF TECHNOLOGY TRANSFER Gordon J. MacDonaldthe importance of technology transfer in dealing withthe discussion of technology transfer has centered on

MacDonald, Gordon J. F.

1992-01-01T23:59:59.000Z

396

Intellectual Property Protection and Technology Transfer: Evidence From US Multinationals  

E-Print Network [OSTI]

International Technology Transfer? Empirical Evidence FromProtection and Technology Transfer: Evidence from USProperty Protection and Technology Transfer Evidence from US

Kanwar, Sunil

2007-01-01T23:59:59.000Z

397

Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1  

E-Print Network [OSTI]

Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1 Fish Tank Water Changing Fry and tanks: 1. Remove air stone & lid, then take tank from shelf and place fry to make sure it matches # on tank label. 4. Use small (air stone size) plastic tubing to siphon

Langerhans, Brian

398

Heat Transfer Research, 2010, Vol. 41, No. 6 Turbine Aero-Heat Transfer Studies  

E-Print Network [OSTI]

AU TH O R PR O O F Heat Transfer Research, 2010, Vol. 41, No. 6 Turbine Aero-Heat Transfer Studies in Rotating Research Facilities CENGIZ CAMCI Turbomachinery Aero-Heat Transfer Laboratory, Department The present paper deals with the experimental aero-heat transfer studies performed in rotating turbine

Camci, Cengiz

399

Guidance for Preparing Annual Agency Technology Transfer Reports Under the Technology Transfer Commercialization Act  

E-Print Network [OSTI]

Guidance for Preparing Annual Agency Technology Transfer Reports Under the Technology Transfer U.S. Department of Commerce in conjunction with The Interagency Working Group on Technology Transfer May 2013 #12;2 Introduction Under the Technology Transfer Commercialization Act of 2000 (P.L. 106

400

Dry Transfer Systems for Used Nuclear Fuel  

SciTech Connect (OSTI)

The potential need for a dry transfer system (DTS) to enable retrieval of used nuclear fuel (UNF) for inspection or repackaging will increase as the duration and quantity of fuel in dry storage increases. This report explores the uses for a DTS, identifies associated general functional requirements, and reviews existing and proposed systems that currently perform dry fuel transfers. The focus of this paper is on the need for a DTS to enable transfer of bare fuel assemblies. Dry transfer systems for UNF canisters are currently available and in use for transferring loaded canisters between the drying station and storage and transportation casks.

Brett W. Carlsen; Michaele BradyRaap

2012-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Efficient protocols for deterministic secure quantum communication using GHZ-like states  

E-Print Network [OSTI]

Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols can be modified to an equivalent but more efficient protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed in detail and are critically compared with the existing protocols. It is shown that the proposed protocols are highly efficient. It is also shown that all the physical systems where dense coding is possible can be used to design maximally efficient protocol of DSQC and QSDC. Further, it is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols of the present kind. We have shown that there exist a large class of quantum state which can be used to design maximally efficient DSQC and QSDC protocols of the present kind. It is further, observed that maximally efficient QSDC protocols are more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate.

Anindita Banerjee; Anirban Pathak

2012-01-18T23:59:59.000Z

402

Addendum to the Building America House Simulation Protocols  

SciTech Connect (OSTI)

As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

2012-12-01T23:59:59.000Z

403

Generic protocol for environmental audits at federal facilities  

SciTech Connect (OSTI)

The Generic Protocol is a supplement to earlier efforts by EPA to provide technical assistance to Federal agencies on environmental auditing. EPA`s Office of Federal Activities (OFA) issued the Federal Facility Compliance Strategy (referred to as the `Yellow Book`), prepared in 1984 and revised in 1988, as a framework for EPA`s media programs to follow to ensure that Federal facilities are fully integrated into Federal and State compliance monitoring and enforcement activities. The policy encourages Federal agencies to voluntarily develop comprehensive auditing programs to ensure environmental compliance.

NONE

1989-08-01T23:59:59.000Z

404

The two phase commit protocol simulation and analysis  

E-Print Network [OSTI]

IDENTIFICATION II. A Failures in a. Distributed DBMS 10 HI ATOIYIIC COMMITMENT HI. A Uncertainty Period . HI. B Blocking HI C Independent Recovery 17 17 IU THE TWO PHASE COMMIT PROTOCOL V111 CHAPTER Pa, ge IV. A Timeout Actions 21 IV. B Recovery..., 55 LIST OF TABLES TABLE Page Comparison of three versions of the two phase comniit CHAPTER I INTRODUCTION A database management system(DBMS) consists of a collection of interrelated, persis- tent data. and a set of programs to access this data...

Bokil, Anupam

1993-01-01T23:59:59.000Z

405

Algorithms, Protocols & Systems for Remote Observation Using Networked Robotic Cameras  

E-Print Network [OSTI]

assist in waste cleanup using Point- and-Direct (PAD) commands. Users point to cleanup locations in a shared image and a robot excavates each location in turn. Recent developments in MOSR systems can be found in [26,27]. In [27] Goldberg et al. propose...ALGORITHMS, PROTOCOLS AND SYSTEMS FOR REMOTE OBSERVATION USING NETWORKED ROBOTIC CAMERAS A Dissertation by NI QIN Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR...

Qin, Ni

2010-01-16T23:59:59.000Z

406

Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in3.pdfEnergyDepartment ofOil'sofAppendix B,Protocol for Addressing Induced Seismicity

407

Climate VISION: Private Sector Initiatives: Lime: GHG Inventory Protocols  

Office of Scientific and Technical Information (OSTI)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformation In closing,-- Energy, science,Links - TechnicalGHGGHG Inventory Protocols

408

Verifying a Simplified Fuel Oil Flow Field Measurement Protocol  

SciTech Connect (OSTI)

The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

Henderson, H.; Dentz, J.; Doty, C.

2013-07-01T23:59:59.000Z

409

Available transfer capability and first order sensitivity  

SciTech Connect (OSTI)

A method of calculating Available Transfer Capability and the exploration of the first order effects of certain power system network variables are described. The Federal Energy Regulatory Commission has ordered that bulk electrical control areas must provide to market participants a ``commercially viable`` network transfer capability for the import, export, and through-put of energy. A practical method for deriving this transfer capability utilizing both linear and non-linear power flow analysis methods is developed that acknowledges both thermal and voltage system limitations. The Available Transfer Capability is the incremental transfer capability derived by the method reduced by margins. A procedure for quantifying the first order effect of network uncertainties such as load forecast error and simultaneous transfers on the calculated transfer capability of a power system snapshot are explored. The quantification of these network uncertainties can provide information necessary for system operation, planning, and energy market participation.

Gravener, M.H. [PJM Interconnection, L.L.C., Valley Forge, PA (United States)] [PJM Interconnection, L.L.C., Valley Forge, PA (United States); Nwankpa, C. [Drexel Univ., Philadelphia, PA (United States)] [Drexel Univ., Philadelphia, PA (United States)

1999-05-01T23:59:59.000Z

410

Nuclear reactor safety heat transfer  

SciTech Connect (OSTI)

Reviewed is a book which has 5 parts: Overview, Fundamental Concepts, Design Basis Accident-Light Water Reactors (LWRs), Design Basis Accident-Liquid-Metal Fast Breeder Reactors (LMFBRs), and Special Topics. It combines a historical overview, textbook material, handbook information, and the editor's personal philosophy on safety of nuclear power plants. Topics include thermal-hydraulic considerations; transient response of LWRs and LMFBRs following initiating events; various accident scenarios; single- and two-phase flow; single- and two-phase heat transfer; nuclear systems safety modeling; startup and shutdown; transient response during normal and upset conditions; vapor explosions, natural convection cooling; blockages in LMFBR subassemblies; sodium boiling; and Three Mile Island.

Jones, O.C.

1982-07-01T23:59:59.000Z

411

Concurrent Transfers Historical Yearly Peak  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User Group andCompositional VariationCluster) |About Us /Transfers

412

Transfer Service (contracts/rd)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2Topo II: AnTraining andfor a CleanTransfer Service --

413

Aggregate Transfers Last 8 Days  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre theAdministratorCFM LEAPAgenda Agenda LargeTransfers Last 8

414

https://doyouliveunited.org 1. Enter you user ID  

E-Print Network [OSTI]

Search' button. 7. Enter you search terms for the agency of your choice and click on `Search'. #12;httpshttps://doyouliveunited.org 1. Enter you user ID: your email address Enter your password: welcome be different then the options listed here. 5. For a payroll pledge, enter the amount per pay or the total

415

https://youtube.com/devicesupport | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption byAbout SRNL HomeYoungCleanJournalMachine93 1. All Grade

416

https://sweis.nv.doe.gov/References/Szymanski%202010.txt  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Reviewwill help prepareA

417

Air Leakage and Air Transfer Between Garage and Living Space  

SciTech Connect (OSTI)

This research project focused on evaluation of air transfer between the garage and living space in a single-family detached home constructed by a production homebuilder in compliance with the 2009 International Residential Code and the 2009 International Energy Conservation Code. The project gathered important information about the performance of whole-building ventilation systems and garage ventilation systems as they relate to minimizing flow of contaminated air from garage to living space. A series of 25 multi-point fan pressurization tests and additional zone pressure diagnostic testing characterized the garage and house air leakage, the garage-to-house air leakage, and garage and house pressure relationships to each other and to outdoors using automated fan pressurization and pressure monitoring techniques. While the relative characteristics of this house may not represent the entire population of new construction configurations and air tightness levels (house and garage) throughout the country, the technical approach was conservative and should reasonably extend the usefulness of the results to a large spectrum of house configurations from this set of parametric tests in this one house. Based on the results of this testing, the two-step garage-to-house air leakage test protocol described above is recommended where whole-house exhaust ventilation is employed. For houses employing whole-house supply ventilation (positive pressure) or balanced ventilation (same pressure effect as the Baseline condition), adherence to the EPA Indoor airPLUS house-to-garage air sealing requirements should be sufficient to expect little to no garage-to-house air transfer.

Rudd, A.

2014-09-01T23:59:59.000Z

418

Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

Many energy-aware routing protocols have been proposed for wireless sensor networks. Most of them are only energy savers and do not take care about energy balancing. The energy saver protocols try to decrease the energy consumption of the network as a whole; however the energy manager protocols balance the energy consumption in the network to avoid network partitioning. This means that energy saver protocols are not necessarily energy balancing and vice versa. However, the lifetime of wireless sensor network is strictly depending on energy consumption; therefore, energy management is an essential task to be considered. This paper proposes an energy aware routing protocol, named FEAR, which considers energy balancing and energy saving. It finds a fair trade-off between energy balancing and energy saving by fuzzy set concept. FEAR routing protocol is simulated and evaluated by Glomosim simulator.

Ahvar, Ehsan; Piran, Mohammad Jalil

2011-01-01T23:59:59.000Z

419

Building America Indoor Temperature and Humidity Measurement Protocol  

SciTech Connect (OSTI)

When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every 4 years the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the 'average occupant' in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

Engebrecht-Metzger, C.; Norton, P.

2014-02-01T23:59:59.000Z

420

International Workshops to Foster Implementation of the IAEA Additional Protocol  

SciTech Connect (OSTI)

A country’s adherence to the International Atomic Energy Agency’s (IAEA) Additional Protocol is an important statement to the world of that country’s commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEA’s regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

2003-07-14T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Robustness of two-way quantum communication protocols against Trojan horse attack  

E-Print Network [OSTI]

We discuss the robustness of two-way quantum communication protocols against Trojan horse attack and introduce a novel attack, delay-photon Trojan horse attack. Moreover, we present a practical way for two-way quantum communication protocols to prevent the eavesdropper from stealing the information transmitted with Trojan horse attacks. It means that two-way quantum communication protocols is also secure in a practical application.

Fu-Guo Deng; Ping Zhou; Xi-Han Li; Chun-Yan Li; Hong-Yu Zhou

2005-08-23T23:59:59.000Z

422

Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, 6-27-13.

2006-12-15T23:59:59.000Z

423

Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, dated 6-27-13, cancels DOE O 142.1A. Certified 12-3-14.

2006-12-15T23:59:59.000Z

424

A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes  

Broader source: Energy.gov [DOE]

Summary of LANL?s testing protocol work presented to the High Temperature Membrane Working Group Meeting, Orlando FL, October 17, 2003

425

E-Print Network 3.0 - aware routing protocol Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for Mobile Ad Hoc Networks Morteza Maleki, Karthik Dantu... the network lifetime. Simulation results show that the proposed power-aware source routing protocol has... . The...

426

E-Print Network 3.0 - acid protocols handbook Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to follow a protocol other than Standard Methods, i.e., to report negative acidities as zero... Net alkalinity and net acidity 2: Practical considerations ... Source: Kirby, Carl...

427

E-Print Network 3.0 - area adapted protocol Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Support for Flexible, Function-Based Communication Systems Douglas C. Schmidt Burkhard Stiller Ahmed Tantawy Summary: applications to adaptively update protocol mechanisms and...

428

addition-cambridge trial protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

429

anesthesia gas-guided protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

430

Impacts of the Kyoto Protocol on Energy Markets and Economic Activity  

Reports and Publications (EIA)

Analyzes the impacts on the Kyoto Protocol on U.S. energy markets and the economy in the 2008-2012 time frame.

1998-01-01T23:59:59.000Z

431

On the group theoretic structure of a class of quantum dialogue protocols  

E-Print Network [OSTI]

Intrinsic symmetry of the existing protocols of quantum dialogue are explored. It is shown that if we have a set of mutually orthogonal $n$-qubit states {\

Chitra Shukla; Vivek Kothari; Anindita Banerjee; Anirban Pathak

2012-03-27T23:59:59.000Z

432

Development and quantitative analyses of a universal rRNA-subtraction protocol for microbial metatranscriptomics  

E-Print Network [OSTI]

Metatranscriptomes generated by pyrosequencing hold significant potential for describing functional processes in complex microbial communities. Meeting this potential requires protocols that maximize mRNA recovery by ...

Stewart, Frank J.

433

Breaking and making quantum money: toward a new quantum cryptographic protocol  

E-Print Network [OSTI]

Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge. There are no secure public-key quantum money schemes in the literature; as we show in this paper, the only previously published scheme [1] is insecure. We introduce a category of quantum money protocols which we call collision-free. For these protocols, even the bank cannot prepare multiple identical-looking pieces of quantum money. We present a blueprint for how such a protocol might work as well as a concrete example which we believe may be insecure.

Andrew Lutomirski; Scott Aaronson; Edward Farhi; David Gosset; Avinatan Hassidim; Jonathan Kelner; Peter Shor

2009-12-21T23:59:59.000Z

434

Academic Knowledge Transfer in Social Networks  

E-Print Network [OSTI]

179 7.1.4 Gamification of academic knowledgean experiment in gamification of knowledge transfer withina process commonly known as Gamification. Introduction There

Slater, Mark David

2013-01-01T23:59:59.000Z

435

NATIONAL ENERGY TECHNOLOGY LABORATORY Technology Transfer Novel...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Alloy for the Manufacture of Improved Coronary Stents Success Story NETL Technology Transfer Group techtransfer@netl.doe.gov Contact Partners A coronary stent is a small,...

436

NATIONAL ENERGY TECHNOLOGY LABORATORY Technology Transfer Basic...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Basic Immobilized Amine Sorbent (BIAS) Process Success Story NETL Technology Transfer Group techtransfer@netl.doe.gov Contact Capturing carbon dioxide (CO 2 ) from the flue or...

437

International technology transfer, firm productivity and employment.  

E-Print Network [OSTI]

??This dissertation contributes to the empirical literature on the effects of international technology transfer on firms' productivity and employment in developing and transition countries. It… (more)

Pantea, Smaranda

2012-01-01T23:59:59.000Z

438

Acoustically Enhanced Boiling Heat Transfer  

E-Print Network [OSTI]

An acoustic field is used to increase the critical heat flux (CHF) of a flat-boiling-heat-transfer surface. The increase is a result of the acoustic effects on the vapor bubbles. Experiments are performed to explore the effects of an acoustic field on vapor bubbles in the vicinity of a rigid-heated wall. Work includes the construction of a novel heater used to produce a single vapor bubble of a prescribed size and at a prescribed location on a flatboiling surface for better study of an individual vapor bubble's reaction to the acoustic field. Work also includes application of the results from the single-bubble heater to a calibrated-copper heater used for quantifying the improvements in CHF.

Z. W. Douglas; M. K. Smith; A. Glezer

2008-01-07T23:59:59.000Z

439

Miniature mechanical transfer optical coupler  

DOE Patents [OSTI]

A miniature mechanical transfer (MT) optical coupler ("MMTOC") for optically connecting a first plurality of optical fibers with at least one other plurality of optical fibers. The MMTOC may comprise a beam splitting element, a plurality of collimating lenses, and a plurality of alignment elements. The MMTOC may optically couple a first plurality of fibers disposed in a plurality of ferrules of a first MT connector with a second plurality of fibers disposed in a plurality of ferrules of a second MT connector and a third plurality of fibers disposed in a plurality of ferrules of a third MT connector. The beam splitting element may allow a portion of each beam of light from the first plurality of fibers to pass through to the second plurality of fibers and simultaneously reflect another portion of each beam of light from the first plurality of fibers to the third plurality of fibers.

Abel, Philip (Overland Park, KS); Watterson, Carl (Kansas City, MO)

2011-02-15T23:59:59.000Z

440

The transfer from nuclear development  

SciTech Connect (OSTI)

The Department of Energy`s task of cleaning up the extensive nuclear weapons complex is of such enormous proportions that there can be no definitive solution that can be adjusted to a predictable cost. The cleanup and disposition of hazardous wastes in many cases will take thirty or more years. In the near term, the economic impact affecting the communities and large number of displaced workers is a significant concern to the Department and the nation. However, before a useful transfer of DOE land, facilities, and sites to the public for economic development can be realized, a consistent and comprehensive process of compliance with regulatory requirements needs to be established. The simultaneous pursuit of these goals creates an unprecedented challenge to the Department of Energy and the US.

Smith, L.

1993-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks  

SciTech Connect (OSTI)

We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

442

IBM NJE protocol emulator for VAX/VMS  

SciTech Connect (OSTI)

Communications software has been written at Argonne National Laboratory to enable a VAX/VMS system to participate as an end-node in a standard IBM network by emulating the Network Job Entry (NJE) protocol. NJE is actually a collection of programs that support job networking for the operating systems used on most large IBM-compatible computers (e.g., VM/370, MVS with JES2 or JES3, SVS, MVT with ASP or HASP). Files received by the VAX can be printed or saved in user-selected disk files. Files sent to the network can be routed to any node in the network for printing, punching, or job submission, as well as to a VM/370 user's virtual reader. Files sent from the VAX are queued and transmitted asynchronously to allow users to perform other work while files are awaiting transmission. No changes are required to the IBM software.

Engert, D.E.

1981-01-01T23:59:59.000Z

443

A Zero Knowledge Protocol For Nuclear Warhead Verification  

SciTech Connect (OSTI)

The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

Glaser, Alexander [Princeton, Univ., NJ (United States). Program on Science and Global Security] [Princeton, Univ., NJ (United States). Program on Science and Global Security; Goldston, Robert J. [Princeton Plasma Physics Lab., Princeton, NJ (United States)] [Princeton Plasma Physics Lab., Princeton, NJ (United States)

2014-03-14T23:59:59.000Z

444

Scalable Energy Efficient Location Aware Multicast Protocol for MANET (SEELAMP)  

E-Print Network [OSTI]

Multicast plays an important role in implementing the group communications in bandwidth scarce multihop mobile ad hoc networks. However, due to the dynamic topology of MANETs it is very difficult to build optimal multicast trees and maintaining group membership, making even more challenging to implement scalable and robust multicast in Mobile Ad hoc Networks (MANET). A scalable and energy efficient location aware multicast algorithm, called SEELAMP, for mobile ad hoc networks is presented in the paper that is based on creation of shared tree using the physical location of the nodes for the multicast sessions. It constructs a shared bi-directional multicast tree for its routing operations rather than a mesh, which helps in achieving more efficient multicast delivery. The algorithm uses the concept of small overlapped zones around each node for proactive topology maintenance with in the zone. Protocol depends on the location information obtained using a distributed location service, which effectively reduces th...

Kamboj, Pariza

2010-01-01T23:59:59.000Z

445

Quality Assurance Protocol for AFCI Advanced Structural Materials Testing  

SciTech Connect (OSTI)

The objective of this letter is to inform you of recent progress on the development of advanced structural materials in support of advanced fast reactors and AFCI. As you know, the alloy development effort has been initiated in recent months with the procurement of adequate quantities of the NF616 and HT-UPS alloys. As the test alloys become available in the coming days, mechanical testing, evaluation of optimizing treatments, and screening of environmental effects will be possible at a larger scale. It is therefore important to establish proper quality assurance protocols for this testing effort in a timely manner to ensure high technical quality throughout testing. A properly implemented quality assurance effort will also enable preliminary data taken in this effort to be qualified as NQA-1 during any subsequent licensing discussions for an advanced design or actual prototype. The objective of this report is to describe the quality assurance protocols that will be used for this effort. An essential first step in evaluating quality protocols is assessing the end use of the data. Currently, the advanced structural materials effort is part of a long-range, basic research and development effort and not, as yet, involved in licensing discussions for a specific reactor design. After consultation with Mark Vance (an ORNL QA expert) and based on the recently-issued AFCI QA requirements, the application of NQA-1 quality requirements will follow the guidance provided in Part IV, Subpart 4.2 of the NQA-1 standard (Guidance on Graded Application of QA for Nuclear-Related Research and Development). This guidance mandates the application of sound scientific methodology and a robust peer review process in all phases, allowing for the data to be qualified for use even if the programmatic mission changes to include licensing discussions of a specific design or prototype. ORNL has previously implemented a QA program dedicated to GNEP activities and based on an appropriately graded application of NQA-1 requirements at the site. The current program is being revised to incorporate changes imposed through the recently revised AFCI Technical Integration Office QA requirements. Testing conducted under the AFCI QA program for the advanced structural materials effort shall incorporate the following quality assurance expectations: (1) personnel are adequately trained to perform assigned work; (2) activities are controlled to ensure consistency of results; (3) records necessary to substantiate how the work was performed are maintained (dedicated laboratory notebooks will be used); (4) the pedigree and traceability of the various tested materials are maintained throughout the described processes using consistent sample numbering and adequate record keeping; (5) equipment with the potential to affect the quality of the planned work is calibrated and maintained in accordance with applicable operating requirements. In addition, all reporting or related dissemination by ORNL personnel of the results of the work described in this subcontract shall be conducted in accordance with the requirements described or referenced in the ORNL Standards Based Management System subject area entitled Scientific and Technical Information. Reporting or publications at other institutions will be conducted in accordance with the requirements of that institution. Successful implementation of these protocols will provide a sound basis for future decisions and research. In addition, these steps will also help ensure that results can also be applied to licensing discussions at a future date.

Busby, Jeremy T [ORNL

2009-05-01T23:59:59.000Z

446

Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software  

SciTech Connect (OSTI)

This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

2013-09-06T23:59:59.000Z

447

Intelligent Network-Layer Management for Wireless Mesh Networks: Dynamic Tuning of a Reactive Routing Protocol  

E-Print Network [OSTI]

1 Intelligent Network-Layer Management for Wireless Mesh Networks: Dynamic Tuning of a Reactive Routing Protocol Dan Marconett, Minsoo Lee, Xiaohui Ye and S. J. Ben Yoo Dept. of Electrical and Computer learning to dynamically modify reactive routing protocol parameters in real-time, to better facilitate

Kolner, Brian H.

448

Reactive Protocols for Aircraft Electric Power Distribution Huan Xu, Ufuk Topcu, and Richard M. Murray  

E-Print Network [OSTI]

Reactive Protocols for Aircraft Electric Power Distribution Huan Xu, Ufuk Topcu, and Richard M. Murray Abstract-- The increasing complexity of electric power sys- tems leads to integration and verification challenges. We consider the problem of designing a control protocol for the aircraft electric

Murray, Richard M.

449

Energy-Ecient Initialization Protocols for Radio Networks with no Collision Detection  

E-Print Network [OSTI]

Energy-EĂ?cient Initialization Protocols for Radio Networks with no Collision Detection #3; K been initialized in advance. The main contribution of this work is to propose energy- e not be possible while on mission, we are interested in designing protocols that are highly energy

Nakano, Koji

450

LLaannggeerrhhaannss LLaabb PPrroottooccoollss Chemical Waste Disposal Protocol.docx pg 1 of 1  

E-Print Network [OSTI]

LLaannggeerrhhaannss LLaabb PPrroottooccoollss Chemical Waste Disposal Protocol.docx pg 1 of 1 Chemical Waste Disposal Protocol For Chemical Waste Pick-Up: 1. Log on to http://www.ncsu.edu/ehs. 2. Click waste item being submitted. 7. Fill out and affix a Hazardous Waste label, from the drawer labeled

Langerhans, Brian

451

The evaluation of an analytical protocol for the determination of substances in waste for hazard classification  

E-Print Network [OSTI]

1 The evaluation of an analytical protocol for the determination of substances in waste for hazard The classification of waste as hazardous could soon be assessed in Europe using largely the hazard properties of its knowledge of the component constituents of a given waste will therefore be necessary. An analytical protocol

Boyer, Edmond

452

An analytical protocol for the knowledge of waste by Pierre HENNEBERT1  

E-Print Network [OSTI]

An analytical protocol for the knowledge of waste by substances Pierre HENNEBERT1 , Arnaud PAPIN2 1 Technologique ALATA, BP n°2, 60550 Verneuil en Halatte, France. Abstract The hazardousness of waste could samples of different industrial wastes have been tested following (with differences) this protocol by two

Paris-Sud XI, Université de

453

Improving TCP Throughput over Lossy Links Using Protocol-Level Speculations  

E-Print Network [OSTI]

Improving TCP Throughput over Lossy Links Using Protocol-Level Speculations Haowei Bai Honeywell@ou.edu Abstract-- The degradation of Transport Control Protocol (TCP) throughput in networks with lossy links. This is very similar to processor performance degradation due to control hazards in CPU design. First, two

Minnesota, University of

454

Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland ................................................................................................................2 7. Guidance for testing ANSI N42.42 data format requirements ................................2 8..........................................................................................................3 #12;TEST AND EVALUATION PROTOCOL TEP NO. N42.48 PREPARED BY: DIV682 TITLE: Spectroscopic Personal

455

Protocol for GL spin columns p10, 200ug capacity. p200, 600ug capacity.  

E-Print Network [OSTI]

Protocol for GL spin columns p10, 200ug capacity. p200, 600ug capacity. Glscienceinc.com product tips (exact protocol from GL Sciences): 1. Bring samples up in 65 uL of Buffer A. 2. Condition a. Add

Richardson, David

456

Hector is an Energy effiCient Tree-based Optimized Routing protocol for wireless networks  

E-Print Network [OSTI]

Hector is an Energy effiCient Tree-based Optimized Routing protocol for wireless networks Nathalie geographic locations. We propose HECTOR, a hybrid energy efficient tree-based optimized routing protocol, based on two sets of virtual coordinates. One set is based on rooted tree coordinates, and the other

Stojmenovic, Ivan

457

EHS-Net Tomato Handling Study EHS-Net Tomato Handling Study Protocol  

E-Print Network [OSTI]

EHS-Net Tomato Handling Study 1 EHS-Net Tomato Handling Study Protocol I. Project Overview Title EHS-Net Tomato Handling Study Protocol Summary Few studies have examined in detail the nature Health Specialists Network (EHS-Net) special study. EHS- Net is a collaboration involving the Centers

458

Energy-Aware Tag Anti-Collision Protocols for RFID Systems Vinod Namboodiri, Lixin Gao  

E-Print Network [OSTI]

provide significant energy savings when compared to the existing Query Tree protocol while sharingEnergy-Aware Tag Anti-Collision Protocols for RFID Systems Vinod Namboodiri, Lixin Gao Department of Electrical and Computer Engineering University of Massachusetts at Amherst Email: {vnambood, lgao

Namboodiri, Vinod

459

A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks  

E-Print Network [OSTI]

A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks H. Yang, F. Ye and B. Sikdar a "Dynamic Query-tree Energy Balancing" (DQEB) protocol to dynamically adjust the tree structure and minimize networks. In [15] it has been shown that the minimum- energy broadcast tree problem is NP

Sikdar, Biplab

460

Optimal Decentralized Protocol for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low  

E-Print Network [OSTI]

Abstract-- Motivated by the power-grid-side challenges in the integration of electric vehicles, we proposeOptimal Decentralized Protocol for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low a decentralized protocol for negotiating day-ahead charging schedules for electric vehicles. The overall goal

Low, Steven H.

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks Venugopalan Ramasubramanian@ece.cornell.edu, egs@cs.cornell.edu} ABSTRACT A central challenge in ad hoc networks is the design of rout- ing--Routing Protocols General Terms Design, Performance Keywords Hybrid, Adaptive, Ad Hoc Networks This work

Keinan, Alon

462

Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks  

E-Print Network [OSTI]

Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks Suyang Ju Submitted to the graduate degree program in Electrical Engineering & Computer Science and the Graduate Faculty of the University of Kansas School...: Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks Dissertation Committee: _____________________________________ Dr. Joseph B. Evans, Advisor Professor, EECS _____________________________________ Dr. Victor Frost...

Ju, Suyang

2011-12-31T23:59:59.000Z

463

Comparison of two Self-Organization and Hierarchical Routing Protocols for Ad Hoc Networks  

E-Print Network [OSTI]

Comparison of two Self-Organization and Hierarchical Routing Protocols for Ad Hoc Networks Bet. In this article, we compare two self-organization and hierarchical rout- ing protocols for ad hoc networks-organization and hierarchical routing in ad hoc networks. keywords: ad hoc networks, hierarchical routing, DHT, comparison

Paris-Sud XI, Université de

464

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols  

E-Print Network [OSTI]

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols Nuno Neves W. Kent that allows the rapid testing of checkpoint protocols with standard benchmarks. To achieve this goal, RENEW evaluated using the RENEW envi- ronment with SPEC and NAS benchmarks on a network of workstations connected

Neves, Nuno

465

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols  

E-Print Network [OSTI]

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols Nuno Neves W. Kent that allows the rapid testing of checkpoint protocols with standard benchmarks. To achieve this goal, RENEW evaluated using the RENEW envi­ ronment with SPEC and NAS benchmarks on a network of workstations connected

Neves, Nuno

466

Tracing Eye Movement Protocols with Cognitive Process Models Dario D. Salvucci (dario+@cs.cmu.edu)  

E-Print Network [OSTI]

1 Tracing Eye Movement Protocols with Cognitive Process Models Dario D. Salvucci (dario+@cmu.edu) Department of Psychology; Carnegie Mellon University Pittsburgh, PA 15213 Abstract In using eye movements to develop cognitive models, researchers typically analyze eye movement protocols with aggregate measures

Salvucci, Dario D.

467

Fish Community Assessment Rapid Bioassessment Protocol V --Fish (EPA 1989, 1999).......................................................693  

E-Print Network [OSTI]

APPENDIX C Fish Community Assessment CONTENTS Rapid Bioassessment Protocol V -- Fish (EPA 1989 ......................................................................................................................................707 RAPID BIOASSESSMENT PROTOCOL V -- FISH (EPA 1989, 1999) The following are excerpts from U.S. EPA, but focuses on fish. Electrofishing, the most common technique used by agencies that monitor fish communities

Pitt, Robert E.

468

BEAM: A Burst-Aware Energy-Efficient Adaptive MAC Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

BEAM: A Burst-Aware Energy-Efficient Adaptive MAC Protocol for Wireless Sensor Networks Markus|wagen|braun|dolfus@iam.unibe.ch Abstract--Low latency for packet delivery, high throughput, good reactivity, and energy-efficient operation that optimizations for energy-efficiency and performance parameters are contradicting, most MAC protocols proposed

Braun, Torsten

469

ERTP: Energy-Efficient and Reliable Transport Protocol for Data Streaming in Wireless Sensor  

E-Print Network [OSTI]

ERTP: Energy-Efficient and Reliable Transport Protocol for Data Streaming in Wireless Sensor applications in Wireless Sensor Networks require re- liable and energy-efficient transport protocols [17] [18 of minutes or hours), energy-efficiency is. Long-term operation and reliable delivery of the sensed data

New South Wales, University of

470

On the Adaptivity of today's Energy-Efficient MAC Protocols under varying Traffic Conditions  

E-Print Network [OSTI]

On the Adaptivity of today's Energy-Efficient MAC Protocols under varying Traffic Conditions typically accounts for a major portion of a WSN node's power consumption, researchers have proposed Energy-Efficient. Such protocols typically trade off energy-efficiency versus classical quality of service parameters (e

Braun, Torsten

471

Utility Accrual Real-Time Resource Access Protocols with Assured Individual Activity Timeliness Behavior  

E-Print Network [OSTI]

Utility Accrual Real-Time Resource Access Protocols with Assured Individual Activity Timeliness Behavior Abstract We present a class of utility accrual resource access protocols for real-time embedded systems. The proto- cols consider application activities that are subject to time/utility function time

Ravindran, Binoy

472

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS  

E-Print Network [OSTI]

1 DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudainayagam of functioning and available resources. In this paper, we propose a Device and Energy Aware Routing protocol-powered nodes and battery-powered nodes. We embed both the energy and the device awareness into the routing

Hou, Y. Thomas

473

GEAMS: A Geographic Energy-Aware Multipath Stream-based Routing Protocol for WMSNs  

E-Print Network [OSTI]

GEAMS: A Geographic Energy-Aware Multipath Stream- based Routing Protocol for WMSNs Samir Medjiah Energy-Aware Multipath Stream-based (GEAMS) routing protocol for WMSNs. GEAMS routing decisions are made transmission in WMSNs. Keywords -- WSN, WMSN, Geographic Routing, Multipath Routing, Energy Aware routing... I

Paris-Sud XI, Université de

474

AGEM: Adaptive Greedy-Compass Energy-aware Multipath Routing Protocol for WMSNs  

E-Print Network [OSTI]

AGEM: Adaptive Greedy-Compass Energy-aware Multipath Routing Protocol for WMSNs Samir Medjiah--This paper presents an Adaptive Greedy-Compass Energy-aware Multipath (AGEM), a novel routing protocol. Index terms--WSN, WMSN, Geographic Routing, Angle Routing Multipath Routing, Energy Aware routing... I

Paris-Sud XI, Université de

475

The Municipal Solid Waste Landfill as a Source of Montreal Protocol-restricted Halocarbons in the  

E-Print Network [OSTI]

The Municipal Solid Waste Landfill as a Source of Montreal Protocol-restricted Halocarbons of Geophysics #12;2 #12;The Municipal Solid Waste Landfill as a Source of Montreal Protocol municipal solid waste (MSW) landfills. With several hundred MSW landfills in both the US and UK, estimating

476

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks  

E-Print Network [OSTI]

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks François Ingelrest.Mitton,David.Simplot}@lifl.fr Abstract--We present a turnover based adaptive HELLO protocol (TAP), which enables nodes in mobile networks to dynamically adjust their HELLO messages frequency depending on the current speed of nodes. To the best of our

Paris-Sud XI, Université de

477

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

Tygar, Doug

478

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME  

E-Print Network [OSTI]

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

479

METHODOLOGY Open Access Protocol: A simple phenol-based method for 96-well  

E-Print Network [OSTI]

Arabidopsis seedlings. This prompted us to develop a high-throughput RNA extraction protocol (HTP96) adapted. Conclusion: The development of the HTP96 protocol has vastly increased our sample throughput, allowing us in many labs, and develop an effective high-throughput gene expression platform. We propose that the HTP96

Howard, Martin

480

An Opportunistic Virtual MISO (OVM) Protocol for Multi-hop Wireless Networks  

E-Print Network [OSTI]

1 An Opportunistic Virtual MISO (OVM) Protocol for Multi-hop Wireless Networks Van Nguyen-utilized and performance is not maximized. In this work, we propose the Opportunistic Virtual MISO (OVM) protocol for multi-hop wireless networks. OVM combines virtual MISO (using space- time block codes) and cooperative diversity

Perkins, Dmitri

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Specification and Analysis of the AER/NCA Active Network Protocol Suite in  

E-Print Network [OSTI]

Specification and Analysis of the AER/NCA Active Network Protocol Suite to the specification and analy- sis of the AER/NCA suite of active network multicast protocol compo- nents, AER/NCA poses challenging new problems for its formal specification and analysis. Real-Time Maude

Ă?lveczky, Peter Csaba

482

Algorithms for Categorizing Multiprocessor Communication Under Invalidate and UpdateBased Coherence Protocols \\Lambda  

E-Print Network [OSTI]

of useless traffic entailed by each coherence protocol. Under an invalidate­based protocol, our algorithms and Technology---HighPerformance Computing, Software Science and Tech­ nology program, ARPA Order no. 8930 to intro­ duce useless communication due to a mismatch between the hardware unit of coherence and the data

Bianchini, Ricardo

483

State Pruning for Test Vector Generation for a Multiprocessor Cache Coherence Protocol  

E-Print Network [OSTI]

fist search (BFS) to generate the frontier state, which is similar to [6]. Then each DFS search usesState Pruning for Test Vector Generation for a Multiprocessor Cache Coherence Protocol Ying Chen coherence protocol. Generating traces for system verification using a model checker and then using

Minnesota, University of

484

The past, present and future of protocol checking with CSP and FDR  

E-Print Network [OSTI]

AVoCS 2006 The past, present and future of protocol checking with CSP and FDR Bill Roscoe1 Oxford of these meetings was the development of the CSP model of cryptographic protocols, following Gavin Lowe's discovery the particular advantages of using a process algebra, and CSP in particular, for modelling cryptoprotocols

Paris-Sud XI, Université de

485

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network [OSTI]

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

486

Off-line Micro-payment Protocol for Multiple Vendors in Mobile Commerce Xiaoling Dai1  

E-Print Network [OSTI]

to be enhanced for existing micro- payment approaches. Also, with the proliferation of wireless networks, mobile] and the NetPay micro-payment protocol with the client- side e-wallet in the client-server networks. WeOff-line Micro-payment Protocol for Multiple Vendors in Mobile Commerce Xiaoling Dai1 Oluwatomi

Grundy, John

487

A Tree-based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming  

E-Print Network [OSTI]

1 A Tree-based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming a Tree-based Forward Digest Protocol (TFDP) to verify data integrity in distributed media streaming the effectiveness of TFDP. Keywords: Data integrity, message digest, and media streaming. I. INTRODUCTION Consider

Xu, Dongyan

488

Assessing Rural Transformations: Piloting a Qualitative Impact Protocol in Malawi and Ethiopia  

E-Print Network [OSTI]

Assessing Rural Transformations: Piloting a Qualitative Impact Protocol in Malawi and Ethiopia a Qualitative Impact Protocol in Malawi and Ethiopia James Copestake and Fiona Remnant Abstract This paper impact evaluation of NGO sponsored rural development projects in Malawi and Ethiopia. Two of the projects

Burton, Geoffrey R.

489

Reducing the Replacement Overhead on COMA Protocols for Workstation-Based Architectures  

E-Print Network [OSTI]

Reducing the Replacement Overhead on COMA Protocols for Workstation-Based Architectures Diego R discuss the behavior of the replacement mechanism of well-known COMA protocols applied to a loosely replacement mecha- nism in order to select the destination node of a replacement transaction without

Llanos, Diego R.

490

Summary Weusedthreemethodstomeasureboundarylayer conductance to heat transfer (gbH) and water vapor transfer  

E-Print Network [OSTI]

Summary Weusedthreemethodstomeasureboundarylayer conductance to heat transfer (gbH) and water vapor of transpiration). The boundary layer conductance to heat transfer is small enough that leaf temperature can become diffusion, the boundary layer around a leaf also provides resistance to the transfer of heat between a leaf

Martin, Timothy

491

Sponsored Project Account Cost Transfer Explanation  

E-Print Network [OSTI]

Sponsored Project Account Cost Transfer Explanation Check-Off List December 2011 The explanations checked below best describe the reasons for why the cost transfers are being made. Costs as to how to allocate the cost, temporarily assigned the cost to an existing account that acted

He, Chuan

492

BRYANT UNIVERSITY INTERNATIONAL STUDENT TRANSFER FORM  

E-Print Network [OSTI]

BRYANT UNIVERSITY INTERNATIONAL STUDENT TRANSFER FORM Bryant University requires this form at __________________________________to provide the information requested below in order to complete my transfer to Bryant University for International Admission Bryant University Office of Admission 1150 Douglas Pike Smithfield, RI 02917 (401) 232

Blais, Brian

493

Automated Operating Procedures for Transfer Limits  

E-Print Network [OSTI]

Automated Operating Procedures for Transfer Limits Final Project Report Power Systems Engineering · Illinois · Iowa State · Texas A&M · Washington State · Wisconsin Automated Operating Procedures operating procedures to establish system constraints, particularly in regards to transfer limits across

494

Data Communication Principles Reliable Data Transfer  

E-Print Network [OSTI]

Principles Switching Reliable Data Transfer Data Rate of a Communication Channel Transmission Media Data Principles Switching Reliable Data Transfer Data Rate of a Communication Channel Transmission Media Data Transmission Fiber vs Copper Wire Weight vs bandwidth Cost Security 11 / 52 #12;Data Communication Principles

Ramkumar, Mahalingam

495

Phonon-induced dynamic resonance energy transfer  

E-Print Network [OSTI]

In a network of interacting quantum systems achieving fast coherent energy transfer is a challenging task. While quantum systems are susceptible to a wide range of environmental factors, in many physical settings their interactions with quantized vibrations, or phonons, of a supporting structure are the most prevalent. This leads to noise and decoherence in the network, ultimately impacting the energy-transfer process. In this work, we introduce a novel type of coherent energy-transfer mechanism for quantum systems, where phonon interactions are able to actually enhance the energy transfer. Here, a shared phonon interacts with the systems and dynamically adjusts their resonances, providing remarkable directionality combined with quantum speed- up. We call this mechanism phonon-induced dynamic resonance energy transfer and show that it enables long-range coherent energy transport even in highly disordered systems.

James Lim; Mark Tame; Ki Hyuk Yee; Joong-Sung Lee; Jinhyoung Lee

2014-05-08T23:59:59.000Z

496

Direct memory access transfer completion notification  

DOE Patents [OSTI]

DMA transfer completion notification includes: inserting, by an origin DMA engine on an origin node in an injection first-in-first-out (`FIFO`) buffer, a data descriptor for an application message to be transferred to a target node on behalf of an application on the origin node; inserting, by the origin DMA engine, a completion notification descriptor in the injection FIFO buffer after the data descriptor for the message, the completion notification descriptor specifying a packet header for a completion notification packet; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; sending, by the origin DMA engine, the completion notification packet to a local reception FIFO buffer using a local memory FIFO transfer operation; and notifying, by the origin DMA engine, the application that transfer of the message is complete in response to receiving the completion notification packet in the local reception FIFO buffer.

Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Parker, Jeffrey J. (Rochester, MN)

2011-02-15T23:59:59.000Z

497

Enhanced heat transfer for thermionic power modules  

SciTech Connect (OSTI)

The thermionic power module is capable of operating at very high heat fluxes, which in turn serve to reduce capital costs. The most efficient operation also requires uniform heat fluxes. The development of enhanced heat transfer systems is required to meet the demand for high heat fluxes (>20 w/cm/sup 2/) at high temperatures (>1500K) which advanced thermionic power modules place upon combustion systems. Energy transfer from the hot combustion gases may take place by convection, radiation, or a combination of radiation and convection. Enhanced convective heat transfer with a jet impingement system has been demonstrated in a thermionic converter. The recently-developed cellular ceramic radiative heat transfer system has also been applied to a thermionic converter. By comparing the jet impingement and cellular ceramic radiative heat transfer systems, an appropriate system may be selected for utilization in advanced thermionic power modules. Results are reported.

Johnson, D.C.

1981-07-01T23:59:59.000Z

498

Technology Transfer at VTIP VTIP in 20 Minutes  

E-Print Network [OSTI]

Technology Transfer at VTIP VTIP in 20 Minutes What You Need to Know Virginia Tech Intellectual Properties, Inc. #12;Technology Transfer at VTIP VTIP Overview Virginia Tech Intellectual Properties, Inc;Technology Transfer at VTIP Tech Transfer · The tech transfer process typically includes: · Identifying new

Liskiewicz, Maciej

499

GILAD LAB LCL REPROGRAMMING PROTOCOL Days -2: Splitting LCL Lines  

E-Print Network [OSTI]

from above try to spin down ~6-10x106 cells in a 15 mL conical tube. Spin cells at 1000 RPM for 5 different 15 mL conical (spin down 6 million cells in total in 3 different tubes) and spin at 1000 RPM for 5 + 50 µg/mL VitC and 0.5 mM Sodium Butyrate (NaB) 1. Using a 1 mL pipette, transfer cells to a 15 m

Pritchard, Jonathan

500

Radiative heat transfer in porous uranium dioxide  

SciTech Connect (OSTI)

Due to low thermal conductivity and high emissivity of UO{sub 2}, it has been suggested that radiative heat transfer may play a significant role in heat transfer through pores of UO{sub 2} fuel. This possibility was computationally investigated and contribution of radiative heat transfer within pores to overall heat transport in porous UO{sub 2} quantified. A repeating unit cell was developed to model approximately a porous UO{sub 2} fuel system, and the heat transfer through unit cells representing a wide variety of fuel conditions was calculated using a finite element computer program. Conduction through solid fuel matrix as wekk as pore gas, and radiative exchange at pore surface was incorporated. A variety of pore compositions were investigated: porosity, pore size, shape and orientation, temperature, and temperature gradient. Calculations were made in which pore surface radiation was both modeled and neglected. The difference between yielding the integral contribution of radiative heat transfer mechanism to overall heat transport. Results indicate that radiative component of heat transfer within pores is small for conditions representative of light water reactor fuel, typically less than 1% of total heat transport. It is much larger, however, for conditions present in liquid metal fast breeder reactor fuel; during restructuring of this fuel type early in life, the radiative heat transfer mode was shown to contribute as much as 10-20% of total heat transport in hottest regions of fuel.

Hayes, S.L. [Texas A and M Univ., College Station, TX (United States)] [Texas A and M Univ., College Station, TX (United States)

1992-12-01T23:59:59.000Z