Sample records for type definitions key

  1. Proof and Definition in Logic and Type Theory Proof and Definition in Logic and Type Theory

    E-Print Network [OSTI]

    Adams, Robin

    Proof and Definition in Logic and Type Theory Proof and Definition in Logic and Type Theory Robin questions. #12;Proof and Definition in Logic and Type Theory Definition and Proof Definition and proof -- but they are not in predicate logic or type theory. #12;Proof and Definition in Logic and Type Theory Methods of Definition

  2. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Wayne Moe

    2013-05-01T23:59:59.000Z

    This document provides key definitions, plant capabilities, and inputs and assumptions related to the Next Generation Nuclear Plant to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor. These definitions, capabilities, and assumptions were extracted from a number of NGNP Project sources such as licensing related white papers, previously issued requirement documents, and preapplication interactions with the Nuclear Regulatory Commission (NRC).

  3. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Phillip Mills

    2012-02-01T23:59:59.000Z

    This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

  4. DEFINITIONS / KEY WORDS POSSIBLE DUTIES EXAMPLE TITLE NAMES A person who works to someone else's

    E-Print Network [OSTI]

    Baltisberger, Jay H.

    these types of jobs are identified using only Custodian, Janitor, Housekeeper, etc. 1,2 Apprentice Apprentice Woodworker, Apprentice Weaver, Apprentice Blacksmith, etc 1,2 Office / Admin. Manage ment assist in training an apprentice or managing other workers. A highly skilled workman, artisan

  5. Connate Water Saturation -Irreducible or Not: the Key to Reliable Hydraulic Rock Typing in Reservoirs Straddling Multiple Capillary Windows

    E-Print Network [OSTI]

    Torres-Verdín, Carlos

    of flow capacity. High in-situ capillary pressure causes connate water saturation in reservoir rocks petrophysical analysis based solely on conventional logs, including gamma ray, neutron porosity, bulk densitySPE 166082 Connate Water Saturation - Irreducible or Not: the Key to Reliable Hydraulic Rock Typing

  6. Definitions: Types of Commissioning

    E-Print Network [OSTI]

    Martinez, J. T.

    2014-01-01T23:59:59.000Z

    • Design drawings are studied • Utility bills are analyzed Preliminary Assessment Report Implementation cost Expected CC Savings Maintenance issues Outcome ESL-KT-14-11-41 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Typical... weeks to 10 weeks per building • Building Comfort: Improved • Maintenance Cost: Reduced • Potential System Upgrades: Identified • Technical knowledge of in-house operating staff: Improved ESL-KT-14-11-41 CATEE 2014: Clean Air Through Efficiency...

  7. Amyloid Treatment and Research Program key research findings: Definition of the electron microscopic structure and x-ray diffraction pattern of amyloid

    E-Print Network [OSTI]

    Finzi, Adrien

    , which for the first time defined the biochemical nature and source of the amyloid fibril in this form microscopic structure and x-ray diffraction pattern of amyloid fibrils in 1967, providing key insight of amyloidosis. Characterization of the protein deposits in dialysis-associated amyloidosis as 2- microglobulin

  8. Data Assimilation Tools for CO2 Reservoir Model Development – A Review of Key Data Types, Analyses, and Selected Software

    SciTech Connect (OSTI)

    Rockhold, Mark L.; Sullivan, E. C.; Murray, Christopher J.; Last, George V.; Black, Gary D.

    2009-09-30T23:59:59.000Z

    Pacific Northwest National Laboratory (PNNL) has embarked on an initiative to develop world-class capabilities for performing experimental and computational analyses associated with geologic sequestration of carbon dioxide. The ultimate goal of this initiative is to provide science-based solutions for helping to mitigate the adverse effects of greenhouse gas emissions. This Laboratory-Directed Research and Development (LDRD) initiative currently has two primary focus areas—advanced experimental methods and computational analysis. The experimental methods focus area involves the development of new experimental capabilities, supported in part by the U.S. Department of Energy’s (DOE) Environmental Molecular Science Laboratory (EMSL) housed at PNNL, for quantifying mineral reaction kinetics with CO2 under high temperature and pressure (supercritical) conditions. The computational analysis focus area involves numerical simulation of coupled, multi-scale processes associated with CO2 sequestration in geologic media, and the development of software to facilitate building and parameterizing conceptual and numerical models of subsurface reservoirs that represent geologic repositories for injected CO2. This report describes work in support of the computational analysis focus area. The computational analysis focus area currently consists of several collaborative research projects. These are all geared towards the development and application of conceptual and numerical models for geologic sequestration of CO2. The software being developed for this focus area is referred to as the Geologic Sequestration Software Suite or GS3. A wiki-based software framework is being developed to support GS3. This report summarizes work performed in FY09 on one of the LDRD projects in the computational analysis focus area. The title of this project is Data Assimilation Tools for CO2 Reservoir Model Development. Some key objectives of this project in FY09 were to assess the current state-of-the-art in reservoir model development, the data types and analyses that need to be performed in order to develop and parameterize credible and robust reservoir simulation models, and to review existing software that is applicable to these analyses. This report describes this effort and highlights areas in which additional software development, wiki application extensions, or related GS3 infrastructure development may be warranted.

  9. Shor-Preskill Type Security-Proofs for Concatenated Bennett-Brassard 1984 Quantum Key Distribution Protocol

    E-Print Network [OSTI]

    W. -Y. Hwang; K. Matsumoto; H. Imai; J. Kim; H. -W. Lee

    2002-10-31T23:59:59.000Z

    We discuss long code problems in the Bennett-Brassard 1984 (BB84) quantum key distribution protocol and describe how they can be overcome by concatenation of the protocol. Observing that concatenated modified Lo-Chau protocol finally reduces to the concatenated BB84 protocol, we give the unconditional security of the concatenated BB84 protocol.

  10. Communication Definitions... general definition

    E-Print Network [OSTI]

    Jones, Ian L.

    Communication Definitions... general definition "the process of conveying information from a sender to a receiver with the use of a medium in which the communicated information is understood the same way by both sender and receiver" (Wikipedia)! Biological communication Action by one organism (individual

  11. Respiration of metal (hydr)oxides by Shewanella and Geobacter: a key role for multihaem c-type cytochromes

    SciTech Connect (OSTI)

    Shi, Liang; Squier, Thomas C.; Zachara, John M.; Fredrickson, Jim K.

    2007-07-01T23:59:59.000Z

    Dissimilatory reduction of metal (e.g. Fe, Mn) (hydr)oxides represents a challenge for microorganisms, as their cell envelopes are impermeable to metal (hydr)oxides that are poorly soluble in water. To overcome this physical barrier, the Gram-negative bacteria Shewanella oneidensis MR-1 and Geobactersulfurreducens have developed electron transfer (ET) strategies that require multihaem c-type cytochromes (c-Cyts). In S. oneidensis MR-1, multihaem c-Cyts CymA and MtrA are believed to transfer electrons from the inner membrane quinone/quinol pool through the periplasm to the outer membrane. The type II secretion system of S. oneidensis MR-1 has been implicated in the reduction of metal (hydr)oxides, most likely by translocating decahaem c-Cyts MtrC and OmcA across outer membrane to the surface of bacterial cells where they form a protein complex. The extracellular MtrC and OmcA can directly reduce solid metal (hydr)oxides. Likewise, outer membrane multihaem c-Cyts OmcE and OmcS of G. sulfurreducens are suggested to transfer electrons from outer membrane to type IV pili that are hypothesized to relay the electrons to solid metal (hydr)oxides. Thus, multihaem c-Cyts play critical roles in S. oneidensis MR-1-and G. sulfurreducens-mediated dissimilatory reduction of solid metal (hydr)oxides by facilitating ET across the bacterial cell envelope.

  12. The HST Key Project on the Extragalactic Distance Scale XXV. A Recalibration of Cepheid Distances to Type Ia Supernovae and the Value of the Hubble Constant

    E-Print Network [OSTI]

    Brad K. Gibson; Peter B. Stetson; Wendy L. Freedman; Jeremy R. Mould; Robert C. Kennicutt, Jr.; John P. Huchra; Shoko Sakai; John A. Graham; Caleb I. Fassett; Daniel D. Kelson; Laura Ferrarese; Shaun M. G. Hughes; Garth D. Illingworth; Lucas M. Macri; Barry F. Madore; Kim M. Sebo; Nancy A. Silbermann

    1999-08-13T23:59:59.000Z

    Cepheid-based distances to seven Type Ia supernovae (SNe)-host galaxies have been derived using the standard HST Key Project on the Extragalactic Distance Scale pipeline. For the first time, this allows for a transparent comparison of data accumulated as part of three different HST projects, the Key Project, the Sandage et al. Type Ia SNe program, and the Tanvir et al. Leo I Group study. Re-analyzing the Tanvir et al. galaxy and six Sandage et al. galaxies we find a mean (weighted) offset in true distance moduli of 0.12+/-0.07 mag -- i.e., 6% in linear distance -- in the sense of reducing the distance scale, or increasing H0. Adopting the reddening-corrected Hubble relations of Suntzeff et al. (1999), tied to a zero point based upon SNe~1990N, 1981B, 1998bu, 1989B, 1972E and 1960F and the photometric calibration of Hill et al. (1998), leads to a Hubble constant of H0=68+/-2(random)+/-5(systematic) km/s/Mpc. Adopting the Kennicutt et al. (1998) Cepheid period-luminosity-metallicity dependency decreases the inferred H0 by 4%. The H0 result from Type Ia SNe is now in good agreement, to within their respective uncertainties, with that from the Tully-Fisher and surface brightness fluctuation relations.

  13. Definition and Validation of the Key

    E-Print Network [OSTI]

    Utrecht, Universiteit

    of information and computing sciences, utrecht university technical report UU-CS-2005-041 www.cs.uu.nl #12 Sciences Utrecht University Utrecht, The Netherlands slinger.jansen@cs.uu.nl Sjaak Brinkkemper Institute for Information and Computing Sciences Utrecht University Utrecht, The Netherlands s.brinkkemper@cs.uu.nl ABSTRACT

  14. ACKNOWLEDGEMENTS ..................................................................................4 DEFINITIONS OF KEY TERMS .........................................................................6

    E-Print Network [OSTI]

    Escher, Christine

    ) means the chemical compound containing one atom of carbon and two atoms of oxygen. (2) "Carbon dioxide) "Global Warming Potential factor" (GWP) means the radiative forcing impact of one mass-based unit. For instance, methane (CH4) has a GWP of 23, meaning that every gram of methane will trap 23 times as much

  15. 2010 Manufacturing Energy and Carbon Footprints: Definitions...

    Broader source: Energy.gov (indexed) [DOE]

    key terms and details assumptions and references used in the Manufacturing Energy and Carbon Footprints (2010 MECS) Definitions and Assumptions for the Manufacturing Energy and...

  16. Definition of Small Gram Quantity Contents for Type B Radioactive Material Transportation Packages: Activity-Based Content Limitations

    SciTech Connect (OSTI)

    Sitaraman, S; Kim, S; Biswas, D; Hafner, R; Anderson, B

    2010-10-27T23:59:59.000Z

    Since the 1960's, the Department of Transportation Specification (DOT Spec) 6M packages have been used extensively for transportation of Type B quantities of radioactive materials between Department of Energy (DOE) facilities, laboratories, and productions sites. However, due to the advancement of packaging technology, the aging of the 6M packages, and variability in the quality of the packages, the DOT implemented a phased elimination of the 6M specification packages (and other DOT Spec packages) in favor of packages certified to meet federal performance requirements. DOT issued the final rule in the Federal Register on October 1, 2004 requiring that use of the DOT Specification 6M be discontinued as of October 1, 2008. A main driver for the change was the fact that the 6M specification packagings were not supported by a Safety Analysis Report for Packaging (SARP) that was compliant with Title 10 of the Code of Federal Regulations part 71 (10 CFR 71). Therefore, materials that would have historically been shipped in 6M packages are being identified as contents in Type B (and sometimes Type A fissile) package applications and addenda that are to be certified under the requirements of 10 CFR 71. The requirements in 10 CFR 71 include that the Safety Analysis Report for Packaging (SARP) must identify the maximum radioactivity of radioactive constituents and maximum quantities of fissile constituents (10 CFR 71.33(b)(1) and 10 CFR 71.33(b)(2)), and that the application (i.e., SARP submittal or SARP addendum) demonstrates that the external dose rate (due to the maximum radioactivity of radioactive constituents and maximum quantities of fissile constituents) on the surface of the packaging (i.e., package and contents) not exceed 200 mrem/hr (10 CFR 71.35(a), 10 CFR 71.47(a)). It has been proposed that a 'Small Gram Quantity' of radioactive material be defined, such that, when loaded in a transportation package, the dose rates at external points of an unshielded packaging not exceed the regulatory limits prescribed by 10 CFR 71 for non-exclusive shipments. The mass of each radioisotope presented in this paper is limited by the radiation dose rate on the external surface of the package, which per the regulatory limit should not exceed 200 mrem/hr. The results presented are a compendium of allowable masses of a variety of different isotopes (with varying impurity levels of beryllium in some of the actinide isotopes) that, when loaded in an unshielded packaging, do not result in an external dose rate on the surface of the package that exceeds 190 mrem/hr (190 mrem/hr was chosen to provide 5% conservatism relative to the regulatory limit). These mass limits define the term 'Small Gram Quantity' (SGQ) contents in the context of radioactive material transportation packages. The term SGQ is isotope-specific and pertains to contents in radioactive material transportation packages that do not require shielding and still satisfy the external dose rate requirements. Since these calculated mass limits are for contents without shielding, they are conservative for packaging materials that provide some limited shielding or if the contents are placed into a shielded package. The isotopes presented in this paper were chosen as the isotopes that Department of Energy (DOE) sites most likely need to ship. Other more rarely shipped isotopes, along with industrial and medical isotopes, are planned to be included in subsequent extensions of this work.

  17. Properties of resonant states in 18Ne relevant to key 14O(alpha,p)17F breakout reaction in type I x-ray bursts

    E-Print Network [OSTI]

    J. Hu; J. J. He; A. Parikh; S. W. Xu; H. Yamaguchi; D. Kahl; P. Ma; J. Su; H. W. Wang; T. Nakao; Y. Wakabayashi; T. Teranishi; K. I. Hahn; J. Y. Moon; H. S. Sung; T. Hashimoto; A. A. Chen; D. Irvine; C. S. Lee; S. Kubono

    2014-03-10T23:59:59.000Z

    The $^{14}$O($\\alpha$,$p$)$^{17}$F reaction is one of the key reactions involved in the breakout from the hot-CNO cycle to the rp-process in type I x-ray bursts. The resonant properties in the compound nucleus $^{18}$Ne have been investigated through resonant elastic scattering of $^{17}$F+$p$. The radioactive $^{17}$F beam was separated by the CNS Radioactive Ion Beam separator (CRIB) and bombarded a thick H$_2$ gas target at 3.6 MeV/nucleon. The recoiling light particles were measured by using three ${\\Delta}$E-E silicon telescopes at laboratory angles of $\\theta$$_{lab}$$\\approx$3$^\\circ$, 10$^\\circ$ and 18$^\\circ$, respectively. Five resonances at $E_{x}$=6.15, 6.28, 6.35, 6.85, and 7.05 MeV were observed in the excitation functions. Based on an $R$-matrix analysis, $J^{\\pi}$=1$^-$ was firmly assigned to the 6.15-MeV state. This state dominates the thermonuclear $^{14}$O($\\alpha$,$p$)$^{17}$F rate below 1 GK. We have also confirmed the existence and spin-parities of three states between 6.1 and 6.4 MeV. As well, a possible new excited state in $^{18}$Ne was observed at $E_{x}$=6.85$\\pm$0.11 MeV and tentatively assigned as $J$=0. This state could be the analog state of the 6.880 MeV (0$^{-}$) level in the mirror nucleus $^{18}$O, or a bandhead state (0$^+$) of the six-particle four-hole (6$p$-4$h$) band. A new thermonuclear rate of the $^{14}$O($\\alpha$,$p$)$^{17}$F reaction has been determined, and its astrophysical impact has been examined within the framework of one-zone x-ray burst postprocessing calculations.

  18. Definitions Calibration

    E-Print Network [OSTI]

    Weinberger, Hans

    Definitions Calibration Parameter Dynamics Monte Carlo Simulation Concluding Remarks Using the SABR Model Jason Vinar Ameriprise Workshop 2012 Jason Vinar Using the SABR Model #12;Definitions Calibration which attempts to capture the volatility smile. This project will consist of Calibrating the SABR model

  19. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  20. Information systems definition architecture

    SciTech Connect (OSTI)

    Calapristi, A.J.

    1996-06-20T23:59:59.000Z

    The Tank Waste Remediation System (TWRS) Information Systems Definition architecture evaluated information Management (IM) processes in several key organizations. The intent of the study is to identify improvements in TWRS IM processes that will enable better support to the TWRS mission, and accommodate changes in TWRS business environment. The ultimate goals of the study are to reduce IM costs, Manage the configuration of TWRS IM elements, and improve IM-related process performance.

  1. GUIDANCE ON ADMINISTRATIVE COSTS FOR FEDERAL AWARDS This document includes definitions and examples of expenditure types that would typically be considered unallowable direct charges

    E-Print Network [OSTI]

    Shamos, Michael I.

    GUIDANCE ON ADMINISTRATIVE COSTS FOR FEDERAL AWARDS This document includes definitions and examples Circular A-21 and the Cost Accounting Standards (CAS). This document is meant to be a reference tool to as needed. This document is general in nature and is NOT an exhaustive list of unallowable costs for all

  2. Types of Costs Types of Cost Estimates

    E-Print Network [OSTI]

    Boisvert, Jeff

    · Types of Costs · Types of Cost Estimates · Methods to estimate capital costs MIN E 408: Mining% accuracy. ­ 2-5% of pre-production capital Types of Cost Estimates #12;3. Definitive ­ Based on definitive-even $ Production Level Fixed Cost Break-even $ Production Level Cost-Revenue Relationships · Capital Costs (or

  3. Vocabulary of Definitions | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Definitions Vocabulary of Definitions 800 Terms for Surface Chemical Analysis - ISO This information is provided through the cooperation of EMSL and the ASTM E42...

  4. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  5. Formal definition of POTENTIAL ENERGY (valid for conservative forces only)

    E-Print Network [OSTI]

    page - 16 Formal definition of POTENTIAL ENERGY (valid for conservative forces only) Given one type of conservative force F UB - UA= - = - Definition of 'Potential energy difference" conserv #12;page - 17 the definition of the "potential energy difference UB - UA " as equal to negative value of the work W done

  6. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  7. The Web Services Vision Definition of Web Services

    E-Print Network [OSTI]

    Cheverst, Keith

    1 The Web Services Vision Overview Definition of Web Services Key concepts Difference from traditional web model Context Service-oriented architecture Distributed computing Overview Microsoft .NET vision Web Services Difference from traditional web model Context Service-oriented architecture

  8. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  9. Definitions of dwelling

    E-Print Network [OSTI]

    Olgyay, Victor W. (Victor Wayne)

    1986-01-01T23:59:59.000Z

    Home is an elusive concept. In one manner it is highly specific and individual in its definition, and in other aspects it is ubiquitous, present in our every act. In this thesis I explore several possible definitions of ...

  10. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  11. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  12. 0.0.1 Saturated models What follows is the main definition of model theory.

    E-Print Network [OSTI]

    0.0.1 Saturated models What follows is the main definition of model theory. Definition: Let x's an algebraically closed field. It's also 1-saturated. Understanding a theory is understanding its types. Definition there is only 1 variable.) However, there is clearly no element satisfying these statements in N. Definition

  13. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  14. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  15. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  16. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  17. Equivalence Relations Definition of a relation on a set

    E-Print Network [OSTI]

    Singman, David

    Equivalence Relations Definition of a relation on a set Let A be any set. Any subset have 1R1, 2R3, 3R1, 2 R2, 3 R2, etc. #12;A special kind of relation- an Equivalence relation There is a type of relation, it's known as an equivalence relation, which is particularly useful. Definition

  18. Genomic definition of species

    SciTech Connect (OSTI)

    Crkvenjakov, R.; Drmanac, R.

    1991-07-01T23:59:59.000Z

    The subject of this paper is the definition of species based on the assumption that genome is the fundamental level for the origin and maintenance of biological diversity. For this view to be logically consistent it is necessary to assume the existence and operation of the new law which we call genome law. For this reason the genome law is included in the explanation of species phenomenon presented here even if its precise formulation and elaboration are left for the future. The intellectual underpinnings of this definition can be traced to Goldschmidt. We wish to explore some philosophical aspects of the definition of species in terms of the genome. The point of proposing the definition on these grounds is that any real advance in evolutionary theory has to be correct in both its philosophy and its science.

  19. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  20. Demand Response in the U.S.- Key trends and federal facility participation

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—provides demand response (DR) definition, current status of DR in the United States, key DR trends, and federal participation issues.

  1. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  2. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  3. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  4. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  5. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  6. Power/Privilege Definitions

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Major; People's Institute for Survival and Beyond, New Orleans 2. Power is the ability to define reality and to convince other people that it is their definition. ~ Dr. Wade Nobles 3. Power is the capacity to act. 4 different cultures. [JL] RACISM Racism is race prejudice plus power [See Racist]. People's Institute calls

  7. 3 Library Regulations Definitions

    E-Print Network [OSTI]

    Mottram, Nigel

    3 Library Regulations Definitions In Regulation 3: 'Library' means the University Library as defined in Regulation 3.1; 'Library staff' means the staff of the University Library; 'Librarian' means the University Librarian and Head of Information Resources Directorate or nominee; `Library Committee' means

  8. Definitions Numbered Space

    E-Print Network [OSTI]

    Behmer, Spencer T.

    Definitions · Numbered Space ­ a single space marked with a number and reserved for a single permit 24/7 · Unnumbered Space ­ a space which can be used by any customer allowed to park in that lot. High Low Average Question 4: If I buy a staff permit for an UNNUMBERED* space in a non-gated surface

  9. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  10. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions Key Terms

  11. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions Key TermsCrude

  12. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions Key TermsCrudeAPI

  13. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions Key

  14. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions KeyReceipts by

  15. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions KeyReceipts

  16. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksAreaChargeInput Definitions Key

  17. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputs & Utilization Definitions Key

  18. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputsTotal Stocks Definitions Key Terms

  19. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputsTotal Stocks Definitions Key

  20. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputsTotal Stocks Definitions KeyPrices,

  1. Definitions and motivation More theory

    E-Print Network [OSTI]

    Duval, Art

    Definitions and motivation Examples More theory The Importance of being Equivalent: The Ubiquity of being Equivalent: #12;Definitions and motivation Examples More theory Fractions Geometry Real life Equivalent: #12;Definitions and motivation Examples More theory Fractions Geometry Real life Summary Equality

  2. Motivation and definitions Dimension theory

    E-Print Network [OSTI]

    Climenhaga, Vaughn

    Motivation and definitions Dimension theory Results: old and new Multifractal analysis of Birkhoff averages #12;Motivation and definitions Dimension theory Results: old and new Outline 1 Motivation and definitions A multifractal decomposition Example 2 Dimension theory Quantifying level sets A dynamically

  3. Definitions and motivation More theory

    E-Print Network [OSTI]

    Duval, Art

    Definitions and motivation Examples More theory Equivalence relations in mathematics, K-16+ Art;Definitions and motivation Examples More theory Fractions Geometry Real life One reason fractions are hard 2 3 Duval Equivalence relations in mathematics, K-16+ #12;Definitions and motivation Examples More theory

  4. Implementing Performance-Based Sustainability Requirements for the Low Carbon Fuel Standard – Key Design Elements and Policy Considerations

    E-Print Network [OSTI]

    Yeh, Sonia; Sumner, Daniel A.; Kaffka, Stephen R.; Ogden, J; Jenkins, Bryan M.

    2009-01-01T23:59:59.000Z

    qualification of “renewable biomass” by limiting the type ofparty. Defines “renewable biomass” to exclude biofuels notEISA definition of renewable biomass. ” Further, the RFS2

  5. Soot Nanostructure: Definition, Quantification, and Implications...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Soot Nanostructure: Definition, Quantification, and Implications Soot Nanostructure: Definition, Quantification, and Implications 2004 Diesel Engine Emissions Reduction (DEER)...

  6. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  7. Notes and Definitions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > The EnergyCenterDioxideDocumentationThreeNewsfuelNotes and Definitions

  8. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  9. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  10. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  11. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  12. Social Media Ad Metrics Definitions

    E-Print Network [OSTI]

    Collins, Gary S.

    these metrics to encourage growth through consistency. Social media speaks to a new way of understanding howSocial Media Ad Metrics Definitions Released May 2009 #12;Social Media Metrics Definitions © 2008 & Social Media Committee. About the IAB's User-Generated Content & Social Media Committee: The User

  13. GRAPH THEORY STUDY GUIDE 1. Definitions

    E-Print Network [OSTI]

    Cooper, Joshua N.

    GRAPH THEORY STUDY GUIDE 1. Definitions Definition 1 (Partition of A). A set A = A1, ..., Ak. Definition 2 (Vertex set). The set of vertices in a graph denoted by V (G). Definition 3 (Edge set). The set of edges in a graph denoted by E(G). Definition 4 (Order). the number of vertices of a graph G written |G

  14. XML Document XML Document Types and Validation

    E-Print Network [OSTI]

    Weber, Gregory D.

    XML Document Types and Validation IIM-I340 Objectives XML Document Types and Validation IIM-I340 April, 2010 #12;XML Document Types and Validation IIM-I340 Objectives Learning Objectives Understand: The need for validation Two ways to specify validity: Document Type Definitions (DTDs) XML Schemas #12;XML

  15. The Definition of Double Commutators and Consistency in Free Field Theory

    E-Print Network [OSTI]

    J. M. Pawlowski

    1996-10-09T23:59:59.000Z

    Within the framework of generalized functions a general consistent definition of double commutators is given. This definition respects the Jacobi identity even if the regularization is removed. The double commutator of fermionic currents is calculated in this limit. We show that BJL--type prescriptions and point--splitting prescriptions for calculating double commutators fail to give correct results in free field theory.

  16. Review of sour service definitions

    SciTech Connect (OSTI)

    McIntyre, D.R.; Boah, J.K. [Saudi Aramco, Dhahran (Saudi Arabia)

    1996-08-01T23:59:59.000Z

    Case histories and laboratory test data are presented to compare the predictive utility of NACE MR0175 with three alternatives. With some exceptions, the MR0175 definition is useful and conservative for most cases. The definition based on water phase pH and hydrogen sulfide (H{sub 2}S) partial pressure, proposed in European Federation of Corrosion (EFC) pub. 16, is not recommended since it does not predict sulfide stress cracking (SSC) in refining environments and presents higher risk of SSC of sweet service materials in certain Arabian Gulf production environments. A modified definition of sour service is proposed, which uses the MR0175 definition except in cases of very low water phase pH. 47 refs., 4 figs., 1 tab.

  17. Crop Insurance Terms and Definitions

    E-Print Network [OSTI]

    Stokes, Kenneth; Waller, Mark L.; Outlaw, Joe; Barnaby, G. A. Art

    2008-10-17T23:59:59.000Z

    This publication is a glossary of terms used by the crop insurance industry. There are definitions for terms used in crop insurance documents and for terms pertaining to coverage levels, farming, reports, units and parties to contracts....

  18. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  19. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  20. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  1. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  2. A theory of jet definition

    E-Print Network [OSTI]

    Fyodor V. Tkachov

    2000-01-11T23:59:59.000Z

    A systematic framework for jet definition is developed from first principles of physical measurement, quantum field theory, and QCD. A jet definition is found which: is theoretically optimal in regard of both minimization of detector errors and inversion of hadronization; is similar to a cone algorithm with dynamically negotiated jet shapes and positions found via shape observables that generalize the thrust to any number of axes; involves no ad hoc conventions; allows a fast computer implementation [hep-ph/9912415]. The framework offers an array of options for systematic construction of quasi-optimal observables for specific applications.

  3. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  4. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  5. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  6. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  7. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  8. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  9. Entropy and Energy: Toward a Definition of Physical Sustainability

    E-Print Network [OSTI]

    Hermanowicz, Slawomir W

    2005-01-01T23:59:59.000Z

    usefulness of entropy-energy definition of sustainability asEntropy and Energy: Toward a Definition of Physicaland energy should be included in the desired definition of

  10. A Natural Definition of Random Language Keith Wansbrough*

    E-Print Network [OSTI]

    Wansbrough, Keith

    Introduction Algorithmic Information Theory (AIT) provides definitions of randomness for strings A Natural Definition of Random Language Keith Wansbrough* October 13, 1995 Abstract We propose a natural definition

  11. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  12. Definitions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management FermiDavid Turner David3 |A Sign In About | Careers |

  13. Definitions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration wouldDECOMPOSITIONPortal Decision Support forDeep InsightsLANS

  14. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  15. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  16. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  17. 13 Lyapunov stability Definition 13.1 (Positive definite). We say that V (x, y) is positive definite, if V (x, y) 0

    E-Print Network [OSTI]

    Karageorgis, Paschalis

    13 Lyapunov stability Definition 13.1 (Positive definite). We say that V (x, y) is positive definite, if V (x, y) 0 at all points and if equality holds only at the origin. Definition 13.2 (Lyapunov functions). Suppose that V (x, y) is continuous and positive definite. Then we say that V is a Lyapunov

  18. Problem Type Problem Type Description Air Conditioning Air conditioner not working, leaking, etc

    E-Print Network [OSTI]

    Tennessee, University of

    Problem Type Problem Type Description Air Conditioning Air conditioner not working, leaking, etc, Microfridges Doors and Hardware Door repair/replace Lock, latch or hinge repair, key stuck; Lost or stolen key, repair or replace Shades/Blinds Window treatment - repair or replace Washer/Dryer Washer/Dryer repair

  19. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  20. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  1. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  2. Definition RX Evaluate Kernels K-2d K-1d Change By definition undefined

    E-Print Network [OSTI]

    Theiler, James

    Definition RX Evaluate Kernels K-2d K-1d Change By def·i·ni·tion undefined Adventures in anomaly Alamos National Laboratory Research supported by the United States Department of Energy through the Los Alamos Laboratory Directed Research and Development (LDRD) Program. #12;Theiler LA-UR-14-24429 Definition

  3. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  4. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  5. A Natural Definition of Random Language Keith Wansbrough \\Lambda

    E-Print Network [OSTI]

    Wansbrough, Keith

    definition. 1 Introduction Algorithmic Information Theory (AIT) provides definitions of randomnessA Natural Definition of Random Language Keith Wansbrough \\Lambda October 13, 1995 Abstract We propose a natural definition of random language, based on the standard AIT definitions of random string

  6. Partial Order Semantics of Types of Nets Robert Lorenz1

    E-Print Network [OSTI]

    Desel, Jörg

    Partial Order Semantics of Types of Nets Robert Lorenz1 , Gabriel Juh´as2 , and Sebastian Mauser3 1 of types of nets. Types of nets are a parametric definition of Petri nets originally developed for a general presentation of the synthesis of Petri nets from (step) transition systems. Partial order

  7. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  8. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  9. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  10. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  11. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  12. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  13. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  14. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  15. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  16. Pushing the Frontier of High-Definition Ion Mobility Spectrometry...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the Frontier of High-Definition Ion Mobility Spectrometry Using FAIMS. Pushing the Frontier of High-Definition Ion Mobility Spectrometry Using FAIMS. Abstract: Differential ion...

  17. BLOCK DIAGONALLY DOMINANT POSITIVE DEFINITE APPROXIMATE FILTERS AND SMOOTHERS

    E-Print Network [OSTI]

    BLOCK DIAGONALLY DOMINANT POSITIVE DEFINITE APPROXIMATE FILTERS AND SMOOTHERS Running title: BLOCK the loss of positive definiteness in the approximate equations. Therefore previous analyses have

  18. Entropy and Energy: Toward a Definition of Physical Sustainability

    E-Print Network [OSTI]

    Hermanowicz, Slawomir W

    2005-01-01T23:59:59.000Z

    of entropy-energy definition of sustainability as well asand Energy: Toward a Definition of Physical Sustainabilityto assess the sustainability is based on the energy. This

  19. Mathematical definition of quantum field theory on a manifold

    E-Print Network [OSTI]

    A. V. Stoyanovsky

    2009-11-21T23:59:59.000Z

    We give a mathematical definition of quantum field theory on a manifold, and definition of quantization of a classical field theory given by a variational principle.

  20. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  1. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  2. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  3. An experimental study of a six key handprint chord keyboard

    E-Print Network [OSTI]

    Wolstein, Sheldon Aaron

    1986-01-01T23:59:59.000Z

    er Dr. R. Quinn Brackett Head o Department Dr. Leland T. Blank May 1986 ABSTRACT An Exper1mental Study of a Six Key Handprlnt Chord Keyboard (May 1986) Sheldon Aaron Wolstein, B. S. , Texas ASM University Cha1r of Advisory Committee: Dr... PRACTICE ARTICLE UITA 7Z 7B IUU IUB 1U7 11U 111 LIST OF TABLES Page TABLE I Results of Typing Test: Means and Standard Deviations 25 TABLE 2 Means and Variances for Letter Sequence Times 28 TABLE 3 Analysis of Variance for Letter Sequence...

  4. 07-1 07-1Temperature Definition: The translational (e.g., wiggling around) energy . . .

    E-Print Network [OSTI]

    Koppelman, David M.

    07-1 07-1Temperature Definition: The translational (e.g., wiggling around) energy . . . . . . in most systems of interest. Instead, temperature scales are defined. There are two types: · The thermodynamic temperature scale. "Really" measures temperature. · Practical temperature scales. Approximations

  5. Definition of a 'Zero Net Energy' Community

    SciTech Connect (OSTI)

    Carlisle, N.; Van Geet, O.; Pless, S.

    2009-11-01T23:59:59.000Z

    This document provides a definition for a net zero-energy community. A community that offsets all of its energy use from renewables available within the community's built environment.

  6. Department of Bioengineering Definition of Biomedical Engineering

    E-Print Network [OSTI]

    is a discipline that advances knowledge in engineering, biology and medicine, and improves human health throughDepartment of Bioengineering Definition of Biomedical Engineering Biomedical engineering cross-disciplinary activities that integrate the engineering sciences with the biomedical sciences

  7. Quantal Definition of the Weak Equivalence Principle

    E-Print Network [OSTI]

    Abel Camacho; Arturo Camacho-Guardian

    2008-11-03T23:59:59.000Z

    The present work analyzes the meaning of the Weak Equivalence Principle in the context of quantum mechanics. A quantal definition for this principle is introduced. This definition does not require the concept of trajectory and relies upon the phase shift induced by a gravitational field in the context of a quantum interference experiment of two coherent beams of particles. In other words, it resorts to wave properties of the system and not to classical concepts as the idea of trajectory.

  8. What is an Item Type in ISIS? The means by which every type of unique financial transaction is categorized in ISIS.

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    What is an Item Type in ISIS? The means by which every type of unique financial transaction is categorized in ISIS. If we need to report on a specific type of transaction, we need to create a unique item in the definition of a new item type in ISIS. 9/5/2006 #12;

  9. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  10. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  11. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  12. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  13. Rigorous and General Definition of Thermodynamic Entropy

    E-Print Network [OSTI]

    Gian Paolo Beretta; Enzo Zanchini

    2010-10-05T23:59:59.000Z

    The physical foundations of a variety of emerging technologies --- ranging from the applications of quantum entanglement in quantum information to the applications of nonequilibrium bulk and interface phenomena in microfluidics, biology, materials science, energy engineering, etc. --- require understanding thermodynamic entropy beyond the equilibrium realm of its traditional definition. This paper presents a rigorous logical scheme that provides a generalized definition of entropy free of the usual unnecessary assumptions which constrain the theory to the equilibrium domain. The scheme is based on carefully worded operative definitions for all the fundamental concepts employed, including those of system, property, state, isolated system, environment, process, separable system, system uncorrelated from its environment, and parameters of a system. The treatment considers also systems with movable internal walls and/or semipermeable walls, with chemical reactions and/or external force fields, and with small numbers of particles. The definition of reversible process is revised by introducing the new concept of scenario. The definition of entropy involves neither the concept of heat nor that of quasistatic process; it applies to both equilibrium and nonequilibrium states. The role of correlations on the domain of definition and on the additivity of energy and entropy is discussed: it is proved that energy is defined and additive for all separable systems, while entropy is defined and additive only for separable systems uncorrelated from their environment; decorrelation entropy is defined. The definitions of energy and entropy are extended rigorously to open systems. Finally, to complete the discussion, the existence of the fundamental relation for stable equilibrium states is proved, in our context, for both closed and open systems.

  14. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  15. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  16. Pottebaum et al. Event Definition for Intelligent Resource Management Event Definition for the Application of Event

    E-Print Network [OSTI]

    Paliouras, George

    of resource management (use case and demand side) and event processing (technology and supply side). MethodsPottebaum et al. Event Definition for Intelligent Resource Management Event Definition for the Application of Event Processing to Intelligent Resource Management Jens Pottebaum University of Paderborn, C

  17. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  18. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  19. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  20. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  1. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  2. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  3. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  4. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  5. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  6. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  7. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  8. 2014 Manufacturing Energy and Carbon Footprints: Definitions...

    Broader source: Energy.gov (indexed) [DOE]

    and Assumptions A number of key terms are used to interpret the manufacturing energy and carbon footprints. The terms associated with the energy footprint analysis are...

  9. Award Types

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperationalAugust AugustInstruments on theAward Types Types of

  10. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  11. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  12. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  13. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  14. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  15. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  16. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  17. JOINT DEGREE PROGRAMS DEFINITION AND POLICY

    E-Print Network [OSTI]

    Omiecinski, Curtis

    1 JOINT DEGREE PROGRAMS DEFINITION AND POLICY: Within the fields of medicine and law, dual training for such complementary training can be demonstrated, the creation of a formal "Joint" degree program in which students or MD) offered at Penn State may be warranted. Such Joint degree programs enhance the educational

  18. Pink Eye Conjunctivitis Definition, Symptoms and Causes

    E-Print Network [OSTI]

    Suzuki, Masatsugu

    Pink Eye ­ Conjunctivitis Definition, Symptoms and Causes Pink eye is the common name given to inflammation of the conjunctiva of the eye. It is otherwise called conjunctivitis. The conjunctiva is the transparent membrane that lines the eyelids and covers the whites of the eyes. Very small, superficial blood

  19. Business Practice Manual for Definitions & Acronyms

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    Janaury 21, 2011 #12;CAISO Business Practice Manual BPM for Definitions & Acronyms Version 76 Last Revised: March 31, 2009 BPM Owner: Mike Dozier BPM Owner's Title: Senior Counsel Revision History Version Date Description 2 2009-12-18 Incorporating payment acceleration language submitted in BPM PRR 122

  20. Evolutionary Algorithms for Definition Extraction Claudia Borg

    E-Print Network [OSTI]

    Pace, Gordon J.

    Evolutionary Algorithms for Definition Extraction Claudia Borg Dept. of I.C.S. University of Malta claudia.borg@um.edu.mt Mike Rosner Dept. of I.C.S. University of Malta mike.rosner@um.edu.mt Gordon Pace Dept. of Computer Science University of Malta gordon.pace@um.edu.mt Abstract Books and other text

  1. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  2. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  3. The impacts of congestion on time-definitive urban freight distribution networks CO2 emission levels: Results from a case study in Portland,

    E-Print Network [OSTI]

    Bertini, Robert L.

    The impacts of congestion on time-definitive urban freight distribution networks CO2 emission Accepted 29 November 2010 Keywords: Vehicle routing Time-dependent travel time speed GHG or CO2 emissions pressures to limit the impacts associated with CO2 emissions are mounting rapidly. A key challenge

  4. The Impacts of Congestion on Time-definitive Urban Freight Distribution1 Networks CO2 Emission Levels: results from a case study in Portland,2

    E-Print Network [OSTI]

    Bertini, Robert L.

    1 The Impacts of Congestion on Time-definitive Urban Freight Distribution1 Networks CO2 Emission pressures to limit the impacts13 associated with CO2 emissions are mounting rapidly. A key challenge on CO2 emissions are hindered by the complexities of vehicle routing18 problems with time

  5. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  6. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  7. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  8. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  9. Gauge Orbit Types for Generalized Connections

    E-Print Network [OSTI]

    Christian Fleischhack

    2000-01-05T23:59:59.000Z

    Different versions for defining Ashtekar's generalized connections are investigated depending on the chosen smoothness category for the paths and graphs -- the label set for the projective limit. Our definition covers the analytic case as well as the case of webs. Then the orbit types of the generalized connections are determined for compact structure groups. The stabilizer of a connection is homeomorphic to the holonomy centralizer, i.e. the centralizer of its holonomy group, and the homeomorphism class of the gauge orbit is completely determined by the holonomy centralizer. Furthermore, the stabilizers of two connections are conjugate in the gauge group if and only if their holonomy centralizers are conjugate in the structure group. Finally, the gauge orbit type of a connection is defined to be the conjugacy class of its holonomy centralizer equivalently to the standard definition via stabilizers.

  10. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  11. Definitional Reflection and the Completion Peter Schroeder-Heister *

    E-Print Network [OSTI]

    Schroeder-Heister, Peter

    /11-1, and by Esprit Basic Research Working Group 7232 (GENTZEN). #12;334 which is the completed definition

  12. Manufacturing Energy and Carbon Footprint Definitions and Assumptions...

    Broader source: Energy.gov (indexed) [DOE]

    More Documents & Publications Understanding Manufacturing Energy and Carbon Footprints, October 2012 2010 Manufacturing Energy and Carbon Footprints: Definitions...

  13. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  14. Michael Rupen EVLA Phase II Definition Aug 23 25, 2001.

    E-Print Network [OSTI]

    Groppi, Christopher

    Michael Rupen EVLA Phase II Definition Meeting Aug 23 ­ 25, 2001. 1 EVLA Phase II Scientific Overview Michael P. Rupen #12;Michael Rupen EVLA Phase II Definition Meeting Aug 23 ­ 25, 2001. 2 New the resolution · Always available! #12;Michael Rupen EVLA Phase II Definition Meeting Aug 23 ­ 25, 2001. 3 NMA

  15. Language Definitions as Rewrite Theories Andrei Arusoaie1

    E-Print Network [OSTI]

    Boyer, Edmond

    Language Definitions as Rewrite Theories Andrei Arusoaie1 , Dorel Lucanu1 , Vlad Rusu2 , Traian languages. It includes software tools for compiling K language definitions to Maude rewrite theories transformation of language definitions that enables the symbolic execution of programs, i.e., the exe- cution

  16. Definite Descriptions, Focus Shift, and a Theory of Discourse Interpretation

    E-Print Network [OSTI]

    Poesio, Massimo

    Definite Descriptions, Focus Shift, and a Theory of Discourse Interpretation Massimo Poesio Centre of situations and their hierarchical organization. 1 Ingredients of a Theory of Definite Description Inter­ pretation A theory of definite description (DD) interpretation must build on a general theory of discourse

  17. NIH WORKING DEFINITION OF BIOINFORMATICS AND COMPUTATIONAL BIOLOGY

    E-Print Network [OSTI]

    Rau, Don C.

    NIH WORKING DEFINITION OF BIOINFORMATICS AND COMPUTATIONAL BIOLOGY July 17, 2000 The following working definition of bioinformatics and computational biology were developed by the BISTIC Definition Liu Preamble Bioinformatics and computational biology are rooted in life sciences as well as computer

  18. The Definition and Classification of Universes

    SciTech Connect (OSTI)

    Bjorken, J.

    2004-10-12T23:59:59.000Z

    We assume that the concept of a multiverse makes sense, and suggest a specific, standardized definition for member universes which are similar to our own. Central to this description is the definition of size, which is taken to be the asymptotic value, at large times, of the inverse Hubble constant. Thus the cosmological constant plays a central role in defining the properties of the subset of universes similar to our own. We then assume that vacuum parameters and coupling constants of the standard model are dependent upon the size of a universe, and propose a specific form for the dependence. Anthropic considerations then limit the size of habitable universes (as we understand that concept) to be within a factor two of our own. Implications of this picture for understanding the standard-model ''hierarchy problem'' are discussed, as are general issues of falsifiability and/or verifiability of these ideas.

  19. Adjuvant and Definitive Radiotherapy for Adrenocortical Carcinoma

    SciTech Connect (OSTI)

    Sabolch, Aaron [University of Michigan Medical School, Ann Arbor, MI (United States); Feng, Mary [Department of Radiation Oncology, University of Michigan, Ann Arbor, MI (United States); Griffith, Kent [Department of Biostatistics Unit, University of Michigan Comprehensive Cancer Center, Ann Arbor, MI (United States); Hammer, Gary [Department of Internal Medicine, University of Michigan, Ann Arbor, MI (United States); Doherty, Gerard [Department of Surgery, University of Michigan, Ann Arbor, MI (United States); Ben-Josef, Edgar, E-mail: edgarb@med.umich.edu [Department of Radiation Oncology, University of Michigan, Ann Arbor, MI (United States)

    2011-08-01T23:59:59.000Z

    Purpose: To evaluate the impact of both adjuvant and definitive radiotherapy on local control of adrenocortical carcinoma. Methods and Materials: Outcomes were analyzed from 58 patients with 64 instances of treatment for adrenocortical carcinoma at the University of Michigan's Multidisciplinary Adrenal Cancer Clinic. Thirty-seven of these instances were for primary disease, whereas the remaining 27 were for recurrent disease. Thirty-eight of the treatment regimens involved surgery alone, 10 surgery plus adjuvant radiotherapy, and 16 definitive radiotherapy for unresectable disease. The effects of patient, tumor, and treatment factors were modeled simultaneously using multiple variable Cox proportional hazards regression for associations with local recurrence, distant recurrence, and overall survival. Results: Local failure occurred in 16 of the 38 instances that involved surgery alone, in 2 of the 10 that consisted of surgery plus adjuvant radiotherapy, and in 1 instance of definitive radiotherapy. Lack of radiotherapy use was associated with 4.7 times the risk of local failure compared with treatment regimens that involved radiotherapy (95% confidence interval, 1.2-19.0; p = 0.030). Conclusions: Radiotherapy seems to significantly lower the risk of local recurrence/progression in patients with adrenocortical carcinoma. Adjuvant radiotherapy should be strongly considered after surgical resection.

  20. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  1. HS HS SUBJ HS SR HS COURSE COURSE COURSE GROUP SUBJECT COURSE TYPE KEY

    E-Print Network [OSTI]

    Haykin, Simon

    145 B8 COMPUTER AND INFORMATION SCIENCE ON2 ICS4M CREE 363 C6 CREE ON2 LNCDU CROATIAN 363 C4 CROATIAN ON2 LBCDU CROATIAN 363 C4 CROATIAN ON2 LBDDU CZECH 363 C4 CZECH ON2 LRTDU CZECH 363 C4 CZECH ON2

  2. RESERVATION APPLICATION CHECKLIST Required documents key for different efficiency incentive types

    E-Print Network [OSTI]

    be pulled before or up to 60 days after certificate of occupancy was issued. NSHP PV1/CF1RPV to be performed; · Quantity, make and model of the modules, inverters, and meters to be installed at each

  3. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  4. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  5. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  6. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  7. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  8. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  9. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  10. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  11. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  12. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  13. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  14. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  15. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  16. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions

  17. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea DefinitionsRail between PAD

  18. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea DefinitionsRail between

  19. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea DefinitionsRail

  20. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea DefinitionsRailTanker and

  1. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea DefinitionsRailTanker

  2. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea DefinitionsRailTankerImports

  3. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksAreaChargeInput Definitions

  4. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksAreaChargeInputYield Definitions

  5. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputs & Utilization Definitions

  6. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputsTotal Stocks Definitions

  7. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputsTotal Stocks DefinitionsWeekly

  8. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  9. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  10. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  11. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  12. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  13. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  14. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  15. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  16. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  17. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  18. Hydrogen in Type Ic Supernovae?

    E-Print Network [OSTI]

    David Branch; David J. Jeffery; Timothy R. Young; E. Baron

    2006-05-09T23:59:59.000Z

    By definition, a Type Ic supernova (SN Ic) does not have conspicuous lines of hydrogen or helium in its optical spectrum. SNe Ic usually are modelled in terms of the gravitational collapse of bare carbon-oxygen cores. We consider the possibility that the spectra of ordinary (SN 1994I-like) SNe Ic have been misinterpreted, and that SNe Ic eject hydrogen. An absorption feature usually attributed to a blend of Si II 6355 and C II 6580 may be produced by H-alpha. If SN 1994I-like SNe Ic eject hydrogen, the possibility that hypernova (SN 1998bw-like) SNe Ic, some of which are associated with gamma-ray bursts, also eject hydrogen should be considered. The implications of hydrogen for SN Ic progenitors and explosion models are briefly discussed.

  19. Advanced Gasifier Pilot Plant Concept Definition

    SciTech Connect (OSTI)

    Steve Fusselman; Alan Darby; Fred Widman

    2005-08-31T23:59:59.000Z

    This report presents results from definition of a preferred commercial-scale advanced gasifier configuration and concept definition for a gasification pilot plant incorporating those preferred technologies. The preferred commercial gasifier configuration was established based on Cost Of Electricity estimates for an IGCC. Based on the gasifier configuration trade study results, a compact plug flow gasifier, with a dry solids pump, rapid-mix injector, CMC liner insert and partial quench system was selected as the preferred configuration. Preliminary systems analysis results indicate that this configuration could provide cost of product savings for electricity and hydrogen ranging from 15%-20% relative to existing gasifier technologies. This cost of product improvement draws upon the efficiency of the dry feed, rapid mix injector technology, low capital cost compact gasifier, and >99% gasifier availability due to long life injector and gasifier liner, with short replacement time. A pilot plant concept incorporating the technologies associated with the preferred configuration was defined, along with cost and schedule estimates for design, installation, and test operations. It was estimated that a 16,300 kg/day (18 TPD) pilot plant gasifier incorporating the advanced gasification technology and demonstrating 1,000 hours of hot-fire operation could be accomplished over a period of 33 months with a budget of $25.6 M.

  20. Definition of heavy oil and natural bitumen

    SciTech Connect (OSTI)

    Meyer, R.F.

    1988-08-01T23:59:59.000Z

    Definition and categorization of heavy oils and natural bitumens are generally based on physical or chemical attributes or on methods of extraction. Ultimately, the hydrocarbon's chemical composition will govern both its physical state and the extraction technique applicable. These oils and bitumens closely resemble the residuum from wholecrude distillation to about 1,000/degree/F; if the residuum constitutes at least 15% of the crude, it is considered to be heavy. In this material is concentrated most of the trace elements, such as sulfur, oxygen, and nitrogen, and metals, such as nickel and vanadium. A widely used definition separates heavy oil from natural bitumen by viscosity, crude oil being less, and bitumen more viscous than 10,000 cp. Heavy crude then falls in the range 10/degree/-20/degree/ API inclusive and extra-heavy oil less than 10/degree/ API. Most natural bitumen is natural asphalt (tar sands, oil sands) and has been defined as rock containing hydrocarbons more viscous than 10,000 cp or else hydrocarbons that may be extracted from mined or quarried rock. Other natural bitumens are solids, such as gilsonite, grahamite, and ozokerite, which are distinguished by streak, fusibility, and solubility. The upper limit for heavy oil may also be set at 18/degree/ API, the approximate limit for recovery by waterflood.

  1. Niger Delta play types, Nigeria

    SciTech Connect (OSTI)

    Akinpelu, A.O. [Chevron Nigeria Limited, Lagos (Nigeria)

    1995-08-01T23:59:59.000Z

    Exploration databases can be more valuable when sorted by play type. Play specific databases provide a system to organize E & P data used in evaluating the range of values of parameters for reserve estimation and risk assessment. It is important both in focusing the knowledge base and in orienting research effort. A play in this context is any unique combination of trap, reservoir and source properties with the right dynamics of migration and preservation that results in hydrocarbon accumulation. This definitions helps us to discriminate the subtle differences found with these accumulation settings. About 20 play types were identified around the Niger Delta oil province in Nigeria. These are grouped into three parts: (1) The proven plays-constituting the bulk of exploration prospects in Nigeria today. (2) The unproven or semi-proven plays usually with some successes recorded in a few tries but where knowledge is still inadequate. (3) The unproven or analogous play concept. These are untested but geologically sound ideas which may or may not have been tried elsewhere. With classification and sub grouping of these play types into specific databases, intrinsic attributes and uniqueness of each of them with respect to the four major risk elements and the eight parameters for reserve estimation can be better understood.

  2. Rigorous Definition of Quantum Field Operators in Noncommutative Quantum Field Theory

    E-Print Network [OSTI]

    M. N. Mnatsakanova; Yu. S. Vernov

    2010-02-07T23:59:59.000Z

    The space, on which quantum field operators are given, is constructed in any theory, in which the usual product between test functions is substituted by the $\\star$-product (the Moyal-type product). The important example of such a theory is noncommutative quantum field theory (NC QFT). This construction is the key point in the derivation of the Wightman reconstruction theorem.

  3. Definition et unites Sources d'energie primaire

    E-Print Network [OSTI]

    Ravelet, Florent

    D´efinition et unit´es Sources d'´energie primaire L'´energie dans une perspective historique Etat Laboratoire DynFluid, Arts et M´etiers-ParisTech 19 f´evrier 2014 F. Ravelet Energies #12;D´efinition et unit Energies #12;D´efinition et unit´es Sources d'´energie primaire L'´energie dans une perspective historique

  4. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  5. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  6. Optimization Online - Semi-definite relaxations for optimal control ...

    E-Print Network [OSTI]

    Mathieu Claeys

    2014-10-28T23:59:59.000Z

    Oct 28, 2014 ... Abstract: Converging hierarchies of finite-dimensional semi-definite relaxations have been proposed for state-constrained optimal control ...

  7. Modified definition of group velocity and electromagnetic energy conservation equation

    E-Print Network [OSTI]

    Changbiao Wang

    2015-01-19T23:59:59.000Z

    The classical definition of group velocity has two flaws: (a) the group velocity can be greater than the phase velocity in a non-dispersive, lossless, non-conducting, anisotropic uniform medium; (b) the definition is not consistent with the principle of relativity for a plane wave in a moving isotropic uniform medium. To remove the flaws, a modified definition is proposed. A criterion is set up to identify the justification of group velocity definition. A "superluminal power flow" is constructed to show that the electromagnetic energy conservation equation cannot uniquely define the power flow if the principle of Fermat is not taken into account.

  8. BLOCK DIAGONALLY DOMINANT POSITIVE DEFINITE APPROXIMATE FILTERS AND SMOOTHERS

    E-Print Network [OSTI]

    BLOCK DIAGONALLY DOMINANT POSITIVE DEFINITE APPROXIMATE FILTERS AND SMOOTHERS Running title: BLOCKÆciently small as to preclude the loss of positive de#12;niteness in the approximate equations. Therefore

  9. On the definition of velocity in doubly special relativity theories

    E-Print Network [OSTI]

    Piotr Kosinski; Pawel Maslanka

    2002-11-13T23:59:59.000Z

    We discuss the definition of particle velocity in doubly relativity theories. The general formula relating velocity and four-momentum of particle is given.

  10. Redundant axioms in the definition of Bregman functions

    E-Print Network [OSTI]

    Jan 22, 2002 ... REDUNDANT AXIOMS IN THE DEFINITION OF BREGMAN ...... some new results on the theory of Bregman functions, Mathematics of ...

  11. Genomic definition of species. Revision 2

    SciTech Connect (OSTI)

    Crkvenjakov, R.; Drmanac, R.

    1993-03-01T23:59:59.000Z

    A genome is the sum total of the DNA sequences in the cells of an individual organism. The common usage that species possess genomes comes naturally to biochemists, who have shown that all protein and nucleic acid molecules are at the same time species- and individual-specific, with minor individual variations being superimposed on a consensus sequence that is constant for a species. By extension, this property is attributed to the common features of DNA in the chromosomes of members of a given species and is called species genome. Our proposal for the definition of a biological species is as follows: A species comprises a group of actual and potential biological organisms built according to a unique genome program that is recorded, and at least in part expressed, in the structures of their genomic nucleic acid molecule(s), having intragroup sequence differences which can be fully interconverted in the process of organismal reproduction.

  12. Assignment Types UTS LIBRARY

    E-Print Network [OSTI]

    University of Technology, Sydney

    Assignment Types UTS LIBRARY February 2013 Academic Writing Guide Part 2 ­ Assignment Types: This section outlines the basic types of written assignments, providing structural elements and examples. #12;2 II. Assignment Types 1. Essay Writing

  13. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  14. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  15. EXTENDING THE DEFINITION OF ENTROPY TO NONEQUILIBRIUM STEADY STATES.

    E-Print Network [OSTI]

    ## of #. Our definition is based on energy exchanged, uses the microscopic dynamics of the system, and agreesEXTENDING THE DEFINITION OF ENTROPY TO NONEQUILIBRIUM STEADY STATES. by David Ruelle* Abstract. We forces # and maintained at fixed kinetic energy (Hoover­Evans isokinetic thermostat). We assume

  16. Research Product 0-4186-P1 Definition of the

    E-Print Network [OSTI]

    Texas at Austin, University of

    Research Product 0-4186-P1 Definition of the "Cradle-to-Grave" Pavement Management Process Zhanmin in the definition given earlier, pavement management is in fact a process that starts from the conception-effective manner; it combines solid engi- neering principles with sound business practices and economic theory

  17. 1.0 Introduction 1.1 Definition of Nanotechnology

    E-Print Network [OSTI]

    1 1.0 Introduction 1.1 Definition of Nanotechnology Nanotechnology is the art and science improvements in technologies for protecting the environment. While many definitions for nanotechnology exist Nanotechnology Initiative (NNI), a U.S. Government research and development (R&D) program established

  18. Definition BBEE focus on EE savings

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    by AMI, such as Opower comparison type of program. A: Someone asked to hear about in home displays and prepay. Callers were asked what other products they are using or have...

  19. Trace element geochemistry of ordinary chondrite chondrules: the type I/type II chondrule dichotomy

    E-Print Network [OSTI]

    Jacquet, Emmanuel; Gounelle, Matthieu

    2015-01-01T23:59:59.000Z

    We report trace element concentrations of silicate phases in chondrules from LL3 ordinary chondrites Bishunpur and Semarkona. Results are similar to previously reported data for carbonaceous chondrites, with rare earth element (REE) concentrations increasing in the sequence olivine ~ 10 K/h) than type I chondrules. Appreciable Na concentrations (3-221 ppm) are measured in olivine from both chondrule types; type II chondrules seem to have behaved as closed systems, which may require chondrule formation in the vicinity of protoplanets or planetesimals. At any rate, higher solid concentrations in type II chondrule forming regions may explain the higher oxygen fugacities they record compared to type I chondrules. Type I and type II chondrules formed in different environments and the correlation between high solid concentrations and/or oxygen fugacities with rapid cooling rates is a key constraint that chondrule formation models must account for.

  20. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  1. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  2. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  3. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  4. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  5. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  6. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  7. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  8. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  9. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  10. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  11. Formulas & definitions to know Formulas & definitions that will be provided if Distance formula in 3 dimensions compab = ab

    E-Print Network [OSTI]

    Lozano-Robledo, Alvaro

    Formulas & definitions to know Formulas & definitions that will be provided if needed Distance formula in 3 dimensions compab = a·b |a| Equation of a sphere W = F · D (work, force, distance) Vector of differentiability for a function of two variables arc length formula, arc length function the graph of a function

  12. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  13. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  14. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  15. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  16. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  17. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  18. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  19. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  20. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  1. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  2. First order theories for nonmonotone inductive definitions: recursively inaccessible and Mahlo

    E-Print Network [OSTI]

    Jäger, Gerhard

    First order theories for nonmonotone inductive definitions: recursively inaccessible and Mahlo Gerhard J¨ager Abstract In this paper first order theories for nonmonotone inductive definitions theories of) several specific nonmonotone inductive definitions which are interesting in the context

  3. National Biomedical Tracer Facility: Project definition study

    SciTech Connect (OSTI)

    Heaton, R.; Peterson, E. [Los Alamos National Lab., NM (United States); Smith, P. [Smith (P.A.) Concepts and Designs (United States)

    1995-05-31T23:59:59.000Z

    The Los Alamos National Laboratory is an ideal institution and New Mexico is an ideal location for siting the National Biomedical Tracer Facility (NBTF). The essence of the Los Alamos proposal is the development of two complementary irradiation facilities that combined with our existing radiochemical processing hot cell facilities and waste handling and disposal facilities provide a low cost alternative to other proposals that seek to satisfy the objectives of the NBTF. We propose the construction of a 30 MeV cyclotron facility at the site of the radiochemical facilities, and the construction of a 100 MeV target station at LAMPF to satisfy the requirements and objectives of the NBTF. We do not require any modifications to our existing radiochemical processing hot cell facilities or our waste treatment and disposal facilities to accomplish the objectives of the NBTF. The total capital cost for the facility defined by the project definition study is $15.2 M. This cost estimate includes $9.9 M for the cyclotron and associated facility, $2.0 M for the 100 MeV target station at LAMPF, and $3.3 M for design.

  4. Boundary definition of a multiverse measure

    E-Print Network [OSTI]

    Raphael Bousso; Ben Freivogel; Stefan Leichenauer; Vladimir Rosenhaus

    2010-09-18T23:59:59.000Z

    We propose to regulate the infinities of eternal inflation by relating a late time cut-off in the bulk to a short distance cut-off on the future boundary. The light-cone time of an event is defined in terms of the volume of its future light-cone on the boundary. We seek an intrinsic definition of boundary volumes that makes no reference to bulk structures. This requires taming the fractal geometry of the future boundary, and lifting the ambiguity of the conformal factor. We propose to work in the conformal frame in which the boundary Ricci scalar is constant. We explore this proposal in the FRW approximation for bubble universes. Remarkably, we find that the future boundary becomes a round three-sphere, with smooth metric on all scales. Our cut-off yields the same relative probabilities as a previous proposal that defined boundary volumes by projection into the bulk along timelike geodesics. Moreover, it is equivalent to an ensemble of causal patches defined without reference to bulk geodesics. It thus yields a holographically motivated and phenomenologically successful measure for eternal inflation.

  5. Phase Space and Jet Definitions in SCET

    E-Print Network [OSTI]

    William Man-Yin Cheung; Michael Luke; Saba Zuberi

    2009-10-13T23:59:59.000Z

    We discuss consistent power counting for integrating soft and collinear degrees of freedom over arbitrary regions of phase space in the soft-collinear effective theory (SCET), and illustrate our results at one loop with several jet algorithms: JADE, Sterman-Weinberg and k_T. Consistently applying SCET power-counting in phase space, along with non-trivial zero-bin subtractions, prevents double-counting of final states. The resulting phase-space integrals over soft and collinear regions are individually ultraviolet divergent, but the phase-space ultraviolet divergences cancel in the sum. Whether the soft and collinear contributions are individually infrared safe depends on the jet definition. We show that while this is true at one loop for JADE and Sterman-Weinberg, the k_T algorithm does not factorize into individually infrared safe soft and collinear pieces in dimensional regularization. We point out that this statement depends on the ultraviolet regulator, and that in a cutoff scheme the soft functions are infrared safe.

  6. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  7. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  8. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  9. Software solutions manage the definition, operation, maintenance and configuration control of the National Ignition Facility

    SciTech Connect (OSTI)

    Dobson, D; Churby, A; Krieger, E; Maloy, D; White, K

    2011-07-25T23:59:59.000Z

    The National Ignition Facility (NIF) is the world's largest laser composed of millions of individual parts brought together to form one massive assembly. Maintaining control of the physical definition, status and configuration of this structure is a monumental undertaking yet critical to the validity of the shot experiment data and the safe operation of the facility. The NIF business application suite of software provides the means to effectively manage the definition, build, operation, maintenance and configuration control of all components of the National Ignition Facility. State of the art Computer Aided Design software applications are used to generate a virtual model and assemblies. Engineering bills of material are controlled through the Enterprise Configuration Management System. This data structure is passed to the Enterprise Resource Planning system to create a manufacturing bill of material. Specific parts are serialized then tracked along their entire lifecycle providing visibility to the location and status of optical, target and diagnostic components that are key to assessing pre-shot machine readiness. Nearly forty thousand items requiring preventive, reactive and calibration maintenance are tracked through the System Maintenance & Reliability Tracking application to ensure proper operation. Radiological tracking applications ensure proper stewardship of radiological and hazardous materials and help provide a safe working environment for NIF personnel.

  10. The ISO/NASA Key Project on AGN Spectral Energy Distributions (Characteristics of the ISO Data)

    E-Print Network [OSTI]

    Eric J. Hooper; Belinda J. Wilkes; Kim K. McLeod; Martin S. Elvis; Chris D. Impey; Carol J. Lonsdale; Matt A. Malkan; Jonathan C. McDowell

    1999-02-05T23:59:59.000Z

    The U.S. ISO Key Project on quasar spectral energy distributions seeks to better understand the very broad-band emission features of quasars from radio to X-rays. A key element of this project is observations of 72 quasars with the ISOPHOT instrument at 8 bands, from 5 to 200 microns. The sample was chosen to span a wide range of redshifts and quasar types. This paper presents an overview of the analysis and reduction techniques, as well as general trends within the data set (comparisons with IRAS fluxes, uncertainties as a function of background sky brightness, and an analysis of vignetting corrections in chopped observing mode). A more detailed look at a few objects in the sample is presented in Wilkes et al. 1999, astro-ph/9902084.

  11. Types of Commissioning

    Broader source: Energy.gov [DOE]

    Several commissioning types exist to address the specific needs of equipment and systems across both new and existing buildings. The following commissioning types provide a good overview.

  12. Investigating the maintenance of the mouse definitive adrenal cortex 

    E-Print Network [OSTI]

    Zhao, Xin

    2013-11-29T23:59:59.000Z

    and Cyp11b1 that encode the enzymes aldosterone synthase and 11?-hydroxylase, which catalyze the terminal reactions in the production of aldosterone and corticosterone, respectively. This thesis aims to investigate the maintenance of the definitive mouse...

  13. ‘Model’ or ‘tool’? New definitions for translational research

    E-Print Network [OSTI]

    Sive, Hazel

    The term ‘model’ often describes non-human biological systems that are used to obtain a better understanding of human disorders. According to the most stringent definition, an animal ‘model’ would display exactly the same ...

  14. California PRC Section 21065.5, Definitions for Geothermal Exploratory...

    Open Energy Info (EERE)

    search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation: California PRC Section 21065.5, Definitions for Geothermal Exploratory ProjectLegal Abstract...

  15. Towards Automatic Extraction of Definitions Claudia Borg1

    E-Print Network [OSTI]

    Pace, Gordon J.

    Department of Artificial Intelligence, University of Malta 2 Department of Computer Science, University of Malta {claudia.borg|mike.rosner|gordon.pace}@um.edu.mt Abstract. Definition extraction can be useful

  16. The fundamental theorem of Galois theory Definition 1. A polynomial ...

    E-Print Network [OSTI]

    2011-11-14T23:59:59.000Z

    The fundamental theorem of Galois theory. Definition 1. A polynomial in K[X] (K a field) is separable if it has no multiple roots in any field containing K. An ...

  17. Double Shell Tank (DST) Process Waste Sampling Subsystem Definition Report

    SciTech Connect (OSTI)

    RASMUSSEN, J.H.

    2000-04-25T23:59:59.000Z

    This report defines the Double-Shell Tank (DST) Process Waste Sampling Subsystem (PWSS). This subsystem definition report fully describes and identifies the system boundaries of the PWSS. This definition provides a basis for developing functional, performance, and test requirements (i.e., subsystem specification), as necessary, for the PWSS. The resultant PWSS specification will include the sampling requirements to support the transfer of waste from the DSTs to the Privatization Contractor during Phase 1 of Waste Feed Delivery.

  18. Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution

    E-Print Network [OSTI]

    Feihu Xu; He Xu; Hoi-Kwong Lo

    2014-06-01T23:59:59.000Z

    Measurement-device-independent quantum key distribution (MDI-QKD) has been demonstrated in both laboratories and field-tests using attenuated lasers combined with the decoy-state technique. Although researchers have studied various decoy-state MDI-QKD protocols with two or three decoy states, a clear comparison between these protocols is still missing. This invokes the question of how many types of decoy states are needed for practical MDI-QKD. Moreover, the system parameters to implement decoy-state MDI-QKD are only partially optimized in all previous works, which casts doubt on the actual performance of former demonstrations. Here, we present analytical and numerical decoy-state methods with one, two and three decoy states. We provide a clear comparison among these methods and find that two decoy states already enable a near optimal estimation and more decoy states cannot improve the key rate much in either asymptotic or finite-data settings. Furthermore, we perform a full optimization of system parameters and show that full optimization can significantly improve the key rate in the finite-data setting. By simulating a real experiment, we find that full optimization can increase the key rate by more than one order of magnitude compared to non-optimization. A local search method to optimize efficiently the system parameters is proposed. This method can be four orders of magnitude faster than a trivial exhaustive search to achieve a similar optimal key rate. We expect that this local search method could be valuable for general fields in physics.

  19. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  20. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  1. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  2. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  3. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  4. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  5. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  6. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  7. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  8. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  9. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  10. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  11. Types of Costs Types of Cost Estimates

    E-Print Network [OSTI]

    Boisvert, Jeff

    05-1 · Types of Costs · Types of Cost Estimates · Methods to estimate capital costs MIN E 408-Revenue Relationships · Capital Costs (or first cost or capital investment): ­ Expenditures made to acquire or develop capital assets ­ Three main classes of capital costs: 1. Depreciable Investment: · Investment allocated

  12. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  13. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  14. Photon counting for quantum key distribution with Peltier cooled InGaAs/InP APD's

    E-Print Network [OSTI]

    Stucki, D; Stefanov, A; Zbinden, H; Rarity, J G; Wall, T; Stucki, Damien; Ribordy, Gr\\'{e}goire; Stefanov, Andr\\'{e}; Zbinden, Hugo; Rarity, John G.; Wall, Tom

    2001-01-01T23:59:59.000Z

    The performance of three types of InGaAs/InP avalanche photodiodes is investigated for photon counting at 1550 nm in the temperature range of thermoelectric cooling. The best one yields a dark count probability of $% 2.8\\cdot 10^{-5}$ per gate (2.4 ns) at a detection efficiency of 10% and a temperature of -60C. The afterpulse probability and the timing jitter are also studied. The results obtained are compared with those of other papers and applied to the simulation of a quantum key distribution system. An error rate of 10% would be obtained after 54 kilometers.

  15. Photon counting for quantum key distribution with Peltier cooled InGaAs/InP APD's

    E-Print Network [OSTI]

    Damien Stucki; Grégoire Ribordy; André Stefanov; Hugo Zbinden; John G. Rarity; Tom Wall

    2001-06-01T23:59:59.000Z

    The performance of three types of InGaAs/InP avalanche photodiodes is investigated for photon counting at 1550 nm in the temperature range of thermoelectric cooling. The best one yields a dark count probability of $% 2.8\\cdot 10^{-5}$ per gate (2.4 ns) at a detection efficiency of 10% and a temperature of -60C. The afterpulse probability and the timing jitter are also studied. The results obtained are compared with those of other papers and applied to the simulation of a quantum key distribution system. An error rate of 10% would be obtained after 54 kilometers.

  16. Controlled quantum key distribution with three-photon polarization-entangled states via the collective noise channel

    SciTech Connect (OSTI)

    Dong Li; Xiu Xiaoming, E-mail: xiuxiaomingdl@126.com [Dalian University of Technology, School of Physics and Optoelectronic Technology (China); Gao Yajun [Bohai University, Department of Physics, College of Mathematics and Physics (China); Yi, X. X., E-mail: yixx@dlut.edu.cn [Dalian University of Technology, School of Physics and Optoelectronic Technology (China)

    2011-10-15T23:59:59.000Z

    Using three-photon polarization-entangled GHZ states or W states, we propose controlled quantum key distribution protocols for circumventing two main types of collective noise, collective dephasing noise, or collective rotation noise. Irrespective of the number of controllers, a three-photon state can generate a one-bit secret key. The storage technique of quantum states is dispensable for the controller and the receiver, and it therefore allows performing the process in a more convenient mode. If the photon cost in a security check is disregarded, then the efficiency theoretically approaches unity.

  17. Property:Definition | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation,PillarPublicationType JumpDOEInvolve Jump to: navigation,DayQuantity Jump

  18. Level-1 Milestone 350 Definitions v1

    SciTech Connect (OSTI)

    Quinn, T

    2006-11-17T23:59:59.000Z

    This milestone is the direct result of work that started seven years ago with the planning for a 100-teraFLOP platform and will be satisfied when 100 teraFLOPS is placed in operation and readied for Stockpile Stewardship Program simulations. The end product of this milestone will be a production-level, high-performance computing system, code named Purple, designed to be used to solve the most demanding stockpile stewardship problems, that is, the large-scale application problems at the edge of our understanding of weapon physics. This fully functional 100 teraFLOPS system must be able to serve a diverse scientific and engineering workload. It must also have a robust code development and production environment, both of which facilitate the workload requirements. This multi-year effort includes major activities in contract management, facilities, infrastructure, system software, and user environment and support. Led by LLNL, the trilabs defined the statement of work for a 100-teraFLOP system that resulted in a contract with IBM known as the Purple contract. LLNL worked with IBM throughout the contract period to resolve issues and collaborated with the Program to resolve contractual issues to ensure delivery of a platform that best serves the Program for a reasonable cost. The Purple system represents a substantial increase in the classified compute resources at LLNL for NNSA. The center computer environment must be designed to accept the Purple system and to scale with the increase of compute resources to achieve required end-to-end services. Networking, archival storage, visualization servers, global file systems, and system software will all be enhanced to support Purple's size and architecture. IBM and LLNL are sharing responsibility for Purple's system software. LLNL is responsible for the scheduler, resource manager, and some code development tools. Through the Purple contract, IBM is responsible for the remainder of the system software including the operating system, parallel file system, and runtime environment. LLNL, LANL, and SNL share responsibility for the Purple user environment. Since LLNL is the host for Purple, LLNL has the greatest responsibility. LLNL will provide customer support for Purple to the tri-labs and as such has the lead for user documentation, negotiating the Purple usage model, mapping of the ASC computational environment requirements to the Purple environment, and demonstrating those requirements have been met. In addition, LLNL will demonstrate important capabilities of the computing environment including full functionality of visualization tools, file transport between Purple and remote site file systems, and the build environment for principle ASC codes. LANL and SNL are responsible for delivering unique capabilities in support of their users, porting important applications and libraries, and demonstrating remote capabilities. The key capabilities that LANL and SNL will test are user authorization and authentication, data transfer, file system, data management, and visualization. SNL and LANL should port and run in production mode a few key applications on a substantial number of Purple nodes.

  19. Passive decoy-state quantum key distribution with practical light sources

    SciTech Connect (OSTI)

    Curty, Marcos [ETSI Telecomunicacion, Department of Signal Theory and Communications, University of Vigo, Campus Universitario, E-36310 Vigo (Pontevedra) (Spain); Ma, Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, N2L 3G1 Waterloo, Ontario (Canada); Qi, Bing [Center for Quantum Information and Quantum Control, Department of Physics and Department of Electrical and Computer Engineering, University of Toronto, M5S 3G4 Toronto, Ontario (Canada); Moroder, Tobias [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, N2L 3G1 Waterloo, Ontario (Canada); Quantum Information Theory Group, Institute of Theoretical Physics I, University of Erlangen-Nuernberg, D-91058 Erlangen (Germany); Max Planck Institute for the Science of Light, D-91058 Erlangen (Germany)

    2010-02-15T23:59:59.000Z

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. Although active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase-randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty et al., Opt. Lett. 34, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy-state setup with an infinite number of decoy settings. In this article we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photodetectors. In particular, we consider sources emitting thermal states, phase-randomized WCP, and strong coherent light in combination with several types of photodetectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photodetectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret key rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  20. Types of Reuse

    Broader source: Energy.gov [DOE]

    The following provides greater detail regarding the types of reuse pursued for LM sites. It should be noted that many actual reuses combine several types of the uses listed below.

  1. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  2. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  3. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  4. Zero Energy Buildings: A Critical Look at the Definition; Preprint

    SciTech Connect (OSTI)

    Torcellini, P.; Pless, S.; Deru, M.; Crawley, D.

    2006-06-01T23:59:59.000Z

    A net zero-energy building (ZEB) is a residential or commercial building with greatly reduced energy needs through efficiency gains such that the balance of energy needs can be supplied with renewable technologies. Despite the excitement over the phrase ''zero energy'', we lack a common definition, or even a common understanding, of what it means. In this paper, we use a sample of current generation low-energy buildings to explore the concept of zero energy: what it means, why a clear and measurable definition is needed, and how we have progressed toward the ZEB goal.

  5. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  6. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  7. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  8. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  9. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  10. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  11. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  12. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  13. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  14. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  15. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  16. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  17. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  18. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  19. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  20. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  1. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  2. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  3. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  4. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  5. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  6. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  7. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  8. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  9. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  10. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  11. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  12. A Proposal of Positive-Definite Local Gravitational Energy Density in General Relativity

    E-Print Network [OSTI]

    J. H. Yoon

    1993-01-15T23:59:59.000Z

    We propose a 4-dimensional Kaluza-Klein approach to general relativity in the (2,2)-splitting of space-time using the double null gauge. The associated Lagrangian is equivalent to the Einstein-Hilbert Lagrangian, since it yields the same field equations as the E-H Lagrangian does. It is describable as a (1+1)-dimensional Yang-Mills type gauge theory coupled to (1+1)-dimensional matter fields, where the minimal coupling associated with the diffeomorphism group of the 2-dimensional spacelike fibre space automatically appears. Written in the first-order formalism, our Lagrangian density directly yields a non-zero local Hamiltonian density, where the associated time function is the retarded time. From this Hamiltonian density, we obtain a positive-definite local gravitational energy density. In the asymptotically flat space-times, the volume integrals of the proposed local gravitational energy density over suitable 3-dimensional hypersurfaces correctly reproduce the Bondi and the ADM surface integral, at null and spatial infinity, respectively, supporting our proposal. We also obtain the Bondi mass-loss formula as a negative-definite flux integral of a bilinear in the gravitational currents at null infinity.

  13. Non-perturbative Quantization of Phantom and Ghost Theories: Relating Definite and Indefinite Representations

    E-Print Network [OSTI]

    André van Tonder; Miquel Dorca

    2007-04-24T23:59:59.000Z

    We investigate the non-perturbative quantization of phantom and ghost degrees of freedom by relating their representations in definite and indefinite inner product spaces. For a large class of potentials, we argue that the same physical information can be extracted from either representation. We provide a definition of the path integral for these theories, even in cases where the integrand may be exponentially unbounded, thereby removing some previous obstacles to their non-perturbative study. We apply our results to the study of ghost fields of Pauli-Villars and Lee-Wick type, and we show in the context of a toy model how to derive, from an exact non-perturbative path integral calculation, previously ad hoc prescriptions for Feynman diagram contour integrals in the presence of complex energies. We point out that the pole prescriptions obtained in ghost theories are opposite to what would have been expected if one had added conventional $i\\epsilon$ convergence factors in the path integral.

  14. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  15. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  16. Fuel Cycle Scenario Definition, Evaluation, and Trade-offs

    SciTech Connect (OSTI)

    Steven J. Piet; Gretchen E. Matthern; Jacob J. Jacobson; Christopher T. Laws; Lee C. Cadwallader; Abdellatif M. Yacout; Robert N. Hill; J. D. Smith; Andrew S. Goldmann; George Bailey

    2006-08-01T23:59:59.000Z

    This report aims to clarify many of the issues being discussed within the AFCI program, including Inert Matrix Fuel (IMF) versus Mixed Oxide (MOX) fuel, single-pass versus multi-pass recycling, thermal versus fast reactors, potential need for transmutation of technetium and iodine, and the value of separating cesium and strontium. It documents most of the work produced by INL, ANL, and SNL personnel under their Simulation, Evaluation, and Trade Study (SETS) work packages during FY2005 and the first half of FY2006. This report represents the first attempt to calculate a full range of metrics, covering all four AFCI program objectives - waste management, proliferation resistance, energy recovery, and systematic management/economics/safety - using a combination of "static" calculations and a system dynamic model, DYMOND. In many cases, we examine the same issue both dynamically and statically to determine the robustness of the observations. All analyses are for the U.S. reactor fleet. This is a technical report, not aimed at a policy-level audience. A wide range of options are studied to provide the technical basis for identifying the most attractive options and potential improvements. Option improvement could be vital to accomplish before the AFCI program publishes definitive cost estimates. Information from this report will be extracted and summarized in future policy-level reports. Many dynamic simulations of deploying those options are included. There are few "control knobs" for flying or piloting the fuel cycle system into the future, even though it is dark (uncertain) and controls are sluggish with slow time response: what types of reactors are built, what types of fuels are used, and the capacity of separation and fabrication plants. Piloting responsibilities are distributed among utilities, government, and regulators, compounding the challenge of making the entire system work and respond to changing circumstances. We identify four approaches that would increase our ability to pilot the fuel cycle system: (1) have a recycle strategy that could be implemented before the 2030-2050 approximate period when current reactors retire so that replacement reactors fit into the strategy, (2) establish an option such as multi-pass blended-core IMF as a downward plutonium control knob and accumulate waste management benefits early, (3) establish fast reactors with flexible conversion ratio as a future control knob that slowly becomes available if/when fast reactors are added to the fleet, and (4) expand exploration of blended assemblies and cores, which appear to have advantages and agility. Initial results suggest multi-pass full-core MOX appears to be a less effective way than multi-pass blended core IMF to manage the fuel cycle system because it requires higher TRU throughput while more slowly accruing waste management benefits. Single-pass recycle approaches for LWRs (we did not study the VHTR) do not meet AFCI program objectives and could be considered a "dead end". Fast reactors appear to be effective options but a significant number of fast reactors must be deployed before the benefit of such strategies can be observed.

  17. Virtual Chassis for Snake Robots: Definition and Applications

    E-Print Network [OSTI]

    Choset, Howie

    Full paper Virtual Chassis for Snake Robots: Definition and Applications David Rollinson*, Austin Buchan and Howie Choset The Robotics Institute, Carnegie Mellon University, 5000 Forbes Avenue the motion of a snake robot is difficult. This is in part because the internal shape changes that the robot

  18. The development of high definition television : an ecology of games

    E-Print Network [OSTI]

    Neil, Suzanne Chambliss

    2010-01-01T23:59:59.000Z

    This study is an analysis of the forces that shaped the overall character of a new US television system, high definition or HDTV, between the early 1980s and 2010, with a primary focus on the period leading up the Federal ...

  19. Patent License for OpenSSL 1. Definitions

    E-Print Network [OSTI]

    Rogaway, Phillip

    Patent License for OpenSSL 1. Definitions 1.1 "Licensor" means Phillip Rogaway. orOne Shields Avenue, Davis, CA 95616-8562. 1.2 "Licensed Patents" means any patent that claims priority to United States Patent Application No. 09/918,615 entitled "Method and Apparatus for Facilitating Efficient

  20. Seismic Tomography: Definitions Lapo Boschi (lapo@erdw.ethz.ch)

    E-Print Network [OSTI]

    Boschi, Lapo

    Tomography Seismic tomography is the science of interpreting seismic measurements (seismograms) to derive; that is to say, solve the seismological inverse problem. Seismic data and their interpretation Seismic stationsSeismic Tomography: Definitions Lapo Boschi (lapo@erdw.ethz.ch) September 14, 2009 Seismic

  1. WICT PROCEEDINGS, DECEMBER 2008 1 Definition Characterisation through Genetic Algorithms

    E-Print Network [OSTI]

    Pace, Gordon J.

    Borg Dept. of Artificial Intelligence University of Malta claudia.borg@um.edu.mt Mike Rosner Dept. of Artificial Intelligence University of Malta mike.rosner@um.edu.mt Gordon J. Pace Dept. of Computer Science University of Malta gordon.pace@um.edu.mt Abstract The identification of definitions from natural lan- guage

  2. A possible definition of a {\\it Realistic} Physics Theory

    E-Print Network [OSTI]

    Nicolas Gisin

    2014-01-02T23:59:59.000Z

    A definition of a {\\it Realistic} Physics Theory is proposed based on the idea that, at all time, the set of physical properties possessed (at that time) by a system should unequivocally determine the probabilities of outcomes of all possible measurements.

  3. CCured: Type-Safe Retrofitting of Legacy Software

    E-Print Network [OSTI]

    Weimer, Westley

    Engineering]: Testing and Debugging; D.2.7 [Software Engineering]: Distribution, Maintenance, and Enhancement, Reliability, Security, Verification Additional Key Words and Phrases: Memory safety, pointer qualifier, a program transformation system that adds type safety guarantees to existing C programs. CCured attempts

  4. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  5. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  6. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  7. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  8. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  9. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  10. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  11. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  12. Typed Self-Optimization

    E-Print Network [OSTI]

    Brown, Matt

    2013-01-01T23:59:59.000Z

    type T y[O]. The operator IsIs is self-applicative, in thatargument t is any of Is[O] or IsIs, and otherwise behavesproof constant introduced by IsIs proves that the type of t

  13. Similarities and Differences between Coronal Holes and the Quiet Sun: Are Loop Statistics the Key?

    E-Print Network [OSTI]

    T. Wiegelmann; S. K. Solanki

    2008-02-01T23:59:59.000Z

    Coronal holes (CH) emit significantly less at coronal temperatures than quiet-Sun regions (QS), but can hardly be distinguished in most chromospheric and lower transition region lines. A key quantity for the understanding of this phenomenon is the magnetic field. We use data from SOHO/MDI to reconstruct the magnetic field in coronal holes and the quiet Sun with the help of a potential magnetic model. Starting from a regular grid on the solar surface we then trace field lines, which provide the overall geometry of the 3D magnetic field structure. We distinguish between open and closed field lines, with the closed field lines being assumed to represent magnetic loops. We then try to compute some properties of coronal loops. The loops in the coronal holes (CH) are found to be on average flatter than in the QS. High and long closed loops are extremely rare, whereas short and low-lying loops are almost as abundant in coronal holes as in the quiet Sun. When interpreted in the light of loop scaling laws this result suggests an explanation for the relatively strong chromospheric and transition region emission (many low-lying, short loops), but the weak coronal emission (few high and long loops) in coronal holes. In spite of this contrast our calculations also suggest that a significant fraction of the cool emission in CHs comes from the open flux regions. Despite these insights provided by the magnetic field line statistics further work is needed to obtain a definite answer to the question if loop statistics explain the differences between coronal holes and the quiet Sun.

  14. Your Guide to Diabetes: Type 1 and Type 2

    E-Print Network [OSTI]

    Rau, Don C.

    Your Guide to Diabetes: Type 1 and Type 2 National Diabetes Information Clearinghouse #12;#12;Your Guide to Diabetes: Type 1 and Type 2 #12;#12;Contents Learn about Diabetes ............................................................ 1 What is diabetes? .............................................................. 2 What

  15. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  16. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the turnover of the enzyme (amount of substrate converted by the enzyme). (c) Wild-type SalL with co-purified products 5'-ClDA and L-methionine. SalL chlorinase was...

  17. A key factor to the spin parameter of uniformly rotating compact stars: crust structure

    E-Print Network [OSTI]

    Qi, B; Sun, B Y; Wang, S Y; Gao, J H

    2014-01-01T23:59:59.000Z

    We study the key factor to determine the dimensionless spin parameter $j\\equiv cJ/(GM^2)$ of different kinds of uniformly rotating compact stars, including the traditional neutron stars, hyperonic neutron stars, and hybrid stars, and check the reliability of the results on various types of equations of state of dense matter. The equations of state from the relativistic mean field theory and the MIT bag model are adopted to simulate compact stars. Numerical calculations of rigidly rotating neutron stars are performed using the RNS code in the framework of general relativity by solving the Einstein equations for stationary axis-symmetric spacetime. The crust structure of compact stars is found to be a key factor to determine the maximum value of the spin parameter $j_{\\rm max}$. For the stars with inclusion of the crust, $j_{\\rm max}\\sim 0.7$ is sustained for various kinds of compact stars with $M>0.5 M_{\\odot}$, and is found to be insensitive to the mass of star and selected equations of state. For the traditi...

  18. INVERSE SPECTRAL AND SCATTERING THEORY FOR THE HALF-LINE LEFT DEFINITE

    E-Print Network [OSTI]

    INVERSE SPECTRAL AND SCATTERING THEORY FOR THE HALF-LINE LEFT DEFINITE STURM-LIOUVILLE PROBLEM C will prove some uniqueness results for inverse spec- tral theory and inverse scattering for the left definite is via the inverse spectral theory for the left definite problem, which also is not very well developed

  19. On the definition of velocity in theories with two observer-independent scales

    E-Print Network [OSTI]

    S. Mignemi

    2003-02-10T23:59:59.000Z

    We argue that a consistent definition of the velocity of a particle in generalizations of special relativity with two observer-independent scales should be independent from the mass of the particle. This request rules out the definition $v_i=\\partial p_0/\\partial p_i$, but allows for other definitions proposed in the literature.

  20. A DEFINITION OF "DEGREE OF CONFIRMATION" CARL G. HEMPEL AND PAUL OPPENHEIM

    E-Print Network [OSTI]

    Fitelson, Branden

    -method of settling the issue seems to consist in actually constructing an explicit and general definition and theory, and ,vith emphasis on the general methodological issues, a theory of 98 #12;DEFINITION OF "DEGREEA DEFINITION OF "DEGREE OF CONFIRMATION" CARL G. HEMPEL AND PAUL OPPENHEIM 1. The problem

  1. arXiv:1110.0908v1 Employing the perturbative definition of the Higgs

    E-Print Network [OSTI]

    Maas, Axel

    mass in and beyond perturbation theory The precise definition of the mass of a particle is a highly non) gauge theories. The most direct definition of the mass of a particle is just given by the (timearXiv:1110.0908v1 [hep­lat] 5 Oct 2011 Employing the perturbative definition of the Higgs mass

  2. Abstract--In this paper, a new methodology for stability assessment of a smart power system is proposed. The key to this

    E-Print Network [OSTI]

    Pota, Himanshu Roy

    ANY of the public infrastructures like electric power network are subject to two types of threats networks approach to electric power network security would identify key vulnerabilities, assess vulnerability of the North American power grid was studied after the August 2003 blackout affecting the United

  3. Technical forum: Review of sour service definitions. Part 2

    SciTech Connect (OSTI)

    McIntyre, D.R. [Saudi Aramco, Dhahran (Saudi Arabia)

    1997-04-01T23:59:59.000Z

    Here, the author replies to the European Federation of Corrosion`s (EFC`s) comments on his original article ``Review of Sour Service Definitions`` published in the August 1996 issue of MP. EFC`s comments are welcome; they list for MP readers the disturbing number of literature, laboratory, and field failures that EFC had to label as irrelevant in defense of the nonsour service description for Region 1 of its pH vs. H{sub 2}S diagram. EFC wants their Publication 16 read and considered on its merits. Potential users of the publication should also read and consider these allegedly irrelevant studies on their merits. It is vital to generate a true industry consensus on this topic, since whatever sour service definition is codified in the ISO standard will be a fixture in the industry for many years to come.

  4. Sandia photovoltaic systems definition and application experiment projects

    SciTech Connect (OSTI)

    Jones, G.

    1983-04-01T23:59:59.000Z

    A compilation is given of the abstracts and visual material used in presentation at the Fourth Photovoltaic Systems Definition and Applications Projects Integration Meeting held at the Marriott Hotel, April 12-14, 1983, in Albuquerque, New Mexico. The meeting provided a forum for detailed analyses on recently completed and current activities. These activities include systems research, balance-of-system technology development, residential experimentation, and evaluation of intermediate-sized applications.

  5. Fejer-type inequalities

    E-Print Network [OSTI]

    Mitroi, F C

    2011-01-01T23:59:59.000Z

    The aim of this paper is to present some new Fejer-type results for convex functions. Improvements of Young's inequality (the arithmetic-geometric mean inequality) and other applications to special means are pointed as well.

  6. Document Type: Subject Terms

    E-Print Network [OSTI]

    Major, Arkady

    Title: Authors: Source: Document Type: Subject Terms: Abstract: Full Text Word Count: ISSN at creating team results. In fact, it's priceless. Managers in Western corporations have received a lifetime

  7. Device calibration impacts security of quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16T23:59:59.000Z

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  8. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  9. Effects of color coding on keying time and errors

    E-Print Network [OSTI]

    Wooldridge, Brenda Gail

    1983-01-01T23:59:59.000Z

    were to determine the effects if any oi' color coding upon the error rate and location time of special func- tion keys on a computer keyboard. An ACT-YA CRT keyboard interfaced with a Kromemco microcomputer was used. There were 84 high schoool... to comnunicate with more and more computer-like devices. The most common computer/human interface is the terminal, consisting of a display screen, and keyboard. The format and layout on the display screen of computer-generated information is generally...

  10. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  11. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  12. DOE Announces More Key Administration Posts | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartmentConsumersDevelopmentDepartmentofKey

  13. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues

  14. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey

  15. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy- FORTechnology Key to

  16. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKey

  17. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,KeyTex

  18. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  19. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA Key

  20. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyA

  1. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAA

  2. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAAA

  3. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  4. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteriesmetal-organic frameworks |A photo ofMay 2015andKEY

  5. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to Preserving

  6. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to PreservingIron

  7. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental AssessmentsGeoffrey Campbell isOklahoma City, USA OklahomaTiratIs Key

  8. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) MappingOctober 12,U.S.U.S. DOEJoanKaye D. Lathrop,KevinKey

  9. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Nobel Laureate's

  10. Field Definitions, Spectrum and Universality in Effective String Theories

    E-Print Network [OSTI]

    N. D. Hari Dass; Peter Matlock

    2006-12-28T23:59:59.000Z

    It is shown, by explicit calculation, that the third-order terms in inverse string length in the spectrum of the effective string theories of Polchinski and Strominger are also the same as in Nambu-Goto theory, in addition to the universal Luescher terms. While the Nambu-Goto theory is inconsistent outside the critical dimension, the Polchinski-Strominger theory is by construction consistent for any space-time dimension. In the analysis of the spectrum, care is taken not to use any field redefinition, as it is felt that this has the potential to obscure important points. Nevertheless, as field redefinition is an important tool and the definition of the field should be made precise, a careful analysis of the choice of field definition leading to the terms in the action is also presented. Further, it is shown how a choice of field definition can be made in a systematic way at higher orders. To this end the transformation of measure involved is calculated, in the context of effective string theory, and thereby a quantum evaluation made of equivalence of theories related by a field redefinition. It is found that there are interesting possibilities resulting from a redefinition of fluctuation field.

  11. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  12. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  13. Encryption Key Search using Java-based ALiCE Grid

    E-Print Network [OSTI]

    Virkar, Ameya

    Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

  14. $?$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Jameel-Un Nabi; Irgaziev Bakhadir

    2011-08-04T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model results. This study can prove useful for the core-collapse simulators.

  15. Studies on the switching speed effect of the phase shift keying in SLED for generating high power microwave

    E-Print Network [OSTI]

    Zhengfeng, Xiong; Jian, Yu; Huaibi, Chen; Hui, Ning

    2015-01-01T23:59:59.000Z

    SLAC energy doubler (SLED) type radio-frequency pulse compressors are widely used in large-scale particle accelerators for converting long-duration moderate-power input pulse into short-duration high-power output pulse. The phase shift keying (PSK) is one of the key components in SLED pulse compression systems. Performance of the PSK will influence the output characteristics of SLED, such as rise-time of the output pulse, the maximal peak power gain, and the energy efficiency. In this paper, high power microwave source based on power combining and pulse compression of conventional klystrons was introduced, the nonideal PSK with slow switching speed and without power output during the switching process were investigated, the experimental results with nonideal PSK agreed well with the analytical results.

  16. Hansen et al. Edge effects across ecosystem types Ecosystem Biomass as a Framework for Predicting Habitat Fragmentation Effects

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Hansen et al. Edge effects across ecosystem types 1 Ecosystem Biomass as a Framework for Predicting Habitat Fragmentation Effects Running Head: Edge effects across ecosystem types Key Words: biomass 59717-3460. hansen@montana.edu 25 February 2008 #12;Hansen et al. Edge effects across ecosystem types 2

  17. John von Neumann Institute for Computing Different Types of Protein Folding Identified with

    E-Print Network [OSTI]

    Janke, Wolfhard

    John von Neumann Institute for Computing Different Types of Protein Folding Identified://www.fz-juelich.de/nic-series/volume40 #12;Different Types of Protein Folding Identified with a Coarse-Grained Heteropolymer Model Stefan The identification of folding channels is one of the key tasks of protein folding studies. While secondary structures

  18. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  19. Find More Like This Table 1. Key dimensions of

    E-Print Network [OSTI]

    p, 1 chart, 1 diagram, 9 graphs Document Type: Article Subject Terms: *EMISSIONS trading CARBON of economic burdens among nations; Influence of emissions trading on policy costs. Full Text Word Count: 10068 the reductions attained, and how policy costs may be influenced by emissions trading. We explore the sensitivity

  20. The Seven Keys to Success in Energy Management and Conservation 

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    with an explanation of the three 'types' of energy used in a manufacturing facility. The requirement of having a good 'energy ethic' among all employees is discussed in detail. The method of monitoring the program and measuring results is also discussed....

  1. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19T23:59:59.000Z

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  2. Key Science Observations of AGNs with KaVA Array

    E-Print Network [OSTI]

    Kino, Motoki; Zhao, Guang-Yao; Sohn, Bong Won

    2015-01-01T23:59:59.000Z

    KaVA (KVN and VERA Array) is a new combined VLBI array with KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). First, we briefly review the imaging capabilities of KaVA array which actually achieves more than three times better dynamic range than that achieved by VERA alone. The KaVA images clearly show detailed structures of extended radio jets in AGNs. Next, we represent the key science program to be led by KaVA AGN sub working group. We will conduct the monitoring observations of Sgr A* and M87 because of the largeness of their central super-massive black hole angular sizes. The main science goals of the program are (i) testing magnetically-driven-jet paradigm by mapping velocity fields of the M87 jet, and (ii) obtaining tight constraints on physical properties of radio emitting region in Sgr A*.

  3. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  4. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  5. Endoglin potentiates nitric oxide synthesis to enhance definitive hematopoiesis

    E-Print Network [OSTI]

    Nasrallah, Rabab; Knezevic, Kathy; Thai, Thuan; Thomas, Shane R.; Göttgens, Berthold; Lacaud, Georges; Kouskoff, Valerie; Pimanda, John E.

    2015-05-15T23:59:59.000Z

    potential. We also show using an ES cell line engineered to over-express ENG under Doxycycline (Dox) control that ENG drives the acceleration of hemogenic commitment of FLK1+ cells and definitive hematopoiesis and that it does so by increasing nitric... (Kyba et al., 2002) in which ENG is linked to GFP via a 2A peptide to facilitate monitoring (Fig. S7). The addition of Dox at day 0 of ES cell differentiation resulted in the induction of GFP and sustained surface expression of ENG (Fig. S8A (i) - (ii...

  6. DOE Nuclear Weapon Reliability Definition: History, Description, and Implementation

    SciTech Connect (OSTI)

    Wright, D.L.; Cashen, J.J.; Sjulin, J.M.; Bierbaum, R.L.; Kerschen, T.J.

    1999-04-01T23:59:59.000Z

    The overarching goal of the Department of Energy (DOE) nuclear weapon reliability assessment process is to provide a quantitative metric that reflects the ability of the weapons to perform their intended function successfully. This white paper is intended to provide insight into the current and long-standing DOE definition of nuclear weapon reliability, which can be summarized as: The probability of achieving the specified yield, at the target, across the Stockpile-To-Target Sequence of environments, throughout the weapon's lifetime, assuming proper inputs.

  7. Internationally Standardized Cost Item Definitions for Decommissioning of Nuclear Installations

    SciTech Connect (OSTI)

    Lucien Teunckens; Kurt Pflugrad; Candace Chan-Sands; Ted Lazo

    2000-06-04T23:59:59.000Z

    The European Commission (EC), the International Atomic Energy Agency (IAEA), and the Organization for Economic Cooperation and Development/Nuclear Energy Agency (OECD/NEA) have agreed to jointly prepare and publish a standardized list of cost items and related definitions for decommissioning projects. Such a standardized list would facilitate communication, promote uniformity, and avoid inconsistency or contradiction of results or conclusions of cost evaluations for decommissioning projects carried out for specific purposes by different groups. Additionally, a standardized structure would also be a useful tool for more effective cost management. This paper describes actual work and result thus far.

  8. Computational costs of data definition at the quantum - classical interface

    E-Print Network [OSTI]

    Chris Fields

    2010-05-26T23:59:59.000Z

    Model-independent semantic requirements for user specification and interpretation of data before and after quantum computations are characterized. Classical computational costs of assigning classical data values to quantum registers and to run-time parameters passed across a classical-to-quantum application programming interface are derived. It is shown that the classical computational costs of data definition equal or exceed the classical computational cost of solving the problem of interest for all applications of quantum computing except computations defined over the integers and the simulation of linear systems with linear boundary conditions.

  9. Generalized definition of time delay in scattering theory

    E-Print Network [OSTI]

    C. Gerard; R. Tiedra de Aldecoa

    2006-09-15T23:59:59.000Z

    We advocate for the systematic use of a symmetrized definition of time delay in scattering theory. In two-body scattering processes, we show that the symmetrized time delay exists for arbitrary dilated spatial regions symmetric with respect to the origin. It is equal to the usual time delay plus a new contribution, which vanishes in the case of spherical spatial regions. We also prove that the symmetrized time delay is invariant under an appropriate mapping of time reversal. These results are also discussed in the context of classical scattering theory.

  10. DOE Seeks Comment on Definition of Showerhead | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof"WaveInteractions andDefinition of Showerhead DOE Seeks Comment on

  11. Oregon - ORS 439.300 - Definitions | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer PlantMunhall,Missouri: EnergyExcellenceOfficeOhio:OpowerOrchard Lake439.300 - Definitions

  12. RCRA/UST, superfund and EPCRA hotline training module. Introduction to: Definition of solid waste and hazardous waste recycling (40 CFR sections 261.2 and 261.9) updated as of July 1995

    SciTech Connect (OSTI)

    NONE

    1995-11-01T23:59:59.000Z

    The module explains the statutory and regulatory definitions of solid waste, including the standards governing the recycling and management of specific types of wastes. It lists and cites three use/reuse scenarios where the materials are not solid wastes and states the requirements for documentation. It lists examples of sham recycling and describes the conditions under which hazardous waste-derived products may be excluded from regulation. It cites the provisions for precious metal recovery and discusses potential regulatory developments affecting the definition of solid waste and hazardous waste recycling.

  13. Regulation of N-type Voltage-Gated Calcium Channels and Presynaptic Function by Cyclin-Dependent Kinase 5

    E-Print Network [OSTI]

    Su, Susan C.

    N-type voltage-gated calcium channels localize to presynaptic nerve terminals and mediate key events including synaptogenesis and neurotransmission. While several kinases have been implicated in the modulation of calcium ...

  14. Dust around Type Ia supernovae

    E-Print Network [OSTI]

    Wang, Lifan

    2005-01-01T23:59:59.000Z

    Dust around Type Ia supernovae Lifan Wang 1,2 LawrenceIa. Subject headings: Supernovae: General, Dust, Extinctionline) bands for Type Ia supernovae. (a), upper panel, shows

  15. Wolter type i LAMAR

    SciTech Connect (OSTI)

    Catura, R.C.; Joki, E.G.

    1981-11-01T23:59:59.000Z

    Observational objectives for the LAMAR and their influence on the instrument design are discussed. It is concluded that the most important design parameter is the angular resolution of the LAMAR modules since it so strongly influences sensitivity, optical identifications, source confusion, spectral resolution for objective gratings and the ability to resolve small extended sources. A high resolution Wolter Type I LAMAR module is described, its hardware status discussed, and the performance of a LAMAR observatory presented. A promising technique for enhancing the reflectivity of Wolter Type I X-ray optics in a selected bandpass at high energy has been investigated and the performance of the LAMAR module, utilizing this method, has been calculated.

  16. Rappels: 4) Piles Types abstraits de donnes (Abstract Data Type)

    E-Print Network [OSTI]

    Hamel, Sylvie

    Rappels: 4) Piles #12;Types abstraits de données (Abstract Data Type) IFT2015, A2009, Sylvie Hamel Université de Montréal 1Piles Type de données Un ensemble de valeurs Un ensemble d'opérations Structure de Université de Montréal 2Piles #12;Type abstrait de données PILE (§4.2) Garde en mémoire des objets

  17. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  18. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  19. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    at zero and increase to $47 per ton of CO2 emissions by 2030. Higher electricity prices reduce demandSixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions Summary of Key................................................................ 10 Wholesale Electricity Prices

  20. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  1. Direct and Reverse Secret-Key Capacities of a Quantum Channel

    E-Print Network [OSTI]

    Braunstein, Samuel L.

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

  2. Adventitious ventilation: a new definition for an old mode?

    E-Print Network [OSTI]

    Schiavon, Stefano

    2014-01-01T23:59:59.000Z

    Refrigeration and Air-Conditioning Engineers (ASHRAEof ventilation and air- conditioning system types in officeto natural ventilation, air conditioning, with or without

  3. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01T23:59:59.000Z

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  4. Origin of a complex key innovation in an obligate insectplant mutualism

    E-Print Network [OSTI]

    Krenn, Harald W.

    Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

  5. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-Print Network [OSTI]

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  6. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  7. Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser

    E-Print Network [OSTI]

    Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

  8. On the security of some password-based key agreement schemes

    E-Print Network [OSTI]

    on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19

  9. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  10. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770­2 [7] is vulnerable to a replay attack and also

  11. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks

    E-Print Network [OSTI]

    Hu, Jiankun

    A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Kejie propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous, the wireless sensor network can achieve higher key connectivity and higher resilience. I. INTRODUCTION Wireless

  12. Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates

    E-Print Network [OSTI]

    Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat the environmental correlates exert of the realized fitness of a species (Johnson and O'Neil 2001). They include

  13. Evaluation of the effects of a highway improvement project on Key deer

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30T23:59:59.000Z

    assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

  14. A Remark on Secret-Key Generation over Correlated Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    A Remark on Secret-Key Generation over Correlated Fading Channels Ashish Khisti ECE Dept. Univ@ee.ucla.edu Abstract-- We study secret-key agreement with public discussion over a flat-fading wiretap channel model. INTRODUCTION In recent years there has been a significant interest in developing secret-key agreement protocols

  15. Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion Ashish Khisti Member, IEEE Abstract Fundamental limits of secret-key generation over a two-way, reciprocal and block establish upper and lower bounds on the secret-key generation capacity with public discussion. The upper

  16. Secret-key Agreement with Channel State Information at the Transmitter

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-key Agreement with Channel State Information at the Transmitter Ashish Khisti, Member of secret-key agreement over a wiretap channel with state parameters. The transmitter com- municates discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound

  17. Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach Ashish: akhisti@comm.utoronto.ca Abstract--Fundamental limits of secret-key agreement over reciprocal wireless source generation. The resulting secret-key involves contributions of both channel sequences and source

  18. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number

  19. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  20. Montana MCA 75-20-104, Policy and General Provisions Definitions...

    Open Energy Info (EERE)

    4, Policy and General Provisions Definitions for Major Facility Siting Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation:...

  1. Societal-Equity-Enhancing Criteria and Facility-Host Incentives Supporting Five Key Elements in the January 2012 Blue Ribbon Commission Report - 13015

    SciTech Connect (OSTI)

    Eriksson, Leif G. [Nuclear Waste Dispositions, 535 N. Interlachen Avenue, Unit 303, Winter Park, Florida 32789 (United States)] [Nuclear Waste Dispositions, 535 N. Interlachen Avenue, Unit 303, Winter Park, Florida 32789 (United States); Dials, George E. [B and W Conversion Services LLC, 1020 Monarch Road, Suite 300, Lexington, Kentucky 40513 (United States)] [B and W Conversion Services LLC, 1020 Monarch Road, Suite 300, Lexington, Kentucky 40513 (United States); George, Critz H. [Retired DOE and Consultant, 1218 Countryside Lane, Albuquerque, New Mexico, 87114 (United States)] [Retired DOE and Consultant, 1218 Countryside Lane, Albuquerque, New Mexico, 87114 (United States)

    2013-07-01T23:59:59.000Z

    In February 2009, the Obama Administration announced it would abandon USA's only candidate SNF/HLW-disposal facility since 1987. In 2010, all related activities were stopped and the Blue Ribbon Commission on America's Nuclear Future was established 'to recommend a new strategy for managing the back end of the nuclear fuel cycle', which it did in January 2012, emphasizing eight key elements. However, Key Element 1, 'A new, consent-based approach to siting future nuclear facilities', is qualitative/indeterminate rather than quantitative/measurable. It is thus highly-susceptible to semantic permutations that could extend rather than, as intended, expedite the siting of future nuclear facilities unless it also defines: a) Whose consent is needed?; and b) What constitutes consent? The following 'generic', radiation-risk- and societal-equity-based criteria address these questions: 1. Identify areas affected by projected radiation and other health risks from: a. The proposed nuclear facility (facility stakeholders); and b. The related nuclear-materials-transportation routes (transportation stakeholders); then 2. Surround each stakeholder area with a buffer zone and use this enlarged foot print to identify: a. Stakeholder hosts; and b. Areas not hosting any stakeholder category (interested parties). 3. Define 'consent-based' as being at least 60 percent of the 'population' in the respective stakeholder category and apply this yardstick to both 'in favor' and 'against' votes. Although criteria 1 and 2 also need facility-based definitions to make Key Element 1 measurable, the described siting approach, augmented by related facility-host incentives, would expedite the schedule and reduce the cost for achieving Key Elements 4-6 and 8, politics permitting. (authors)

  2. EPICS Version 4 - Implementing Complex Data Types

    SciTech Connect (OSTI)

    Marty Kraimer,; John dalesio

    2012-11-27T23:59:59.000Z

    Through phase 1 and phase 2 SBIR grants, s fully functional I/O Controller and communication protocol for version 4 of EPICS is completed. This new software architecture provides a flexible and extendible architecture. Version 4 is implemented fully in Java. The performance metrics look promising. The final portion of phase 2 is to optimize the communication mechanisms. Subsequent work on different aspects of this are required to provide a viable solutions in various areas. Version 3 of EPICS is able to provide a platform for implementing channel based control, because the channel and attributes for time stamping, alarm, display and control were narrow, well defined, and complete. To extend EPICS functionality beyond this, it is necessary to define attributes needed for archive data, array, image data, and directory services. The proper handling of several array types enables the development of middle layer servers such as orbit and bump control in accelerators. Phase 1 should produce a well defined, reviewed, and agreed upon definition of the metadata required for these services. A Phase 2 grant would provide tools that implemented archiving, general array, imaging, and directory applications.

  3. Postdoc Appointment Types

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible forPortsmouth/Paducah Project Office Press ReleasesPost-Closure BenefitsAppointment Types

  4. Project definition study for research facility access and science education

    SciTech Connect (OSTI)

    Rosen, S.P. [Univ. of Texas, Arlington, TX (United States). Coll. of Science; Teplitz, V.L. [Southern Methodist Univ., Dallas, TX (United States). Physics Dept.

    1994-10-01T23:59:59.000Z

    This UTA/SMU project definition study describes critical customer services and research programs which draw upon SSC assets to meet regional needs in two major components: Science Education; Academic/Small Business R and D Facility Access. The location of the SSC in Texas constituted a significant stimulus to R and D activities in Texas, encouraging new initiatives in high energy physics, as well as stimulating other areas of physics and related sciences. An important aspect of maximizing the utility of the investment in the SSC should be to re-allocate SSC assets in ways that maintain that momentum. This study addresses several ways to achieve that end, extending benefits to all of physics, the sciences in general and particularly, to science education.

  5. Building America Research Benchmark Definition: Updated December 20, 2007

    SciTech Connect (OSTI)

    Hendron, R.

    2008-01-01T23:59:59.000Z

    To track progress toward aggressive multi-year whole-house energy savings goals of 40-70% and onsite power production of up to 30%, DOE's Residential Buildings Program and NREL developed the Building America Research Benchmark in consultation with the Building America industry teams. The Benchmark is generally consistent with mid-1990s standard practice, as reflected in the Home Energy Rating System (HERS) Technical Guidelines (RESNET 2002), with additional definitions that allow the analyst to evaluate all residential end-uses, an extension of the traditional HERS rating approach that focuses on space conditioning and hot water. Unlike the reference homes used for HERS, EnergyStar, and most energy codes, the Benchmark represents typical construction at a fixed point in time so it can be used as the basis for Building America's multi-year energy savings goals without the complication of chasing a 'moving target'.

  6. Building America Research Benchmark Definition, Updated December 15, 2006

    SciTech Connect (OSTI)

    Hendron, R.

    2007-01-01T23:59:59.000Z

    To track progress toward aggressive multi-year whole-house energy savings goals of 40-70% and onsite power production of up to 30%, DOE's Residential Buildings Program and NREL developed the Building America Research Benchmark in consultation with the Building America industry teams. The Benchmark is generally consistent with mid-1990s standard practice, as reflected in the Home Energy Rating System (HERS) Technical Guidelines (RESNET 2002), with additional definitions that allow the analyst to evaluate all residential end-uses, an extension of the traditional HERS rating approach that focuses on space conditioning and hot water. Unlike the reference homes used for HERS, EnergyStar, and most energy codes, the Benchmark represents typical construction at a fixed point in time so it can be used as the basis for Building America's multi-year energy savings goals without the complication of chasing a ''moving target''.

  7. Building America Research Benchmark Definition: Updated August 15, 2007

    SciTech Connect (OSTI)

    Hendron, R.

    2007-09-01T23:59:59.000Z

    To track progress toward aggressive multi-year whole-house energy savings goals of 40-70% and onsite power production of up to 30%, DOE's Residential Buildings Program and NREL developed the Building America Research Benchmark in consultation with the Building America industry teams. The Benchmark is generally consistent with mid-1990s standard practice, as reflected in the Home Energy Rating System (HERS) Technical Guidelines (RESNET 2002), with additional definitions that allow the analyst to evaluate all residential end-uses, an extension of the traditional HERS rating approach that focuses on space conditioning and hot water. Unlike the reference homes used for HERS, EnergyStar, and most energy codes, the Benchmark represents typical construction at a fixed point in time so it can be used as the basis for Building America's multi-year energy savings goals without the complication of chasing a 'moving target'.

  8. Building America Research Benchmark Definition, Updated December 29, 2004

    SciTech Connect (OSTI)

    Hendron, R.

    2005-02-01T23:59:59.000Z

    To track progress toward aggressive multi-year whole-house energy savings goals of 40-70% and onsite power production of up to 30%, the U.S. Department of Energy (DOE) Residential Buildings Program and the National Renewable Energy Laboratory (NREL) developed the Building America Research Benchmark in consultation with the Building America industry teams. The Benchmark is generally consistent with mid-1990s standard practice, as reflected in the Home Energy Rating System (HERS) Technical Guidelines (RESNET 2002), with additional definitions that allow the analyst to evaluate all residential end-uses, an extension of the traditional HERS rating approach that focuses on space conditioning and hot water. A series of user profiles, intended to represent the behavior of a ''standard'' set of occupants, was created for use in conjunction with the Benchmark.

  9. Dieudonne-type theorems for set functions with values in (l)-groups

    E-Print Network [OSTI]

    Boccuto, Antonio

    )-sequence (ai,l)i,l we have: ININ i=1 ai,(i) = 0. From now on we assume that R is a weakly -distributive of the type b = i=1 ai,(i), with ININ . A sequence (rn)n in R is said to be (D)-convergent to r R (and we a (n) i,(i+n) i=1 ai,(i) ININ. We now introduce the following: Definitions 2.3 Let be any

  10. Target Selection for the LBTI Exozodi Key Science Program

    E-Print Network [OSTI]

    Weinberger, Alycia J; Kennedy, Grant M; Roberge, Aki; Defrère, Denis; Hinz, Philip M; Millan-Gabet, Rafael; Rieke, George; Bailey, Vanessa P; Danchi, William C; Haniff, Chris; Mennesson, Bertrand; Serabyn, Eugene; Skemer, Andrew J; Stapelfeldt, Karl R; Wyatt, Mark C

    2015-01-01T23:59:59.000Z

    The Hunt for Observable Signatures of Terrestrial planetary Systems (HOSTS) on the Large Binocular Telescope Interferometer will survey nearby stars for faint emission arising from ~300 K dust (exozodiacal dust), and aims to determine the exozodiacal dust luminosity function. HOSTS results will enable planning for future space telescopes aimed at direct spectroscopy of habitable zone terrestrial planets, as well as greater understanding of the evolution of exozodiacal disks and planetary systems. We lay out here the considerations that lead to the final HOSTS target list. Our target selection strategy maximizes the ability of the survey to constrain the exozodi luminosity function by selecting a combination of stars selected for suitability as targets of future missions and as sensitive exozodi probes. With a survey of approximately 50 stars, we show that HOSTS can enable an understanding of the statistical distribution of warm dust around various types of stars and is robust to the effects of varying levels ...

  11. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  12. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    SciTech Connect (OSTI)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01T23:59:59.000Z

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  13. The key to minimizing minesite versus utility laboratory analyses on Powder River Basin coals

    SciTech Connect (OSTI)

    Rexin, M.G.

    1995-08-01T23:59:59.000Z

    Powder River Basin (PRB) coals are continuing to expand their areas of use into regions previously reserved for higher ranked coals. PRB coals are subbituminous by rank. Inherent moisture values of 25 to 30 percent are the norm. PRB coals, being lower rank in nature, also tend to oxidize very easily. These factors combined produce a coal which can cause analysis problems for laboratories unaccustomed to PRB coals. In fact, even laboratories that deal with this type of coal on a daily basis can experience analytical difficulties. Special care needs to be taken by both minesite laboratory and the utility laboratory to ensure accurate analyses. Cooperation between both parties is the key to reproducible analyses. Only by working together can parties fully analyze the situation and develop analytical methods acceptable to both. This paper will describe the methods employed by the Caballo Rojo Mine (CRM) and the Georgia Power Company (GPC) to resolve laboratory analysis differences found during shipments by CRM to GPC beginning in 1994. The following topics are discussed: initial comparative results, analytical investigations, the cooperative process, recent comparative results, and conclusions.

  14. Multiple-Photon Absorption Attack on Entanglement-Based Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

    2011-02-16T23:59:59.000Z

    In elaborating on the multiple-photon absorption attack on Ekert protocol proposed in arXiv:1011.4740, we show that it can be used in other entanglement-based protocols, in particular the BBM92 protocol. In this attack, the eavesdropper (Eve) is assumed to be in control of the source, and she sends pulses correlated in polarization (but not entangled) containing several photons at frequencies for which only multiple-photon absorptions are possible in Alice's and Bob's detectors. Whenever the photons stemming from one pulse are dispatched in such a way that the number of photons is insufficient to trigger a multiple-photon absorption in either channel, the pulse remains undetected. We show that this simple feature is enough to reproduce the type of statistics on the detected pulses that are considered as indicating a secure quantum key distribution, even though the source is actually a mixture of separable states. The violation of Bell inequalities measured by Alice and Bob increases with the order of the multiple-photon absorption that Eve can drive into their detectors, while the measured quantum bit error rate decreases as a function of the same variable. We show that the attack can be successful even in the simplest case of a two-photon absorption or three-photon absorption attack, and we discuss possible countermeasures, in particular the use of a fair sampling test.

  15. Rappels: 4) Piles Types abstraits de donnes (Abstract Data Type)

    E-Print Network [OSTI]

    Hamel, Sylvie

    Rappels: 4) Piles Types abstraits de données (Abstract Data Type) IFT2015, A2009, Sylvie Hamel Université de Montréal 1Piles Type de données Un ensemble de valeurs Un ensemble d'opérations Structure de Université de Montréal 2Piles Type abstrait de données PILE (§4.2) Garde en mémoire des objets arbitraires

  16. Statement of work for definitive design of the K basins integrated water treatment system project

    SciTech Connect (OSTI)

    Pauly, T.R., Westinghouse Hanford

    1996-07-16T23:59:59.000Z

    This Statement of Work (SOW) identifies the scope of work and schedule requirements for completing definitive design of the K Basins Integrated Water Treatment Systems (IWTS) Subproject. This SOW shall form the contractual basis between WHC and the Design Agent for the Definitive Design.

  17. LCLS USERS' ORGANIZATION CHARTER AND BY-LAWS A. Terms and definitions

    E-Print Network [OSTI]

    Wechsler, Risa H.

    LCLS USERS' ORGANIZATION CHARTER AND BY-LAWS A. Terms and definitions Several definitions and acronyms used in this document are defined below LCLS Linac Coherent Light Source LCLS/UO LCLS Users' Organization LCLS/UOEC LCLS Users' Organization Executive Committee SLAC Stanford Linear Accelerator Center

  18. Abduction in Logic Programming: A New Definition and an Abductive Procedure Based on Rewriting

    E-Print Network [OSTI]

    Lin, Fangzhen

    Abduction in Logic Programming: A New Definition and an Abductive Procedure Based on Rewriting, Canada T6G 2H1 Abstract We propose a new definition of abduction in logic programming, and contrast Abduction in logic programming In general, given a background theory T , and an observation q to explain

  19. Numerical Modeling of CIGS Solar Cells: Definition of the Baseline and

    E-Print Network [OSTI]

    Sites, James R.

    Thesis Numerical Modeling of CIGS Solar Cells: Definition of the Baseline and Explanation our supervision by Markus Gloeckler entitled "Numerical Modeling of CIGS Solar Cells: Definition. A three-layer structure, simulating a Cu(InGa)Se2 (CIGS) heterojunction solar cell, was set up using

  20. A dynamical definition of quasibound molecular clusters Sarah A. Harris and Ian J. Forda)

    E-Print Network [OSTI]

    Ford, Ian

    A dynamical definition of quasibound molecular clusters Sarah A. Harris and Ian J. Forda of a quasibound cluster are identified through a retrospective dynamical definition. The trajectory of a molecular is satisfied, however, at the instant that the energy of the departing molecule in the center of mass frame

  1. The definition of reaction coordinates for reaction-path dynamics Gregory A. Natanson

    E-Print Network [OSTI]

    Truong, Thanh N.

    The definition of reaction coordinates for reaction-path dynamics Gregory A. Natanson Computer only small-amplitude deviations from a minimum-energy path (MEP) through nuclear coordinate space. Thus. In choosing the coordinate system, the critical issue is the definition of the reaction coordinate. Along

  2. Lecture 16 : Definitions, theorems, proofs MTH299 Transition to Formal Mathematics Michigan State University 1 / 8

    E-Print Network [OSTI]

    Magyar, Peter

    ). MTH299 Transition to Formal Mathematics Michigan State University 2 / 8 #12;Group Axioms Definition299 Transition to Formal Mathematics Michigan State University 3 / 8 #12;Group Axioms Definition Is Z with + a group? MTH299 Transition to Formal Mathematics Michigan State University 3 / 8 #12;Group

  3. Mechanism design with approximate types

    E-Print Network [OSTI]

    Zhu, Zeyuan Allen

    2012-01-01T23:59:59.000Z

    In mechanism design, we replace the strong assumption that each player knows his own payoff type exactly with the more realistic assumption that he knows it only approximately: each player i only knows that his true type ...

  4. Types of Farming in Texas.

    E-Print Network [OSTI]

    Bonnen, C. A.

    1960-01-01T23:59:59.000Z

    .......... .......-.----------------------. 8 Labor -..-.....-----...------------------------------------------------. 9 Land Tenure .--.----....---....--------------------------------- 9 Number and Size of Farms ....----...----.-._--------- 10 Capital... -------------...-------.---------------------------- 21 Hogs -......-....--------------------------------------------------- 22 Poultry .-.---.-.....--.-..------.---------------------------------- 22 Horses and Mules ---..-....---..--..------------------------ 23 Types of Farming and Type-of-farming...

  5. Classification of Electromagnetic and Gravitational Hopfions by Algebraic Type

    E-Print Network [OSTI]

    Amy Thompson; Alexander Wickes; Joe Swearngin; Dirk Bouwmeester

    2015-05-02T23:59:59.000Z

    We extend the definition of hopfions to include a class of spin-$h$ fields and use this to introduce the electromagnetic and gravitational hopfions of different algebraic types. The fields are constructed through the Penrose contour integral transform, thus the singularities of the generating functions are directly related to the geometry of the resulting physical fields. We discuss this relationship and how the topological structure of the fields is related to the Robinson congruence. Since the topology appears in the lines of force for both electromagnetism and gravity, the gravito-electromagnetic formalism is used to analyze the gravitational hopfions and describe the time evolution of their tendex and vortex lines. The correspondence between fields of different spin results in analogous configurations based on the same topological structure. The null and type N fields propagate at the speed of light, while the non-null and type D fields radiate energy outward from the center. Finally we discuss the type III gravitational hopfion, which has no direct electromagnetic analog, but find that it still exhibits some of the characteristic features common to the other hopfion fields.

  6. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09T23:59:59.000Z

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  7. Generalized decoding, effective channels, and simplified security proofs in quantum key distribution

    SciTech Connect (OSTI)

    Renes, Joseph M. [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany); Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck-Forschungsgruppe, Institut fuer Optik, Information und Photonik, Universitaet Erlangen-Nuernberg, Staudtstrasse 7, D-91058 Erlangen (Germany); Grassl, Markus [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany)

    2006-08-15T23:59:59.000Z

    Prepare and measure quantum key distribution protocols can be decomposed into two basic steps: delivery of the signals over a quantum channel and distillation of a secret key from the signal and measurement records by classical processing and public communication. Here we formalize the distillation process for a general protocol in a purely quantum-mechanical framework and demonstrate that it can be viewed as creating an 'effective' quantum channel between the legitimate users Alice and Bob. The process of secret key generation can then be viewed as entanglement distribution using this channel, which enables application of entanglement-based security proofs to essentially any prepare and measure protocol. To ensure secrecy of the key, Alice and Bob must be able to estimate the channel noise from errors in the key, and we further show how symmetries of the distillation process simplify this task. Applying this method, we prove the security of several key distribution protocols based on equiangular spherical codes.

  8. Tornado type wind turbines

    DOE Patents [OSTI]

    Hsu, Cheng-Ting (Ames, IA)

    1984-01-01T23:59:59.000Z

    A tornado type wind turbine has a vertically disposed wind collecting tower with spaced apart inner and outer walls and a central bore. The upper end of the tower is open while the lower end of the structure is in communication with a wind intake chamber. An opening in the wind chamber is positioned over a turbine which is in driving communication with an electrical generator. An opening between the inner and outer walls at the lower end of the tower permits radially flowing air to enter the space between the inner and outer walls while a vertically disposed opening in the wind collecting tower permits tangentially flowing air to enter the central bore. A porous portion of the inner wall permits the radially flowing air to interact with the tangentially flowing air so as to create an intensified vortex flow which exits out of the top opening of the tower so as to create a low pressure core and thus draw air through the opening of the wind intake chamber so as to drive the turbine.

  9. Global AbstractionSafe Marshalling with Hash Types James J. Leifer + Gilles Peskine + Peter Sewell # Keith Wansbrough #

    E-Print Network [OSTI]

    Sewell, Peter

    Global Abstraction­Safe Marshalling with Hash Types James J. Leifer + Gilles Peskine + Peter Sewell.Last}@cl.cam.ac.uk Abstract Type abstraction is a key feature of ML­like languages for writ­ ing large programs. Marshalling stores. In this paper we combine the two, developing compile­time and run­time semantics for marshalling

  10. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

    2008-01-01T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  11. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

    2008-12-10T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  12. A dependent nominal type theory

    E-Print Network [OSTI]

    Cheney, James

    2012-01-01T23:59:59.000Z

    Nominal abstract syntax is an approach to representing names and binding pioneered by Gabbay and Pitts. So far nominal techniques have mostly been studied using classical logic or model theory, not type theory. Nominal extensions to simple, dependent and ML-like polymorphic languages have been studied, but decidability and normalization results have only been established for simple nominal type theories. We present a LF-style dependent type theory extended with name-abstraction types, prove soundness and decidability of beta-eta-equivalence checking, discuss adequacy and canonical forms via an example, and discuss extensions such as dependently-typed recursion and induction principles.

  13. CORN DEVELOPMENT AND KEY GROWTH STAGES Brent Bean and Carl Patrick, Extension Agronomist and Entomologist

    E-Print Network [OSTI]

    Mukhtar, Saqib

    CORN DEVELOPMENT AND KEY GROWTH STAGES Brent Bean and Carl Patrick, Extension Agronomist to have the soil profile full of water prior to tas

  14. Modeling Metal Fatigue As a Key Step in PV Module Life Time Prediction (Presentation)

    SciTech Connect (OSTI)

    Bosco, N.

    2012-02-01T23:59:59.000Z

    This presentation covers modeling metal fatigue as a key step in photovoltaic (PV) module lifetime predictions. Described are time-dependent and time-independent case studies.

  15. National Biomedical Tracer Facility (NBTF). Project definition study: Phase I

    SciTech Connect (OSTI)

    Lagunas-Solar, M.C.

    1995-02-15T23:59:59.000Z

    This report describes a five-year plan for the construction and commissioning of a reliable and versatile NBTF facility for the production of high-quality, high-yield radioisotopes for research, biomedical, and industrial applications. The report is organized in nine sections providing, in consecutive order, responses to the nine questions posed by the U.S. Department of Energy in its solicitation for the NBTF Project Definition Study. In order to preserve direct correspondence (e.g., Sec. 3 = 3rd item), this Introduction is numbered {open_quotes}0.{close_quotes} Accelerator and facility designs are covered in Section 1 (Accelerator Design) and Section 2 (Facility Design). Preliminary estimates of capital costs are detailed in Section 3 (Design and Construction Costs). Full licensing requirements, including federal, state, and local ordinances, are discussed in Section 4 (Permits). A plan for the management of hazardous materials to be generated by NBTF is presented in Section 5 (Waste Management). An evaluation of NBTF`s economic viability and its potential market impact is detailed in Section 6(Business Plan), and is complemented by the plans in Section 7 (Operating Plan) and Section 8 (Radioisotope Plan). Finally, a plan for NBTF`s research, education, and outreach programs is presented in Section 9 (Research and Education Programs).

  16. Guidelines for ground motion definition for the eastern United States

    SciTech Connect (OSTI)

    Gwaltney, R.C.; Aramayo, G.A.; Williams, R.T.

    1985-06-01T23:59:59.000Z

    Guidelines for the determination of earthquake ground motion definition for the eastern United States are established here. Both far-field and near-field guidelines are given. The guidelines were based on an extensive review of the current procedures for specifying ground motion in the United States. Both empirical and theoretical procedures were used in establishing the guidelines because of the low seismicity in the eastern United States. Only a few large- to great-sized earthquakes (M/sub s/ > 7.5) have occurred in this region, no evidence of tectonic surface ruptures related to historic or Holocene earthquakes has been found, and no currently active plate boundaries of any kind are known in this region. Very little instrumented data have been gathered in the East. Theoretical procedures are proposed so that in regions of almost no data, a reasonable level of seismic ground motion activity can be assumed. The guidelines are to be used to develop the safe shutdown earthquake (SSE). A new procedure for establishing the operating basis earthquake (OBE) is proposed, in particular for the eastern United States. The OBE would be developed using a probabilistic assessment of the geological conditions and the recurrence of seismic events at a site. These guidelines should be useful in development of seismic design requirements for future reactors. 17 refs., figs., tabs.

  17. Identification and definition of unbundled electric generation and transmission services

    SciTech Connect (OSTI)

    Kirby, B.; Hirst, E.; Vancoevering, J.

    1995-03-01T23:59:59.000Z

    State and federal regulators, private and public utilities, large and small customers, power brokers and marketers, and others are engaged in major debates about the future structure of the electric industry. Although the outcomes are far from certain, it seems clear that customers will have much greater choices about the electric services they purchase and from whom they buy these services. This report examines the ``ancillary`` services that are today buried within the typical vertically integrated utility. These ancillary services support and make possible the provision of the basic services of generating capacity, energy supply, and power delivery. These ancillary services include: Management of generating units; reserve generating capacity to follow variations in customer loads, to provide capacity and energy when generating units or transmission lines suddenly fall, to maintain electric-system stability, and to provide local-area security; transmission-system monitoring and control; replacement of real power and energy losses; reactive-power management and voltage regulation; transmission reserves; repair and maintenance of the transmission network; metering, billing, and communications; and assurance of appropriate levels of power quality. Our focus in this report, the first output from a larger Oak Ridge National Laboratory project, is on identification and definition of these services. Later work in this project will examine more closely the costs and pricing options for each service.

  18. Dikin-type algorithms for dextrous grasping force optimization

    SciTech Connect (OSTI)

    Buss, M. [Technical Univ. of Munich (Germany). Inst. of Automatic Control Engineering; Faybusovich, L. [Univ. of Notre Dame, IN (United States). Dept. of Mathematics; Moore, J.B. [Australian National Univ., Canberra, Australia Capital Territory (Australia)

    1998-08-01T23:59:59.000Z

    One of the central issues in dextrous robotic hand grasping is to balance external forces acting on the object and at the same time achieve grasp stability and minimum grasping effort. A companion paper shows that the nonlinear friction-force limit constraints on grasping forces are equivalent to the positive definiteness of a certain matrix subject to linear constraints. Further, compensation of the external object force is also a linear constraint on this matrix. Consequently, the task of grasping force optimization can be formulated as a problem with semidefinite constraints. In this paper, two versions of strictly convex cost functions, one of them self-concordant, are considered. These are twice-continuously differentiable functions that tend to infinity at the boundary of possible definiteness. For the general class of such cost functions, Dikin-type algorithms are presented. It is shown that the proposed algorithms guarantee convergence to the unique solution of the semidefinite programming problem associated with dextrous grasping force optimization. Numerical examples demonstrate the simplicity of implementation, the good numerical properties, and the optimality of the approach.

  19. After the definition of Cloud Computing ... What has NIST done in the Cloud space lately? What's next?

    E-Print Network [OSTI]

    After the definition of Cloud Computing ... What has NIST done in the Cloud space lately? What Publication SP 500-292: Cloud Computing Reference Architecture. This document takes the NIST definition of Cloud Computing a step further by expanding the definition into a logical representation of the cloud

  20. Definitions and constructions Homotopy theory Maps Golod 25th Nordic and 1st British-Nordic congress of

    E-Print Network [OSTI]

    Dundas, Bjørn Ian

    Definitions and constructions Homotopy theory Maps Golod 25th Nordic and 1st British of Mathematicians #12;Definitions and constructions Homotopy theory Maps Golod TORIC TOPOLOGY from a homotopy of Mathematicians #12;Definitions and constructions Homotopy theory Maps Golod Combinatorics: Simplicial complex V

  1. A Definition of the Degree of Ionization of a Micelle Based on Its Aggregation Number Barney L. Bales*

    E-Print Network [OSTI]

    Bales, Barney

    the measurement of R on the basis of this definition. Theory We employ the language of the pseudophase ionA Definition of the Degree of Ionization of a Micelle Based on Its Aggregation Number Barney L and added salt concentrations yielding the same value of Caq leads to a straightforward definition of R. Any

  2. Theory and Applications of Categories, Vol. 10, No. 1, 2002, pp. 170. A SURVEY OF DEFINITIONS OF n-CATEGORY

    E-Print Network [OSTI]

    Chapman, Robin

    Theory and Applications of Categories, Vol. 10, No. 1, 2002, pp. 1­70. A SURVEY OF DEFINITIONS OF n-CATEGORY TOM LEINSTER ABSTRACT. Many people have proposed definitions of `weak n-category'. Ten of them are presented here. Each definition is given in two pages, with a further two pages on what happens when n 2

  3. On the asymptotic homotopy type of inductive limit Type ...

    E-Print Network [OSTI]

    In this note we exhibit large classes of (projeetionless) stable, nuclear C*- algebras whose asymptotic homotopy type is determined by K-theoretical data.

  4. U.S. Department of Energy Project Definition Rating Index Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-07-22T23:59:59.000Z

    This Guide assists individuals and teams involved in conducting assessments of project definition (i.e., how well front-end planning has been conducted to define project scope) using a numerical project management tool developed by the Construction Industry Institute (CII), tailored for DOE use. Called the Project Definition Rating Index (PDRI), the PDRI is a simple but powerful tool that facilitates the measurement of the degree of scope definition for completeness for traditional construction projects, both nuclear and non-nuclear. No cancellations.

  5. The Environmental Management Project Manager`s Handbook for improved project definition

    SciTech Connect (OSTI)

    NONE

    1995-02-01T23:59:59.000Z

    The United States Department of Energy (DOE) is committed to providing high quality products that satisfy customer needs and are the associated with this goal, DOE personnel must possess the knowledge, skills, and abilities to ensure successful job performance. In addition, there must be recognition that the greatest obstacle to proper project performance is inadequate project definition. Without strong project definition, DOE environmental management efforts are vulnerable to fragmented solutions, duplication of effort, and wastes resources. The primary means of ensuring environmental management projects meet cost and schedule milestones is through a structured and graded approach to project definition, which is the focus of this handbook.

  6. Preconceptual ABC design definition and system configuration layout

    SciTech Connect (OSTI)

    Barthold, W. [Barthold & Associates, Inc., Knoxville, TN (United States)

    1995-03-01T23:59:59.000Z

    This document is the conceptual design document for the follow-on to the Molten Salt Breeder Reactor, known as the ABC type reactor. It addresses blanket design options, containment options, off-gas systems, drainage systems, and components/layouts of the primary, secondary, and tertiary systems, and it contains a number of diagrams for the configuration of the major systems.

  7. HOUSING GUIDE FOR VISITING RESEARCHERS Keys to better understanding French rental rules

    E-Print Network [OSTI]

    Jeanjean, Louis

    HOUSING GUIDE FOR VISITING RESEARCHERS Keys to better understanding French rental rules Document written by the Housing Working Group of the association EURAXESS FRANCE #12;Housing guide Euraxess France................................................................................................................P.3 o Key Principles of House Renting in France...........................................P.4 o

  8. Using Walk-SAT and Rel-SAT for Cryptographic Key Search Fabio Massacci

    E-Print Network [OSTI]

    Massacci, Fabio

    search [...]. Second, improvements in machine speed, memory size and implementations extended the rangeUsing Walk-SAT and Rel-SAT for Cryptographic Key Search Fabio Massacci Dip. di Informatica e of cryptographic algorithms. Thus, cryptographic key search is often THE search problem for many governments

  9. Fast DES Implementations for FPGAs and its Application to a Universal KeySearch Machine ?

    E-Print Network [OSTI]

    of DES with strong emphasis on high­speed performance. Techniques like pipelining and loop unrolling were, We designed a universal key­search machine and used a high speed DES implementation for FPGAsFast DES Implementations for FPGAs and its Application to a Universal Key­Search Machine ? Jens

  10. Fast DES Implementations for FPGAs and its Application to a Universal Key-Search Machine ?

    E-Print Network [OSTI]

    with strong emphasis on high-speed performance. Techniques like pipelining and loop unrolling were used designed a universal key-search machine and used a high speed DES implementation for FPGAs as an algorithmFast DES Implementations for FPGAs and its Application to a Universal Key-Search Machine ? Jens

  11. Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky #

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky a public­key encryption scheme for Alice that allows PIR searching over encrypted documents. Our solution­trivially small communication complexity. The main technique of our solution also allows for Single­Database PIR

  12. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  13. A Method for Obtaining Digital Signatures and PublicKey Cryptosystems

    E-Print Network [OSTI]

    Goldwasser, Shafi

    re­ vealing an encryption key does not thereby reveal the corresponding decryption key. This has two, or the entire work requires specific permission as does republication, or systematic or multiple reproduction . Formally, D(E(M) = M: (1) (b) Both E and D are easy to compute. (c) By publicly revealing E the user does

  14. Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives

    E-Print Network [OSTI]

    Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas portfolio of technology options that can provide abundant energy to power economic development and still

  15. The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean

    E-Print Network [OSTI]

    The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean Phoebe J. Lam1 concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll a key source of bioavailable Fe to the HNLC North Pacific. Keywords: iron, continental margin, HNLC 1

  16. Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks

    E-Print Network [OSTI]

    Heys, Howard

    Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks Xueying-- In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless energy efficiency with a level of security suitable for wireless sensor networks. Keywords - wireless

  17. Granite Recrystallization The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb

    E-Print Network [OSTI]

    Sheffield, University of

    Granite Recrystallization ­ The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb, and hence the key to the entire strategy, depends on whether sufficient melting of granite host rock can-temperature, high-pressure experiments reported here demonstrate that granite can be partially melted and completely

  18. Key Benefits for the M.Sc. Students A monthly stipend of 10,000/-

    E-Print Network [OSTI]

    Rahman, A.K.M. Ashikur

    for app development 24-hours graduate lab facilities with air condition Key Benefits for the M with air condition Key Benefits for the Ph.D. Students (Full Time) A monthly stipend of 30,000/- Tuition for app development 24-hours graduate lab facilities with air condition Provision for research visit

  19. A Single-Key Attack on 6-Round KASUMI Teruo Saito1

    E-Print Network [OSTI]

    A Single-Key Attack on 6-Round KASUMI Teruo Saito1 NEC Software Hokuriku, Ltd. 1, Anyoji, Hakusan. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical

  20. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26T23:59:59.000Z

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.