Sample records for varying key assumptions

  1. Key Assumptions Policy Issues

    E-Print Network [OSTI]

    Supply Limitations 8 Withi h B l i8. Within-hour Balancing 9. Capacity and Energy Values for Wind · Independent Power Producers C t ti· Current assumptions · Winter: full availability ~ 3,200 MW · Summer: 1 t b it d d li d· Thermal: must be sited and licensed · Wind/solar: must be sited and licensed · EE

  2. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    at zero and increase to $47 per ton of CO2 emissions by 2030. Higher electricity prices reduce demandSixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions Summary of Key................................................................ 10 Wholesale Electricity Prices

  3. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Wayne Moe

    2013-05-01T23:59:59.000Z

    This document provides key definitions, plant capabilities, and inputs and assumptions related to the Next Generation Nuclear Plant to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor. These definitions, capabilities, and assumptions were extracted from a number of NGNP Project sources such as licensing related white papers, previously issued requirement documents, and preapplication interactions with the Nuclear Regulatory Commission (NRC).

  4. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Phillip Mills

    2012-02-01T23:59:59.000Z

    This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

  5. DRAFT, 8/2/07 List of Key Assumptions

    E-Print Network [OSTI]

    will be stacked three high. c. Lead used in the shielding can come from DOE inventories, and any radiological component of the lead will be negligible in the context of the radiological characteristics of the inventory containers handled as three packs 5. Hazardous Waste Facility Permit a. The HWFP will require modification b

  6. Assumptions to the Annual Energy Outlook 2013

    Gasoline and Diesel Fuel Update (EIA)

    assumptions regarding technically recoverable oil resources. Inputs to these resource estimates include the USGS World Petroleum Assessment of 2000 and oil reserves...

  7. Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions

    E-Print Network [OSTI]

    Keinan, Alon

    Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions Ran Canetti-up or public keys. Tel Aviv University, Email: Canetti@tau.ac.il Cornell University, E-Mail: huijia

  8. Optima Dock Synchronization under Different Delay Assumptions

    E-Print Network [OSTI]

    Lynch, Nancy

    Projects, National Autonomous University of Mexico (UNAM). Email: iryktvmhbitnet or anarCwatson. ibm by broadcast networks in which every message arrives to all processors at approximately the same time, message passing systems, networks, optimization, message delay assumptions, precision. Department

  9. Preliminary Assumptions for Natural Gas Peaking

    E-Print Network [OSTI]

    ; adjusted to 2012$, state construction cost index, vintage of cost estimate, scope of estimate to extent's Discussion Aeroderivative Gas Turbine Technology Proposed reference plant and assumptions Preliminary cost Robbins 2 #12;Peaking Power Plant Characteristics 6th Power Plan ($2006) Unit Size (MW) Capital Cost ($/k

  10. Supply-side Resources & Planning Assumptions

    E-Print Network [OSTI]

    - station Solar PV (from 6th Plan) 25 MW dc/20 MW net ac output using flat plate non concentrating single) ­ Storage Resource assessment data needs and applications R d f t Resources proposed for assessment Forecasts ProCost 46/19/2013 #12;6/19/2013 3 Resource data & planning assumptions Reference plant (New

  11. EVA PLANNING ASSUMPTIONS LRV TRAVERSE ASSESSMENT

    E-Print Network [OSTI]

    Rathbun, Julie A.

    VALUE. #12;ASSUMPTIONS {CONT) e METABOLIC RATES · LM OVERHEAD 1050 BTU/HR · ALSEP 1050 BTU/HR · STATION 950 BTU/HR · RIDING 550 BTU/HR #12;ACTIVITY 'METABOLIC .COMPARISON 15 ACTUAL VERSUS 16 PLANNING AVERAGE METABOLIC RATE (BTU I HR) ACTIVITY 15 ACTUAL 16 PLANNING CDR LMP LM OVERHEAD 1246 1060 '1050

  12. A new scenario framework for climate change research: The concept of Shared Climate Policy Assumptions

    SciTech Connect (OSTI)

    Kriegler, Elmar; Edmonds, James A.; Hallegatte, Stephane; Ebi, Kristie L.; Kram, Tom; Riahi, Keywan; Winkler, Harald; Van Vuuren, Detlef

    2014-04-01T23:59:59.000Z

    The paper presents the concept of shared climate policy assumptions as an important element of the new scenario framework. Shared climate policy assumptions capture key climate policy dimensions such as the type and scale of mitigation and adaptation measures. They are not specified in the socio-economic reference pathways, and therefore introduce an important third dimension to the scenario matrix architecture. Climate policy assumptions will have to be made in any climate policy scenario, and can have a significant impact on the scenario description. We conclude that a meaningful set of shared climate policy assumptions is useful for grouping individual climate policy analyses and facilitating their comparison. Shared climate policy assumptions should be designed to be policy relevant, and as a set to be broad enough to allow a comprehensive exploration of the climate change scenario space.

  13. Whitening for Photometric Comparison of Smooth Surfaces under Varying Illumination

    E-Print Network [OSTI]

    Lindenbaum, Michael

    produce lighting insensitive im- age comparisons. While our Gaussian assumption is a simplificationWhitening for Photometric Comparison of Smooth Surfaces under Varying Illumination Margarita the problem of image comparison in order to match smooth surfaces under varying illumination. In a smooth

  14. Cosmology with Varying Constants

    E-Print Network [OSTI]

    C. J. A. P. Martins

    2000-08-18T23:59:59.000Z

    I motivate and discuss some recent work on theories with varying constants, and consider some possible observational consequences and tests. Particular emphasis is given to models which can (almost) exactly mimic the predictions of standard inflationary models.

  15. Varying constants quantum cosmology

    E-Print Network [OSTI]

    Katarzyna Leszczynska; Adam Balcerzak; Mariusz P. Dabrowski

    2015-01-26T23:59:59.000Z

    We discuss minisuperspace models within the framework of varying physical constants theories including $\\Lambda$-term. In particular, we consider the varying speed of light (VSL) theory and varying gravitational constant theory (VG) using the specific ans\\"atze for the variability of constants: $c(a) = c_0 a^n$ and $G(a)=G_0 a^q$. We find that most of the varying $c$ and $G$ minisuperspace potentials are of the tunneling type which allows to use WKB approximation of quantum mechanics. Using this method we show that the probability of tunneling of the universe "from nothing" ($a=0)$ to a Friedmann geometry with the scale factor $a_t$ is large for growing $c$ models and is strongly suppressed for diminishing $c$ models. As for $G$ varying, the probability of tunneling is large for $G$ diminishing, while it is small for $G$ increasing. In general, both varying $c$ and $G$ change the probability of tunneling in comparison to the standard matter content (cosmological term, dust, radiation) universe models.

  16. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  17. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  18. Assumption-Commitment Support for CSP Model Checking

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 Assumption-Commitment Support for CSP Model Checking Nick Moffat1 Systems Assurance using CSP. In our formulation, an assumption-commitment style property of a process SYS takes the form-Guarantee, CSP, Model Checking, Compositional Reasoning 1 Introduction The principle of compositional program

  19. MONITORED GEOLOGIC REPOSITORY LIFE CYCLE COST ESTIMATE ASSUMPTIONS DOCUMENT

    SciTech Connect (OSTI)

    R.E. Sweeney

    2001-02-08T23:59:59.000Z

    The purpose of this assumptions document is to provide general scope, strategy, technical basis, schedule and cost assumptions for the Monitored Geologic Repository (MGR) life cycle cost (LCC) estimate and schedule update incorporating information from the Viability Assessment (VA) , License Application Design Selection (LADS), 1999 Update to the Total System Life Cycle Cost (TSLCC) estimate and from other related and updated information. This document is intended to generally follow the assumptions outlined in the previous MGR cost estimates and as further prescribed by DOE guidance.

  20. Computational soundness for standard assumptions of formal cryptography

    E-Print Network [OSTI]

    Herzog, Jonathan, 1975-

    2004-01-01T23:59:59.000Z

    This implementation is conceptually simple, and relies only on general assumptions. Specifically, it can be thought of as a 'self-referential' variation on a well-known encryption scheme. 4. Lastly, we show how the ...

  1. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  2. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  3. COMPARING ALASKA'S OIL PRODUCTION TAXES: INCENTIVES AND ASSUMPTIONS1

    E-Print Network [OSTI]

    Pantaleone, Jim

    context of Alaska oil production taxes, comparing MAPA and ACES to the original petroleum profits tax (PPT1 COMPARING ALASKA'S OIL PRODUCTION TAXES: INCENTIVES AND ASSUMPTIONS1 Matthew Berman In a recent analysis comparing the current oil production tax, More Alaska Production Act (MAPA, also known as SB 21

  4. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  5. Effects of internal gain assumptions in building energy calculations

    SciTech Connect (OSTI)

    Christensen, C.; Perkins, R.

    1981-01-01T23:59:59.000Z

    The utilization of direct solar gains in buildings can be affected by operating profiles, such as schedules for internal gains, thermostat controls, and ventilation rates. Building energy analysis methods use various assumptions about these profiles. The effects of typical internal gain assumptions in energy calculations are described. Heating and cooling loads from simulations using the DOE 2.1 computer code are compared for various internal-gain inputs: typical hourly profiles, constant average profiles, and zero gain profiles. Prototype single-family-detached and multi-family-attached residential units are studied with various levels of insulation and infiltration. Small detached commercial buildings and attached zones in large commercial buildings are studied with various levels of internal gains. The results of this study indicate that calculations of annual heating and cooling loads are sensitive to internal gains, but in most cases are relatively insensitive to hourly variations in internal gains.

  6. Notes 01. The fundamental assumptions and equations of lubrication theory

    E-Print Network [OSTI]

    San Andres, Luis

    2009-01-01T23:59:59.000Z

    for unsteady or transient motions ? Journal angular speed (rad/s) NOTES 1. THE FUNDAMENTAL ASSUMPTIONS IN HYDRODYNAMIC LUBRICATION ? Dr. Luis San Andr?s (2009) 2 Fluid flow in a general physical domain is governed by the principles of: a) conservation... of the runner surface. For example, in journal bearings U * =?R J where ? is the journal angular speed in rad/s. Substitution of the dimensionless variables into the continuity equation (1) renders the following expression 0...

  7. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  8. Developing a decision model to describe levels of self-directedness based upon the key assumptions of andragogy 

    E-Print Network [OSTI]

    Richards, Lance Jonathan

    2005-11-01T23:59:59.000Z

    As workplace demands change, a need has developed for alternatives to traditional education. With advancements in electronic telecommunication technologies, distance education has become a viable alternative to traditional ...

  9. Verification of energy audit assumptions: Why engineering estimates go bad

    SciTech Connect (OSTI)

    Dent, C.L.; Swanson, D.B.; Koca, R.W.; Tibbetts, B.

    1994-12-31T23:59:59.000Z

    Often, local governments do not have the resources to fully assess and implement energy efficiency measures (EEMs) even though initial payback calculations are encouraging. To address this problem, the California Energy Commission (CEC) has been operating the Energy Partnership Program (EPP) to provide technical assistance and funding to local governments for energy efficiency projects in public buildings. A government agency interested in participating in the EPP begins the process by submitting an application which is then reviewed by the CEC for energy savings potential. Selected sites are visited by the CEC, after which they may be granted a full energy audit and recommendation study by an independent energy service company (ESCO). Also, in cases where the local government does not have the capital for new equipment purchases, the CEC can provide a loan to that government which can then be repaid through the reduced utility expenditures. Since industry experience has found that, on average, actual energy savings are only 60 - 70% of engineering estimates, the CEC hired Pacific Science & Technology (PS&T) to perform end-use metering and analysis to evaluate the accuracy of the energy audit. The CEC is not only interested in evaluating the total energy savings, but also improving the accuracy of future energy audits as well. To this end, Pacific Science & Technology is reviewing and evaluating all of the basic assumptions made by the auditor such as equipment power draws, operating schedules, fixture counts, etc. These basic assumptions are common building blocks used in energy use analysis. So, the goal of this project is to improve the audit assumptions and thereby improve the accuracy of future energy audits and EEM assessments.

  10. Assumptions and ambiguities in nonplanar acoustic soliton theory

    SciTech Connect (OSTI)

    Verheest, Frank [Sterrenkundig Observatorium, Universiteit Gent, Krijgslaan 281, B–9000 Gent (Belgium) [Sterrenkundig Observatorium, Universiteit Gent, Krijgslaan 281, B–9000 Gent (Belgium); School of Chemistry and Physics, University of KwaZulu-Natal, Durban 4000 (South Africa); Hellberg, Manfred A. [School of Chemistry and Physics, University of KwaZulu-Natal, Durban 4000 (South Africa)] [School of Chemistry and Physics, University of KwaZulu-Natal, Durban 4000 (South Africa)

    2014-02-15T23:59:59.000Z

    There have been many recent theoretical investigations of the nonlinear evolution of electrostatic modes with cylindrical or spherical symmetry. Through a reductive perturbation analysis based on a quasiplanar stretching, a modified form of the Korteweg-de Vries or related equation is derived, containing an additional term which is linear in the electrostatic potential and singular at time t?=?0. Unfortunately, these analyses contain several restrictive assumptions and ambiguities which are normally neither properly explained nor discussed, and severely limit the applicability of the technique. Most glaring are the use of plane-wave stretchings, the assumption that shape-preserving cylindrical modes can exist and that, although time is homogeneous, the origin of time (which can be chosen arbitrarily) needs to be avoided. Hence, only in the domain where the nonlinear modes are quasiplanar, far from the axis of cylindrical or from the origin of spherical symmetry can acceptable but unexciting results be obtained. Nonplanar nonlinear modes are clearly an interesting topic of research, as some of these phenomena have been observed in experiments. However, it is argued that a proper study of such modes needs numerical simulations rather than ill-suited analytical approximations.

  11. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  12. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  13. Varying constants, Gravitation and Cosmology

    E-Print Network [OSTI]

    Jean-Philippe Uzan

    2010-09-28T23:59:59.000Z

    Fundamental constants are a cornerstone of our physical laws. Any constant varying in space and/or time would reflect the existence of an almost massless field that couples to matter. This will induce a violation of the universality of free fall. It is thus of utmost importance for our understanding of gravity and of the domain of validity of general relativity to test for their constancy. We thus detail the relations between the constants, the tests of the local position invariance and of the universality of free fall. We then review the main experimental and observational constraints that have been obtained from atomic clocks, the Oklo phenomenon, Solar system observations, meteorites dating, quasar absorption spectra, stellar physics, pulsar timing, the cosmic microwave background and big bang nucleosynthesis. At each step we describe the basics of each system, its dependence with respect to the constants, the known systematic effects and the most recent constraints that have been obtained. We then describe the main theoretical frameworks in which the low-energy constants may actually be varying and we focus on the unification mechanisms and the relations between the variation of different constants. To finish, we discuss the more speculative possibility of understanding their numerical values and the apparent fine-tuning that they confront us with.

  14. Cost and Performance Assumptions for Modeling Electricity Generation Technologies

    SciTech Connect (OSTI)

    Tidball, R.; Bluestein, J.; Rodriguez, N.; Knoke, S.

    2010-11-01T23:59:59.000Z

    The goal of this project was to compare and contrast utility scale power plant characteristics used in data sets that support energy market models. Characteristics include both technology cost and technology performance projections to the year 2050. Cost parameters include installed capital costs and operation and maintenance (O&M) costs. Performance parameters include plant size, heat rate, capacity factor or availability factor, and plant lifetime. Conventional, renewable, and emerging electricity generating technologies were considered. Six data sets, each associated with a different model, were selected. Two of the data sets represent modeled results, not direct model inputs. These two data sets include cost and performance improvements that result from increased deployment as well as resulting capacity factors estimated from particular model runs; other data sets represent model input data. For the technologies contained in each data set, the levelized cost of energy (LCOE) was also evaluated, according to published cost, performance, and fuel assumptions.

  15. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  16. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  17. Local Varying-Alpha Theories

    E-Print Network [OSTI]

    John D. Barrow; Joao Magueijo

    2015-01-30T23:59:59.000Z

    In a recent paper we demonstrated how the simplest model for varying alpha may be interpreted as the effect of a dielectric material, generalized to be consistent with Lorentz invariance. Unlike normal dielectrics, such a medium cannot change the speed of light, and its dynamics obey a Klein-Gordon equation. This work immediately suggests an extension of the standard theory, even if we require compliance with Lorentz invariance. Instead of a wave equation, the dynamics may satisfy a local algebraic relation involving the permittivity and the properties of the electromagnetic field, in analogy with more conventional dielectric (but still preserving Lorentz invariance). We develop the formalism for such theories and investigate some phenomenological implications. The problem of the divergence of the classical self-energy can be solved, or at least softened, in this framework. Some interesting new cosmological solutions for the very early universe are found, including the possibility of a bounce, inflation and expansion with a loitering phase, all of which are induced by early variations in alpha.

  18. Validity of conventional assumptions concerning flexible response. Research report

    SciTech Connect (OSTI)

    Gutierrez, M.J.

    1989-01-01T23:59:59.000Z

    The North Atlantic Treaty Organization is an alliance for collective defense. Made up of 16 countries, NATO has been a successful alliance because there has been no war in Europe since 1945. In 1967, NATO adopted the strategy of flexible response, a strategy dependent upon conventional, tactical nuclear, and strategic nuclear weapons to provide deterrence from a Warsaw Pact attack. Although successful, NATO is suffering from an erosion in conventional strength. NATO continues to make assumptions about its conventional capabilities to successfully meet the requirements of the flexible response strategy. In the present day world of NATO, there is limited funding, a fact that is not likely to change any time in the foreseeable future. Limited funding makes it impossible to buy all the conventional force structure needed to ideally support the current strategy, also a fact that is unlikely to change. This paper shows limitations in some of the ways NATO assumes it can conventionally perform its mission. It is the author's position that NATO should modernize its conventional thinking to make it more in line with the realities of the situation NATO finds itself in today.

  19. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  20. Assumptions and Strategies for Conducting Research with Learning Disabled Adolescents and Young Adults

    E-Print Network [OSTI]

    Meyen, Edward L.; Schiefelbusch, Richard L.; Deshler, Donald D.; Alley, Gordon R.; Moran, Mary Ross; Clark, Frances L.

    1980-01-01T23:59:59.000Z

    This paper details the assumptions about learning disabled adolescents and young adults as well as assumptions about conducting research with this population held by researchers at the Kansas Institute. Strategies developed ...

  1. The Power of a Few Large Blocks: A credible assumption with incredible efficiency

    E-Print Network [OSTI]

    Foster, Dean P.

    i.i.d. assumption about the error structure, the two-sample t-statistic for oil was significantThe Power of a Few Large Blocks: A credible assumption with incredible efficiency Dongyu Lin and Dean P. Foster Abstract The most powerful assumption in data analysis is that of independence. Unfortu

  2. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  3. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  4. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  5. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  6. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  7. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  8. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  9. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  10. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  11. Varying-Coefficient Functional Linear Regression Models

    E-Print Network [OSTI]

    Cardot, Hervé

    Varying-Coefficient Functional Linear Regression Models Herv´e Cardot1 and Pascal Sarda2 1, the ability of such non linear functional approaches to produce competitive estimations. Short title : Varying monograph. We propose here another generalization of the functional linear regression model in which

  12. Fractal analysis of time varying data

    DOE Patents [OSTI]

    Vo-Dinh, Tuan (Knoxville, TN); Sadana, Ajit (Oxford, MS)

    2002-01-01T23:59:59.000Z

    Characteristics of time varying data, such as an electrical signal, are analyzed by converting the data from a temporal domain into a spatial domain pattern. Fractal analysis is performed on the spatial domain pattern, thereby producing a fractal dimension D.sub.F. The fractal dimension indicates the regularity of the time varying data.

  13. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  14. Lifting Rationality Assumptions in Binary Aggregation Umberto Grandi and Ulle Endriss

    E-Print Network [OSTI]

    Endriss, Ulle

    Lifting Rationality Assumptions in Binary Aggregation Umberto Grandi and Ulle Endriss Institute aggregation procedure will lift the rationality assumptions from the in- dividual to the collective level, i an axiomatic characterisation of the class of aggregation proce- dures that will lift all rationality

  15. Arctic Ice Dynamics Joint Experiment (AIDJEX) assumptions revisited and found inadequate

    E-Print Network [OSTI]

    Sulsky, Deborah L.

    the Arctic Ice Dynamics Joint Experiment (AIDJEX) assumptions about pack ice behavior with an eye to modeling the behavior of pack ice. A model based on these assumptions is needed to represent the deformation and stress in pack ice on scales from 10 to 100 km, and would need to explicitly resolve discontinuities

  16. OIKOS 101: 499504, 2003 Do seedlings in gaps interact? A field test of assumptions in ESS

    E-Print Network [OSTI]

    Silvertown, Jonathan

    OIKOS 101: 499­504, 2003 Do seedlings in gaps interact? A field test of assumptions in ESS seed seedlings in gaps interact? A field test of assumptions in ESS seed size models. ­ Oikos 101: 499­504. ESS for the occupancy of `safe sites' or vegetation gaps. If mortality rates are high and/or frequency-independent, ESS

  17. Solar mass-varying neutrino oscillations

    E-Print Network [OSTI]

    Marfatia, Danny; Huber, P.; Barger, V.

    2005-11-18T23:59:59.000Z

    We propose that the solar neutrino deficit may be due to oscillations of mass-varying neutrinos (MaVaNs). This scenario elucidates solar neutrino data beautifully while remaining comfortably compatible with atmospheric ...

  18. Appropriate technology for planning hydroelectric power projects in Nepal: the need for assumption analysis

    SciTech Connect (OSTI)

    Chandler, C.G.

    1981-06-01T23:59:59.000Z

    The study focuses on the project development process for hydroelectric project planning in Nepal. Chapter I describes the contrast between the vast potential for hydroelectric power development in Nepal and the current energy shortage within the country, not only for electricity, but for firewood and other fuel sources as well. Chapter II explores some of the unknown factors facing hydropower project planners in Nepal, where data for hydrologic, geologic, environmental, and sociological project components are lacking. The chapter also examines institutional and fiscal factors which constrain the planning process. Chapter III describes the critical role of assumptions in the project development process, and details the stages that a project goes through as it is planned. The chapter introduces the concept of assumption analysis as a technique for project planning, listing the potential conflict between the assumptions of foreign consultants and the host-country users of project outputs as an ingredient in the project's success or failure. Chapter IV demonstrates the mechanics and usefulness of assumption analysis through an Assumption Analysis Chart, which shows the interaction among project objectives, project alternatives, project assumptions, and the project development process. Assumption analysis techniques are expected to be useful among bilateral and multilateral aid donors servicing less developed countries.

  19. Behavioral Assumptions Underlying California Residential Sector Energy Efficiency Programs (2009 CIEE Report)

    Broader source: Energy.gov [DOE]

    This paper examines the behavioral assumptions that underlie California’s residential sector energy efficiency programs and recommends improvements that will help to advance the state’s ambitious greenhouse gas reduction goals.

  20. WVU Regional Research Institute grad assistant wins national award for throwing assumptions out the window

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    WVU Regional Research Institute grad assistant wins national award for throwing assumptions out the window Silicon Valley conjures images of leading edge technology. Las Vegas makes one think of gambling

  1. Solar mass-varying neutrino oscillations

    E-Print Network [OSTI]

    V. Barger; Patrick Huber; Danny Marfatia

    2005-09-30T23:59:59.000Z

    We propose that the solar neutrino deficit may be due to oscillations of mass-varying neutrinos (MaVaNs). This scenario elucidates solar neutrino data beautifully while remaining comfortably compatible with atmospheric neutrino and K2K data and with reactor antineutrino data at short and long baselines (from CHOOZ and KamLAND). We find that the survival probability of solar MaVaNs is independent of how the suppression of neutrino mass caused by the acceleron-matter couplings varies with density. Measurements of MeV and lower energy solar neutrinos will provide a rigorous test of the idea.

  2. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  3. Pricing bivariate option under GARCH processes with time-varying copula

    E-Print Network [OSTI]

    Boyer, Edmond

    Pricing bivariate option under GARCH processes with time-varying copula J. Zhang a,b,c,, D. Gu Autoregressive Conditionally Heteroskedastic (GARCH) process. As the associa- tion between the underlying assets, the empirical work displays the advantages of the suggested method. Key words: call-on-max option, GARCH process

  4. Responding to environmental change: plastic responses1 vary little in a synchronous breeder.2

    E-Print Network [OSTI]

    Nussey, Dan

    The impact of environmental change on animal populations is strongly influenced by the10 ability. 2002).5 Determining how individuals base key life-history decisions on environmental cues is6 therefore1 Responding to environmental change: plastic responses1 vary little in a synchronous breeder.2 3

  5. Predicting software defects in varying development lifecycles

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    Predicting software defects in varying development lifecycles using Bayesian nets Information and Software Technology (2007) Norman Fenton, Martin Neil, William March, Peter HyeonJeong Kim KAIST SE LAB #12;Contents Introduction Overall approach Analyzing the lifecycle Modeling the defect prediction

  6. System Identification: Time Varying and Nonlinear Methods

    E-Print Network [OSTI]

    Majji, Manoranjan

    2010-07-14T23:59:59.000Z

    . In the process, we generalize the classical time invariant input output AutoRegressive model with an eXogenous input (ARX) models to the time varying case and realize an asymptotically stable observer as a byproduct of the calculations. It is further found...

  7. Security of differential phase shift quantum key distribution against individual attacks

    E-Print Network [OSTI]

    Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

    2005-08-16T23:59:59.000Z

    We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

  8. INTRODUCTION Maximal performance is a key measurement in linking the ecology,

    E-Print Network [OSTI]

    Azizi, Manny

    rely on the assumption that performance measured in the laboratory represents a true maximum. In few3947 INTRODUCTION Maximal performance is a key measurement in linking the ecology, fitness et al., 2006). Studies of mechanical power output during maximal jumps have revealed that many frog

  9. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  10. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  11. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  12. Sensitivity of Rooftop PV Projections in the SunShot Vision Study to Market Assumptions

    SciTech Connect (OSTI)

    Drury, E.; Denholm, P.; Margolis, R.

    2013-01-01T23:59:59.000Z

    The SunShot Vision Study explored the potential growth of solar markets if solar prices decreased by about 75% from 2010 to 2020. The SolarDS model was used to simulate rooftop PV demand for this study, based on several PV market assumptions--future electricity rates, customer access to financing, and others--in addition to the SunShot PV price projections. This paper finds that modeled PV demand is highly sensitive to several non-price market assumptions, particularly PV financing parameters.

  13. Blind Channel Estimation in OFDM Systems by Relying on the Gaussian Assumption of the Input

    E-Print Network [OSTI]

    Quadeer, Ahmed Abdul

    Blind Channel Estimation in OFDM Systems by Relying on the Gaussian Assumption of the Input T. Y methods rely on some form of training which reduces the useful data rate. Here instead we blindly estimate maxima of the ML objective function. One is the blind Genetic algorithm and the other is the semi-blind

  14. External review of the thermal energy storage (TES) cogeneration study assumptions. Final report

    SciTech Connect (OSTI)

    Lai, B.Y.; Poirier, R.N. [Chicago Bridge and Iron Technical Services Co., Plainfield, IL (United States)

    1996-08-01T23:59:59.000Z

    This report is to provide a detailed review of the basic assumptions made in the design, sizing, performance, and economic models used in the thermal energy storage (TES)/cogeneration feasibility studies conducted by Pacific Northwest Laboratory (PNL) staff. This report is the deliverable required under the contract.

  15. RETI Phase 1B Final Report Update NET SHORT RECALCULATION AND NEW PV ASSUMPTIONS

    E-Print Network [OSTI]

    RETI Phase 1B Final Report Update NET SHORT RECALCULATION AND NEW PV ASSUMPTIONS With Revisions distributed photovoltaic (PV) installations in the Report is unclear and perhaps misleading. At the direction-generation is required. The CEC forecast assumed that 1,082 GWh will be self-generated by consumers from new PV

  16. Human lightness perception is guided by simple assumptions about reflectance and lighting

    E-Print Network [OSTI]

    Murray, Richard

    Human lightness perception is guided by simple assumptions about reflectance and lighting Richard F 0009, Toronto, Ontario, Canada, M3J 1P3 ABSTRACT Lightness constancy is the remarkable ability of human successful approaches to understanding lightness perception that have developed along independent paths

  17. On the assumption of mutual independence of jitter realizations in P-TRNG stochastic models

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    On the assumption of mutual independence of jitter realizations in P-TRNG stochastic models Patrick at transistor level and on conversion of the noise to the clock jitter exploited at the generator level. Using this approach, we can estimate proportion of the jitter coming only from the thermal noise, which is included

  18. An Assumption for the Development of Bootstrap Variants of the Akaike Information Criterion in Mixed Models

    E-Print Network [OSTI]

    Shang, Junfeng

    in Mixed Models Junfeng Shang 1, and Joseph E. Cavanaugh 2, 1 Bowling Green State University, USA 2 of Mathematics and Statistics, 450 Math Science Building, Bowling Green State University, Bowling Green, OH 43403 The University of Iowa, USA Abstract: This note provides a proof of a fundamental assumption in the verification

  19. On the Limitations of Universally Composable Two Party Computation Without Setup Assumptions #

    E-Print Network [OSTI]

    Lindell, Yehuda

    for essentially any cryptographic task in the plain model (i.e., with no setup assumptions beyond regarding the existence of universally composable protocols in the plain model without honest majority of universally composable two­party function evaluation in the plain model. Our results show that in this setting

  20. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

    2008-01-01T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  1. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

    2008-12-10T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  2. Time varying arctic climate change amplification

    SciTech Connect (OSTI)

    Chylek, Petr [Los Alamos National Laboratory; Dubey, Manvendra K [Los Alamos National Laboratory; Lesins, Glen [DALLHOUSIE U; Wang, Muyin [NOAA/JISAO

    2009-01-01T23:59:59.000Z

    During the past 130 years the global mean surface air temperature has risen by about 0.75 K. Due to feedbacks -- including the snow/ice albedo feedback -- the warming in the Arctic is expected to proceed at a faster rate than the global average. Climate model simulations suggest that this Arctic amplification produces warming that is two to three times larger than the global mean. Understanding the Arctic amplification is essential for projections of future Arctic climate including sea ice extent and melting of the Greenland ice sheet. We use the temperature records from the Arctic stations to show that (a) the Arctic amplification is larger at latitudes above 700 N compared to those within 64-70oN belt, and that, surprisingly; (b) the ratio of the Arctic to global rate of temperature change is not constant but varies on the decadal timescale. This time dependence will affect future projections of climate changes in the Arctic.

  3. Time varying, multivariate volume data reduction

    SciTech Connect (OSTI)

    Ahrens, James P [Los Alamos National Laboratory; Fout, Nathaniel [UC DAVIS; Ma, Kwan - Liu [UC DAVIS

    2010-01-01T23:59:59.000Z

    Large-scale supercomputing is revolutionizing the way science is conducted. A growing challenge, however, is understanding the massive quantities of data produced by large-scale simulations. The data, typically time-varying, multivariate, and volumetric, can occupy from hundreds of gigabytes to several terabytes of storage space. Transferring and processing volume data of such sizes is prohibitively expensive and resource intensive. Although it may not be possible to entirely alleviate these problems, data compression should be considered as part of a viable solution, especially when the primary means of data analysis is volume rendering. In this paper we present our study of multivariate compression, which exploits correlations among related variables, for volume rendering. Two configurations for multidimensional compression based on vector quantization are examined. We emphasize quality reconstruction and interactive rendering, which leads us to a solution using graphics hardware to perform on-the-fly decompression during rendering. In this paper we present a solution which addresses the need for data reduction in large supercomputing environments where data resulting from simulations occupies tremendous amounts of storage. Our solution employs a lossy encoding scheme to acrueve data reduction with several options in terms of rate-distortion behavior. We focus on encoding of multiple variables together, with optional compression in space and time. The compressed volumes can be rendered directly with commodity graphics cards at interactive frame rates and rendering quality similar to that of static volume renderers. Compression results using a multivariate time-varying data set indicate that encoding multiple variables results in acceptable performance in the case of spatial and temporal encoding as compared to independent compression of variables. The relative performance of spatial vs. temporal compression is data dependent, although temporal compression has the advantage of offering smooth animations, while spatial compression can handle volumes of larger dimensions.

  4. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  5. First determination of the quark mixing matrix element Vtb independent of assumptions of unitarity

    E-Print Network [OSTI]

    John Swain; Lucas Taylor

    1997-12-17T23:59:59.000Z

    We present a new method for the determination of the Cabibbo-Kobayashi-Maskawa quark mixing matrix element $|V_{tb}|$ from electroweak loop corrections, in particular those affecting the process $Z\\to b\\bar{b}$. From a combined analysis of results from the LEP, SLC, Tevatron, and neutrino scattering experiments we determine $|V_{tb}| = 0.77^{+0.18}_{-0.24}$. This is the first determination of $|V_{tb}|$ which is independent of unitarity assumptions.

  6. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  7. From calls to communities: a model for time varying social networks

    E-Print Network [OSTI]

    Laurent, Guillaume; Karsai, Márton

    2015-01-01T23:59:59.000Z

    Social interactions vary in time and appear to be driven by intrinsic mechanisms, which in turn shape the emerging structure of the social network. Large-scale empirical observations of social interaction structure have become possible only recently, and modelling their dynamics is an actual challenge. Here we propose a temporal network model which builds on the framework of activity-driven time-varying networks with memory. The model also integrates key mechanisms that drive the formation of social ties - social reinforcement, focal closure and cyclic closure, which have been shown to give rise to community structure and the global connectedness of the network. We compare the proposed model with a real-world time-varying network of mobile phone communication and show that they share several characteristics from heterogeneous degrees and weights to rich community structure. Further, the strong and weak ties that emerge from the model follow similar weight-topology correlations as real-world social networks, i...

  8. A REVIEW OF ASSUMPTIONS AND ANALYSIS IN EPRI EA-3409, "HOUSEHOLD APPLIANCE CHOICE: REVISION OF REEPS BEHAVIORAL MODELS"

    E-Print Network [OSTI]

    Wood, D.J.

    2010-01-01T23:59:59.000Z

    of Assumptions and Analysis in EPRI EA-3409, "Householdby the Electric Power Research Institute, Inc. ("EPRI").Neither EPRI, members of EPRI, nor Lawrence Berkeley

  9. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  10. The Response of Greek Key Proteins to Changes in Connectivity Depends on the Nature of Their Secondary Structure

    E-Print Network [OSTI]

    Kemplen, Katherine R.; De Sancho, David; Clarke, Jane

    2015-04-07T23:59:59.000Z

    What governs the balance between connectivity and topology in regulating the mechanism of protein folding? We use circular permutation to vary the order of the helices in the all-? Greek key protein FADD (Fas-associated death domain) to investigate...

  11. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  12. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  13. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  14. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  15. A component GARCH model with time varying weights

    E-Print Network [OSTI]

    Nesterov, Yurii

    2007/19 A component GARCH model with time varying weights Luc Bauwens and Giuseppe Storti #12;CORE DISCUSSION PAPER 2007/19 A component GARCH model with time varying weights Luc BAUWENS1 and Giuseppe STORTI2 March2007 Abstract We present a novel GARCH model that accounts for time varying, state dependent

  16. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  17. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  18. Washington International Renewable Energy Conference 2008 Pledges: Methodology and Assumptions Summary

    SciTech Connect (OSTI)

    Babiuch, B.; Bilello, D. E.; Cowlin, S. C.; Mann, M.; Wise, A.

    2008-08-01T23:59:59.000Z

    The 2008 Washington International Renewable Energy Conference (WIREC) was held in Washington, D.C., from March 4-6, 2008, and involved nearly 9,000 people from 125 countries. The event brought together worldwide leaders in renewable energy (RE) from governments, international organizations, nongovernmental organizations, and the private sector to discuss the role that renewables can play in alleviating poverty, growing economies, and passing on a healthy planet to future generations. The conference concluded with more than 140 governments, international organizations, and private-sector representatives pledging to advance the uptake of renewable energy. The U.S. government authorized the National Renewable Energy Laboratory (NREL) to estimate the carbon dioxide (CO2) savings that would result from the pledges made at the 2008 conference. This report describes the methodology and assumptions used by NREL in quantifying the potential CO2 reductions derived from those pledges.

  19. On the validity of the Poisson assumption in sampling nanometer-sized aerosols

    SciTech Connect (OSTI)

    Damit, Brian E [ORNL] [ORNL; Wu, Dr. Chang-Yu [University of Florida, Gainesville] [University of Florida, Gainesville; Cheng, Mengdawn [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    A Poisson process is traditionally believed to apply to the sampling of aerosols. For a constant aerosol concentration, it is assumed that a Poisson process describes the fluctuation in the measured concentration because aerosols are stochastically distributed in space. Recent studies, however, have shown that sampling of micrometer-sized aerosols has non-Poissonian behavior with positive correlations. The validity of the Poisson assumption for nanometer-sized aerosols has not been examined and thus was tested in this study. Its validity was tested for four particle sizes - 10 nm, 25 nm, 50 nm and 100 nm - by sampling from indoor air with a DMA- CPC setup to obtain a time series of particle counts. Five metrics were calculated from the data: pair-correlation function (PCF), time-averaged PCF, coefficient of variation, probability of measuring a concentration at least 25% greater than average, and posterior distributions from Bayesian inference. To identify departures from Poissonian behavior, these metrics were also calculated for 1,000 computer-generated Poisson time series with the same mean as the experimental data. For nearly all comparisons, the experimental data fell within the range of 80% of the Poisson-simulation values. Essentially, the metrics for the experimental data were indistinguishable from a simulated Poisson process. The greater influence of Brownian motion for nanometer-sized aerosols may explain the Poissonian behavior observed for smaller aerosols. Although the Poisson assumption was found to be valid in this study, it must be carefully applied as the results here do not definitively prove applicability in all sampling situations.

  20. Technical considerations related to interim source-term assumptions for emergency planning and equipment qualification. [PWR; BWR

    SciTech Connect (OSTI)

    Niemczyk, S.J.; McDowell-Boyer, L.M.

    1982-09-01T23:59:59.000Z

    The source terms recommended in the current regulatory guidance for many considerations of light water reactor (LWR) accidents were developed a number of years ago when understandings of many of the phenomena pertinent to source term estimation were relatively primitive. The purpose of the work presented here was to develop more realistic source term assumptions which could be used for interim regulatory purposes for two specific considerations, namely, equipment qualification and emergency planning. The overall approach taken was to adopt assumptions and models previously proposed for various aspects of source term estimation and to modify those assumptions and models to reflect recently gained insights into, and data describing, the release and transport of radionuclides during and after LWR accidents. To obtain illustrative estimates of the magnitudes of the source terms, the results of previous calculations employing the adopted assumptions and models were utilized and were modified to account for the effects of the recent insights and data.

  1. Assessment of Gasification-Based Biorefining at Kraft Pulp and Paper Mills in the United States, Part A: Background and Assumptions

    SciTech Connect (OSTI)

    Larson, E. D.; Consonni, S.; Katofsky, R. E.; Iisa, K.; Frederick, W. J., Jr.

    2008-11-01T23:59:59.000Z

    Commercialization of black liquor and biomass gasification technologies is anticipated in the 2010-2015 time frame, and synthesis gas from gasifiers can be converted into liquid fuels using catalytic synthesis technologies that are already commercially established in the gas-to-liquids or coal-to-liquids industries. This set of two papers describes key results from a major assessment of the prospective energy, environmental, and financial performance of commercial gasification-based biorefineries integrated with kraft pulp and paper mills [1]. Seven detailed biorefinery designs were developed for a reference mill in the southeastern United States, together with the associated mass/energy balances, air emissions estimates, and capital investment requirements. The biorefineries provide chemical recovery services and co-produce process steam for the mill, some electricity, and one of three liquid fuels: a Fischer-Tropsch synthetic crude oil (which could be refined to vehicle fuels at an existing petroleum refinery), dimethyl ether (a diesel engine fuel or propane substitute), or an ethanol-rich mixed-alcohol product. This paper describes the key assumptions that underlie the biorefinery designs. Part B will present analytical results.

  2. Flexible Demand Management under Time-Varying Prices

    E-Print Network [OSTI]

    Liang, Yong

    2012-01-01T23:59:59.000Z

    Management   System Flexible   Appliances   Distributed  Flexible Demand Management under Time-Varying Prices by YongYing-Ju Chen Spring 2013 Flexible Demand Management under

  3. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  4. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  5. Characterized ideal LC circuit Charge, current and voltage vary sinusoidally

    E-Print Network [OSTI]

    Bertulani, Carlos A. - Department of Physics and Astronomy, Texas A&M University

    resistance to LC circuit Oscillations become damped Charge, current and voltage still vary sinusoidally Oscillations Draw phasors for voltages of R, C and L at same time t Orient VR, VL, & VC phasors relativeReview Characterized ideal LC circuit Charge, current and voltage vary sinusoidally Added

  6. On a Control Algorithm for Time-varying Processor Availability

    E-Print Network [OSTI]

    Gupta, Vijay

    On a Control Algorithm for Time-varying Processor Availability Vijay Gupta Department of Electrical control algorithm for the situation when the processor resource availability is time-varying. The basic the processing resources available at every time step. Thus, the system evolves as a discrete time hybrid system

  7. On the modeling of time-varying delays

    E-Print Network [OSTI]

    Shah, Chirag Laxmikant

    2004-09-30T23:59:59.000Z

    This thesis is an effort to develop generalized dynamic models for systems with time-varying time delays. Unlike the simple time-delay model characterized by a transportation lag in the case of a fixed time delay, time-varying delays exhibit quite...

  8. Zooplankton behavioral responses to solar UV radiation vary within and

    E-Print Network [OSTI]

    Williamson, Craig E.

    - and low-UV lake at varying times of day and cloud cover. In the high-UV lake, the cladoceran Daphnia, our understanding of effects of ultra- violet radiation (UVR) on aquatic ecosystems has increasedZooplankton behavioral responses to solar UV radiation vary within and among lakes DINA M. LEECH

  9. Time varying voltage combustion control and diagnostics sensor

    DOE Patents [OSTI]

    Chorpening, Benjamin T. (Morgantown, WV); Thornton, Jimmy D. (Morgantown, WV); Huckaby, E. David (Morgantown, WV); Fincham, William (Fairmont, WV)

    2011-04-19T23:59:59.000Z

    A time-varying voltage is applied to an electrode, or a pair of electrodes, of a sensor installed in a fuel nozzle disposed adjacent the combustion zone of a continuous combustion system, such as of the gas turbine engine type. The time-varying voltage induces a time-varying current in the flame which is measured and used to determine flame capacitance using AC electrical circuit analysis. Flame capacitance is used to accurately determine the position of the flame from the sensor and the fuel/air ratio. The fuel and/or air flow rate (s) is/are then adjusted to provide reduced flame instability problems such as flashback, combustion dynamics and lean blowout, as well as reduced emissions. The time-varying voltage may be an alternating voltage and the time-varying current may be an alternating current.

  10. Special relativity as the limit of an Aristotelian universal friction theory under Reye's assumption

    E-Print Network [OSTI]

    E. Minguzzi

    2014-11-28T23:59:59.000Z

    This work explores a classical mechanical theory under two further assumptions: (a) there is a universal dry friction force (Aristotelian mechanics), and (b) the variation of the mass of a body due to wear is proportional to the work done by the friction force on the body (Reye's hypothesis). It is shown that mass depends on velocity as in Special Relativity, and that the velocity is constant for a particular characteristic value. In the limit of vanishing friction the theory satisfies a relativity principle as bodies do not decelerate and, therefore, the absolute frame becomes unobservable. However, the limit theory is not Newtonian mechanics, with its Galilei group symmetry, but rather Special Relativity. This result suggests to regard Special Relativity as the limit of a theory presenting universal friction and exchange of mass-energy with a reservoir (vacuum). Thus, quite surprisingly, Special Relativity follows from the absolute space (ether) concept and could have been discovered following studies of Aristotelian mechanics and friction. We end the work confronting the full theory with observations. It predicts the Hubble law through tired light, and hence it is incompatible with supernova light curves unless both mechanisms of tired light (locally) and universe expansion (non-locally) are at work. It also nicely accounts for some challenging numerical coincidences involving phenomena under low acceleration.

  11. Estimating Alarm Thresholds for Process Monitoring Data under Different Assumptions about the Data Generating Mechanism

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Burr, Tom; Hamada, Michael S.; Howell, John; Skurikhin, Misha; Ticknor, Larry; Weaver, Brian

    2013-01-01T23:59:59.000Z

    Process monitoring (PM) for nuclear safeguards sometimes requires estimation of thresholds corresponding to small false alarm rates. Threshold estimation dates to the 1920s with the Shewhart control chart; however, because possible new roles for PM are being evaluated in nuclear safeguards, it is timely to consider modern model selection options in the context of threshold estimation. One of the possible new PM roles involves PM residuals, where a residual is defined as residual = data ? prediction. This paper reviews alarm threshold estimation, introduces model selection options, and considers a range of assumptions regarding the data-generating mechanism for PM residuals.more »Two PM examples from nuclear safeguards are included to motivate the need for alarm threshold estimation. The first example involves mixtures of probability distributions that arise in solution monitoring, which is a common type of PM. The second example involves periodic partial cleanout of in-process inventory, leading to challenging structure in the time series of PM residuals.« less

  12. A METHOD TO EXTRACT THE REDSHIFT DISTORTION {beta} PARAMETER IN CONFIGURATION SPACE FROM MINIMAL COSMOLOGICAL ASSUMPTIONS

    SciTech Connect (OSTI)

    Tocchini-Valentini, Domenico; Barnard, Michael; Bennett, Charles L.; Szalay, Alexander S., E-mail: dtv@pha.jhu.edu [Department of Physics and Astronomy, Johns Hopkins University, 3400 North Charles Street, Baltimore, MD 21218-2686 (United States)

    2012-10-01T23:59:59.000Z

    We present a method to extract the redshift-space distortion {beta} parameter in configuration space with a minimal set of cosmological assumptions. We show that a novel combination of the observed monopole and quadrupole correlation functions can remove efficiently the impact of mild nonlinearities and redshift errors. The method offers a series of convenient properties: it does not depend on the theoretical linear correlation function, the mean galaxy density is irrelevant, only convolutions are used, and there is no explicit dependence on linear bias. Analyses based on dark matter N-body simulations and Fisher matrix demonstrate that errors of a few percent on {beta} are possible with a full-sky, 1 (h {sup -1} Gpc){sup 3} survey centered at a redshift of unity and with negligible shot noise. We also find a baryonic feature in the normalized quadrupole in configuration space that should complicate the extraction of the growth parameter from the linear theory asymptote, but that does not have a major impact on our method.

  13. RESIK Solar X-ray flare element abundances on a non-isothermal assumption

    E-Print Network [OSTI]

    Sylwester, B; Sylwester, J; Kepa, A

    2015-01-01T23:59:59.000Z

    Solar X-ray spectra from the RESIK crystal spectrometer on the {\\em CORONAS-F} spacecraft (spectral range $3.3-6.1$~\\AA) are analyzed for thirty-three flares using a method to derive abundances of Si, S, Ar, and K, emission lines of which feature prominently in the spectra. For each spectrum, the method first optimizes element abundances then derives the differential emission measure as a function of temperature based on a procedure given by Sylwester et al. and Withbroe. This contrasts with our previous analyses of RESIK spectra in which an isothermal assumption was used. The revised abundances (on a logarithmic scale with $A({\\rm H}) = 12$) averaged for all the flares in the analysis are $A({\\rm Si}) = 7.53 \\pm 0.08$ (previously $7.89 \\pm 0.13$), $A({\\rm S}) = 6.91 \\pm 0.07$ ($7.16 \\pm 0.17$), $A({\\rm Ar}) = 6.47 \\pm 0.08$ ($6.45 \\pm 0.07$), and $A({\\rm K}) = 5.73 \\pm 0.19$ ($5.86 \\pm 0.20$), with little evidence for time variations of abundances within the evolution of each flare. Our previous estimates of...

  14. Sorghum Development and Key Growth Stages Brent Bean and Carl Patrick, Extension Agronomist and Entomologist

    E-Print Network [OSTI]

    Mukhtar, Saqib

    Sorghum Development and Key Growth Stages Brent Bean and Carl Patrick, Extension Agronomist the length of the peduncle. ! Maximum water use occurs at this stage. Crop will respond vary favorably the fingers. ! Three-fourths of grain dry weight has accumulated. ! Water stress during grain fill may cause

  15. What are the Starting Points? Evaluating Base-Year Assumptions in the Asian Modeling Exercise

    SciTech Connect (OSTI)

    Chaturvedi, Vaibhav; Waldhoff, Stephanie; Clarke, Leon E.; Fujimori, Shinichiro

    2012-12-01T23:59:59.000Z

    A common feature of model inter-comparison efforts is that the base year numbers for important parameters such as population and GDP can differ substantially across models. This paper explores the sources and implications of this variation in Asian countries across the models participating in the Asian Modeling Exercise (AME). Because the models do not all have a common base year, each team was required to provide data for 2005 for comparison purposes. This paper compares the year 2005 information for different models, noting the degree of variation in important parameters, including population, GDP, primary energy, electricity, and CO2 emissions. It then explores the difference in these key parameters across different sources of base-year information. The analysis confirms that the sources provide different values for many key parameters. This variation across data sources and additional reasons why models might provide different base-year numbers, including differences in regional definitions, differences in model base year, and differences in GDP transformation methodologies, are then discussed in the context of the AME scenarios. Finally, the paper explores the implications of base-year variation on long-term model results.

  16. Nonparametric estimation of varying coefficient dynamic panel models

    E-Print Network [OSTI]

    Cai, Zongwu; Li, Qi

    2008-10-01T23:59:59.000Z

    #1; z% , s1t~Vi1,Vit ! #1; E$ei1eit 6Vi1,Vit % , and G1t ~Zi1,Zit ! #1; E$Wi1Wit' s1t ~Vi1,Vit !6Zi1,Zit %#1; E$Wi1Wit' ei1 eit 6Zi1,Zit %+ Then, it is obvious that V1 #1; G1~z, z! and s 2~v! #1; s11~v,v!+ Set S #1; S~z!#1; #2; V 0 0 V#1; m2~K ! #3... results stated here with their proofs relegated to the Appendix+ PROPOSITION 1+ Under Assumptions A1–A5, we have (i) ESn #1; f ~z!S$1#2; op~1!%, (ii) Bn #1; ~h 202! f ~z!B~z! #2; op~h 2! , and (iii) Rn #1; op~h 2! . PROPOSITION 2+ (i) Under Assumptions A1...

  17. Technical assumption for Mo-99 production in the MARIA reactor. Feasibility study

    SciTech Connect (OSTI)

    Jaroszewicz, J.; Pytel, K.; Dabkowski, L.; Krzysztoszek, G. [Institute of Atomic Energy, 05-400 Otwock-Swierk (Poland)

    2008-07-15T23:59:59.000Z

    The main objective of U-235 irradiation is to obtain the Tc-99m isotope which is widely used in the domain of medical diagnostics. The decisive factor determining its availability, despite its short life time, is a reaction of radioactive decay of Mo-99 into Tc- 99m. One of the possible sources of molybdenum can be achieved in course of the U-235 fission reaction. The paper presents activities and the calculations results obtained upon the feasibility study on irradiation of U-235 targets for production of molybdenum in the MARIA reactor. The activities including technical assumption were focused on performing calculation for modelling of the target and irradiation device as well as adequate equipment and tools for processing in reactor. It has been assumed that the basic component of fuel charge is an aluminium cladded plate with dimensions of 40x230x1.45 containing 4.7 g U-235. The presumed mode of the heat removal generated in the fuel charge of the reactor primary cooling circuit influences the construction of installation to be used for irradiation and the technological instrumentation. The outer channel construction for irradiation has to be identical as the standard fuel channel construction of the MARIA reactor. It enables to use the existing slab and reactor mounting sockets for the fastening of the molybdenum channel as well as the cooling water delivery system. The measurement of water temperature cooling a fuel charge and control of water flow rate in the channel can also be carried out be means of the standard instrumentation of the reactor. (author)

  18. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  19. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  20. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  1. antigen expression varies: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ikeda; Kazuo Katoh; Hiroyuki Koshimoto; Yoshihiro Yoshihara; Kensaku Mori 1993-01-01 10 NANO EXPRESS Open Access AuPd core-shell nanoparticles with varied hollow Energy Storage,...

  2. Fractal geometry predicts varying body size scaling relationships

    E-Print Network [OSTI]

    Minnesota, University of

    .............................................................. Fractal geometry predicts varying scaling based on fractal resource distributions, in which resource encounter rates are a function of body that are multiples of 1/4, which have been recently explained from the fractal branching architecture of organisms4

  3. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  4. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  5. READ AND SIGN THE PARTIAL ASSUMPTION OF RISK ON REVERSE Risk Management 12/2012 Risk Management

    E-Print Network [OSTI]

    Oregon, University of

    READ AND SIGN THE PARTIAL ASSUMPTION OF RISK ON REVERSE Risk Management 12/2012 Risk Management Conditions of Volunteer Service Please send completed form to the Office of Risk Management: riskmanagement ___________________________________________ (name/title of department supervisor) and the Office of Risk Management, (541) 346-8316, within 24 hours

  6. Influence of assumptions about household waste composition in waste management LCAs

    SciTech Connect (OSTI)

    Slagstad, Helene, E-mail: helene.slagstad@ntnu.no [Department of Hydraulic and Environmental Engineering, Norwegian University of Science and Technology, N-7491 Trondheim (Norway); Brattebo, Helge [Department of Hydraulic and Environmental Engineering, Norwegian University of Science and Technology, N-7491 Trondheim (Norway)

    2013-01-15T23:59:59.000Z

    Highlights: Black-Right-Pointing-Pointer Uncertainty in waste composition of household waste. Black-Right-Pointing-Pointer Systematically changed waste composition in a constructed waste management system. Black-Right-Pointing-Pointer Waste composition important for the results of accounting LCA. Black-Right-Pointing-Pointer Robust results for comparative LCA. - Abstract: This article takes a detailed look at an uncertainty factor in waste management LCA that has not been widely discussed previously, namely the uncertainty in waste composition. Waste composition is influenced by many factors; it can vary from year to year, seasonally, and with location, for example. The data publicly available at a municipal level can be highly aggregated and sometimes incomplete, and performing composition analysis is technically challenging. Uncertainty is therefore always present in waste composition. This article performs uncertainty analysis on a systematically modified waste composition using a constructed waste management system. In addition the environmental impacts of several waste management strategies are compared when applied to five different cities. We thus discuss the effect of uncertainty in both accounting LCA and comparative LCA. We found the waste composition to be important for the total environmental impact of the system, especially for the global warming, nutrient enrichment and human toxicity via water impact categories.

  7. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  8. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  9. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  10. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  11. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  12. Photon propagation in slowly varying inhomogeneous electromagnetic fields

    E-Print Network [OSTI]

    Felix Karbstein; Rashid Shaisultanov

    2015-04-23T23:59:59.000Z

    Starting from the Heisenberg-Euler effective Lagrangian, we determine the photon current and photon polarization tensor in inhomogeneous, slowly varying electromagnetic fields. To this end, we consider background field configurations varying in both space and time, paying special attention to the tensor structure. As a main result, we obtain compact analytical expressions for the photon polarization tensor in realistic Gaussian laser pulses, as generated in the focal spots of high-intensity lasers. These expressions are of utmost importance for the investigation of quantum vacuum nonlinearities in realistic high-intensity laser experiments.

  13. Photon propagation in slowly varying inhomogeneous electromagnetic fields

    E-Print Network [OSTI]

    Karbstein, Felix

    2015-01-01T23:59:59.000Z

    Starting from the Heisenberg-Euler effective Lagrangian, we determine the photon current and photon polarization tensor in inhomogeneous, slowly varying electromagnetic fields. To this end, we consider background field configurations varying in both space and time, paying special attention to the tensor structure. As a main result, we obtain compact analytical expressions for the photon polarization tensor in realistic Gaussian laser pulses, as generated in the focal spots of high-intensity lasers. These expressions are of utmost importance for the investigation of quantum vacuum nonlinearities in realistic high-intensity laser experiments.

  14. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  15. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  16. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  17. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  18. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  19. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  20. Security bound of two-basis quantum-key-distribution protocols using qudits

    SciTech Connect (OSTI)

    Nikolopoulos, Georgios M.; Alber, Gernot [Institut fuer Angewandte Physik, Technische Universitaet Darmstadt, 64289 Darmstadt (Germany)

    2005-09-15T23:59:59.000Z

    We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.

  1. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  2. BLIND ITERATIVE RESTORATION OF IMAGES WITH SPATIALLY-VARYING BLUR

    E-Print Network [OSTI]

    Bardsley, John

    BLIND ITERATIVE RESTORATION OF IMAGES WITH SPATIALLY-VARYING BLUR John Bardsley Stuart Jefferies (PSF) by using a combination of methods including sectioning and phase diversity blind deconvolution whose PSFs are correlated and approximately spatially-invariant, and apply iterative blind deconvolution

  3. Mutual information in time-varying biochemical systems

    E-Print Network [OSTI]

    Filipe Tostevin; Pieter Rein ten Wolde

    2010-06-16T23:59:59.000Z

    Cells must continuously sense and respond to time-varying environmental stimuli. These signals are transmitted and processed by biochemical signalling networks. However, the biochemical reactions making up these networks are intrinsically noisy, which limits the reliability of intracellular signalling. Here we use information theory to characterise the reliability of transmission of time-varying signals through elementary biochemical reactions in the presence of noise. We calculate the mutual information for both instantaneous measurements and trajectories of biochemical systems for a Gaussian model. Our results indicate that the same network can have radically different characteristics for the transmission of instantaneous signals and trajectories. For trajectories, the ability of a network to respond to changes in the input signal is determined by the timing of reaction events, and is independent of the correlation time of the output of the network. We also study how reliably signals on different time-scales can be transmitted by considering the frequency-dependent coherence and gain-to-noise ratio. We find that a detector that does not consume the ligand molecule upon detection can more reliably transmit slowly varying signals, while an absorbing detector can more reliably transmit rapidly varying signals. Furthermore, we find that while one reaction may more reliably transmit information than another when considered in isolation, when placed within a signalling cascade the relative performance of the two reactions can be reversed. This means that optimising signal transmission at a single level of a signalling cascade can reduce signalling performance for the cascade as a whole.

  4. Image-Based Reconstruction of Spatially Varying Materials

    E-Print Network [OSTI]

    Goesele, Michael

    Image-Based Reconstruction of Spatially Varying Materials Hendrik P. A. Lensch1 Jan Kautz1 Michael material properties is an important step towards photorealistic rendering. Many real-world objects are composed of a number of materials that often show subtle changes even within a single material. Thus

  5. The CHUVA Project how does convection vary across the Brazil?

    E-Print Network [OSTI]

    Chaboureau, Jean-Pierre

    1 The CHUVA Project ­ how does convection vary across the Brazil? Luiz A. T. Machado1 , Maria A. F de Previsão de Tempo e Estudos Climáticos (CPTEC), Brazil. 2. Universidade de São Paulo. Instituto de Astronomia, Geofísica e Ciências Atmosféricas, Brazil. 3. Departamento de Ciências e Tecnologia Espacial

  6. Time-Varying Fine-Structure Constant Requires Cosmological Constant

    E-Print Network [OSTI]

    R. W. Kuhne

    1999-08-31T23:59:59.000Z

    Webb et al. presented preliminary evidence for a time-varying fine-structure constant. We show Teller's formula for this variation to be ruled out within the Einstein-de Sitter universe, however, it is compatible with cosmologies which require a large cosmological constant.

  7. On a Control Algorithm for Time-varying Processor Availability

    E-Print Network [OSTI]

    Gupta, Vijay

    1 On a Control Algorithm for Time-varying Processor Availability V. Gupta Member, IEEE and F. Luo Abstract-- We propose an anytime algorithm for control when the processor resource availability is limited vector sequentially to maximally utilize the processing resources available at every time step

  8. Predicting Software Defects in Varying Development Lifecycles using Bayesian Nets

    E-Print Network [OSTI]

    Fenton, Norman

    Predicting Software Defects in Varying Development Lifecycles using Bayesian Nets Norman Fenton, this has required a custom- built BN for each software development lifecycle. We describe a more general BN software development lifecycle ­ to reflect both the differing number of testing stages in the lifecycle

  9. Time varying ISI model for nonlinear interference noise

    E-Print Network [OSTI]

    Dar, Ronen; Mecozzi, Antonio; Shtaif, Mark

    2013-01-01T23:59:59.000Z

    We show that the effect of nonlinear interference in WDM systems is equivalent to slowly varying inter-symbol-interference (ISI), and hence its cancellation can be carried out by means of adaptive linear filtering. We characterize the ISI coefficients and discuss the potential gain following from their cancellation.

  10. ORIGINAL PAPER Effects of varying thinning regimes on carbon uptake,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , a shortage of water may also affect its productivity (Bergh et al. 1999, 2005). The water shortage implies to the increasing soil water deficit, without management. · Materials and methods A process-based ecosystem model with varying soil water availability under the changing climate. · Results and discussion We found

  11. False Vacuum in the Supersymmetric Mass Varying Neutrino Model

    SciTech Connect (OSTI)

    Tanimoto, Morimitsu [Department of Physics, Niigata University, Niigata 950-2181 (Japan)

    2009-04-17T23:59:59.000Z

    We discuss the vacuum structure of the scalar potential in a supersymmetric Mass Varying Neutrinos model. The observed dark energy density is identified with the false vacuum energy and the dark energy scale of order (10{sup -3} eV){sup 4} is understood by gravitationally suppressed supersymmetry breaking scale, F(TeV{sup 2})/M{sub pl}.

  12. Turbo Space-Time Codes with Time Varying Linear Transformations

    E-Print Network [OSTI]

    Haimovich, Alexander

    1 Turbo Space-Time Codes with Time Varying Linear Transformations Hangjun Chen and Alexander 07102 Email: {hangjun.chen; alexander.m.haimovich}@njit.edu Abstract Turbo space-time codes with symbols in this paper. It is shown that turbo codes with TVLT achieve full diversity gain and do not require exhaustive

  13. Chimera states in time-varying complex networks

    E-Print Network [OSTI]

    Arturo Buscarino; Mattia Frasca; Lucia Valentina Gambuzza; Philipp Hovel

    2014-12-22T23:59:59.000Z

    Chimera states have been recently found in a variety of different coupling schemes and geometries. In most cases, the underlying coupling structure is considered to be static, while many realistic systems display significant temporal changes in the pattern of connectivity. In this work, we investigate a time-varying network made of two coupled populations of Kuramoto oscillators, where the links between the two groups are considered to vary over time. As a main result, we find that the network may support stable, breathing and alternating chimera states. We also find that, when the rate of connectivity changes is fast, compared to the oscillator dynamics, the network may be described by a low-dimensional system of equations. Unlike in the static heterogeneous case, the onset of alternating chimera states is due to the presence of fluctuations, which may be induced either by the finite size of the network or by large switching times.

  14. Visual discrimination at varying distances in domestic goats

    E-Print Network [OSTI]

    Blakeman, Nancy Elizabeth

    1983-01-01T23:59:59.000Z

    VISUAL DISCRIMINATION AT VARYINS DISTANCES IN DOMESTIC BOATS A Theaia by NANCY ELIZABETH SLAKEMAN Submitted ta the Sraduate Cel lege ef Taxaa ACcH Univaraity in partial fulfil leant of the requireeents far the degree ef MASTER OF 'SCIENCE... ) J. W. Bassett (Member ) S. C. Bait (Head' o+ Dept-tment) December 1983 Visual Discrimination at Varying Distances in Domestic Boats (December 1983) Nancy Elizabeth Blakeman, B. S. ~ Texas A S N University Chairman of Advisory Coemittee. Dr...

  15. Method and apparatus of prefetching streams of varying prefetch depth

    DOE Patents [OSTI]

    Gara, Alan (Mount Kisco, NY); Ohmacht, Martin (Yorktown Heights, NY); Salapura, Valentina (Chappaqua, NY); Sugavanam, Krishnan (Mahopac, NY); Hoenicke, Dirk (Seebruck-Seeon, DE)

    2012-01-24T23:59:59.000Z

    Method and apparatus of prefetching streams of varying prefetch depth dynamically changes the depth of prefetching so that the number of multiple streams as well as the hit rate of a single stream are optimized. The method and apparatus in one aspect monitor a plurality of load requests from a processing unit for data in a prefetch buffer, determine an access pattern associated with the plurality of load requests and adjust a prefetch depth according to the access pattern.

  16. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  17. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  18. Terrestrial Planet Formation in Disks with Varying Surface Density Profiles

    E-Print Network [OSTI]

    Sean N. Raymond; Thomas Quinn; Jonathan I. Lunine

    2005-06-30T23:59:59.000Z

    The ``minimum-mass solar nebula'' (MMSN) model estimates the surface density distribution of the protoplanetary disk by assuming the planets to have formed in situ. However, significant radial migration of the giant planets likely occurred in the Solar system, implying a distortion in the values derived by the MMSN method. The true density profiles of protoplanetary disks is therefore uncertain. Here we present results of simulations of late-stage terrestrial accretion, each starting from a disk of planetary embryos. We assume a power-law surface density profile that varies with heliocentric distance r as r^-alpha, and vary alpha between 1/2 and 5/2 (alpha = 3/2 for the MMSN model). We find that for steeper profiles (higher values of alpha), the terrestrial planets (i) are more numerous, (ii) form more quickly, (iii) form closer to the star, (iv) are more massive, (v) have higher iron contents, and (vi) have lower water contents. However, the possibility of forming potentially habitable planets does not appear to vary strongly with alpha.

  19. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  20. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  1. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  2. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  3. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  4. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  5. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  6. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  7. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  8. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  9. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  10. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  11. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  12. Repetition of the shape of the ultrafast self-modulation of the optical absorption spectrum upon varying the energy of pulse of GaAs pumping

    SciTech Connect (OSTI)

    Ageeva, N. N.; Bronevoi, I. L., E-mail: bil@cplire.ru; Zabegaev, D. N.; Krivonosov, A. N. [Russian Academy of Sciences, Kotel'nikov Institute of Radio Engineering and Electronics (Russian Federation)

    2010-10-15T23:59:59.000Z

    Ultrafast self-modulation of the fundamental optical absorption emerges during intense picosecond optical pumping of GaAs and, according to the main assumption, reflects self-oscillations of depletion of electron populations in the conduction band. In this study, the quantitatively confirmed explanation of previously experimentally found cyclic repetition of the form of ultrafast self-modulation of the absorption spectrum upon varying the energy of the pumping pulse and fixed delay between pumping and probing (the measurement of absorption) is given. Repetition of the shape is explained by varying the phase of self-oscillations of the optical absorption. The explanation is based on the previously found experimentally dependence of the frequency of self-oscillations of absorption on the pumping energy. Therefore, this is also a new confirmation of the mentioned dependence (which satisfactorily coincides with a similar calculated dependence of the frequency of self-oscillations of depletion of populations).

  13. False Vacuum in the Supersymmetric Mass Varying Neutrinos Model

    E-Print Network [OSTI]

    Ryo Takahashi; Morimitsu Tanimoto

    2007-11-04T23:59:59.000Z

    We present detailed analyses of the vacuum structure of the scalar potential in a supersymmetric Mass Varying Neutrinos model. The observed dark energy density is identified with false vacuum energy and the dark energy scale of order $(10^{-3}eV)^4$ is understood by gravitationally suppressed supersymmetry breaking scale, $F({TeV})^2/M_{Pl}$, in the model. The vacuum expectation values of sneutrinos should be tiny in order that the model works. Some decay processes of superparticles into acceleron and sterile neutrino are also discussed in the model.

  14. False vacuum in the supersymmetric mass varying neutrinos model

    SciTech Connect (OSTI)

    Takahashi, Ryo; Tanimoto, Morimitsu [Graduate School of Science and Technology, Niigata University, 950-2181 Niigata (Japan); Department of Physics, Niigata University, 950-2181 Niigata (Japan)

    2008-02-15T23:59:59.000Z

    We present detailed analyses of the vacuum structure of the scalar potential in a supersymmetric mass varying neutrinos model. The observed dark energy density is identified with false vacuum energy and the dark energy scale of order (10{sup -3} eV){sup 4} is understood by the gravitationally suppressed supersymmetry breaking scale, F(TeV){sup 2}/M{sub Pl}, in the model. The vacuum expectation values of sneutrinos should be tiny in order that the model works. Some decay processes of superparticles into an acceleron and sterile neutrino are also discussed in the model.

  15. Aspects of Key Largo woodrat ecology

    E-Print Network [OSTI]

    McCleery, Robert Alan; Lopez, Roel R.

    2004-09-30T23:59:59.000Z

    or climax hammock habitat (DOI 1973, Brown 1978, Hersh 1978, Barbour and Humphrey 1982, Goodyear 1985, U. S. Fish and Wildlife Service [USFWS] 1999). These conclusions stemmed from observations of high densities of woodrat stick-nests within mature... hammock (Brown ____________ The format and style follow the Journal of Wildlife Management. 2 1978, Hersh 1978, Barbour and Humphrey 1982). Other studies have reported the KLWR will use hammock forests in varying degrees of succession (Goodyear...

  16. Varying vacuum energy of a self-interacting scalar field

    E-Print Network [OSTI]

    Kostya Trachenko

    2015-01-23T23:59:59.000Z

    Understanding mechanisms capable of altering the vacuum energy is currently of interest in field theories and cosmology. We consider an interacting field and show that the vacuum energy naturally takes any value between its maximum and zero because interaction affects the number of operating field modes, the assertion that involves no assumptions or postulates. The mechanism is similar to the recently discussed temperature evolution of collective modes in liquids. The cosmological implication concerns the evolution of field $\\phi$ during the inflation of the Universe. $\\phi$ starts with all field modes operating and maximal vacuum energy in the early inflation-dominated epoch. As a result of inflation, $\\phi$ undergoes a dynamic crossover and arrives in the state with one long-wavelength longitudinal mode and small positive vacuum energy predicted to be asymptotically decreasing to zero in the late epoch. Accordingly, we predict that the currently observed cosmological constant will decrease in the future. We comment on the possibility of a cyclic Universe in this picture.

  17. A Comparison of Two Gasoline and Two Diesel Cars with Varying...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A Comparison of Two Gasoline and Two Diesel Cars with Varying Emission Control Technologies A Comparison of Two Gasoline and Two Diesel Cars with Varying Emission Control...

  18. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  19. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  20. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  1. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  2. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  3. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  4. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  5. Summary Leaf area index (LAI) is a key biophysical vari-able in most process-based forest-ecosystem models. How-

    E-Print Network [OSTI]

    Minnesota, University of

    the Ad- vanced Very High Resolution Radiometer (AVHRR) satel- lite-borne sensor of surface greenness). Because of the strong influence of leaf area on rates of canopy gas ex- change and energy balance, efforts

  6. Systems and methods of varying charged particle beam spot size

    DOE Patents [OSTI]

    Chen, Yu-Jiuan

    2014-09-02T23:59:59.000Z

    Methods and devices enable shaping of a charged particle beam. A modified dielectric wall accelerator includes a high gradient lens section and a main section. The high gradient lens section can be dynamically adjusted to establish the desired electric fields to minimize undesirable transverse defocusing fields at the entrance to the dielectric wall accelerator. Once a baseline setting with desirable output beam characteristic is established, the output beam can be dynamically modified to vary the output beam characteristics. The output beam can be modified by slightly adjusting the electric fields established across different sections of the modified dielectric wall accelerator. Additional control over the shape of the output beam can be excreted by introducing intentional timing de-synchronization offsets and producing an injected beam that is not fully matched to the entrance of the modified dielectric accelerator.

  7. Local non-Gaussianity from rapidly varying sound speeds

    SciTech Connect (OSTI)

    Emery, Jon; Tasinato, Gianmassimo; Wands, David, E-mail: jon.emery@port.ac.uk, E-mail: gianmassimo.tasinato@port.ac.uk, E-mail: david.wands@port.ac.uk [Institute of Cosmology and Gravitation, University of Portsmouth, Dennis Sciama Building, Portsmouth, PO1 3FX (United Kingdom)

    2012-08-01T23:59:59.000Z

    We study the effect of non-trivial sound speeds on local-type non-Gaussianity during multiple-field inflation. To this end, we consider a multiple-DBI model and use the ?N formalism to track the super-horizon evolution of perturbations. By adopting a sum separable Hubble parameter we derive analytic expressions for the relevant quantities in the two-field case, valid beyond slow variation. We find that non-trivial sound speeds can, in principle, curve the trajectory in such a way that significant local-type non-Gaussianity is produced. Deviations from slow variation, such as rapidly varying sound speeds, enhance this effect. To illustrate our results we consider two-field inflation in the tip regions of two warped throats and find large local-type non-Gaussianity produced towards the end of the inflationary process.

  8. $f(T)$ Theories and Varying Fine Structure Constant

    E-Print Network [OSTI]

    Wei, Hao; Qi, Hao-Yu

    2011-01-01T23:59:59.000Z

    In analogy to $f(R)$ theory, recently $f(T)$ theory has been proposed to drive the current accelerated expansion without invoking dark energy. In the literature, the observational constraints on $f(T)$ theories were obtained mainly by using the cosmological data, such as type Ia supernovae (SNIa), baryon acoustic oscillation (BAO), and cosmic microwave background radiation (CMB). In this work, we instead try to constrain $f(T)$ theories with the varying fine structure "constant", $\\alpha\\equiv e^2/\\hbar c$. We find that the constraints on $f(T)$ theories from the observational $\\Delta\\alpha/\\alpha$ data are very severe. In fact, they make $f(T)$ theories almost indistinguishable from $\\Lambda$CDM model.

  9. Scattering in a varying mass PT symmetric double heterojunction

    E-Print Network [OSTI]

    Anjana Sinha; R. Roychoudhury

    2013-06-10T23:59:59.000Z

    We observe that the reflection and transmission coefficients of a particle within a double, PT symmetric heterojunction with spatially varying mass, show interesting features, depending on the degree of non Hermiticity, although there is no spontaneous breakdown of PT symmetry. The potential profile in the intermediate layer is considered such that it has a non vanishing imaginary part near the heterojunctions. Exact analytical solutions for the wave function are obtained, and the reflection and transmission coefficients are plotted as a function of energy, for both left as well as right incidence. As expected, the spatial dependence on mass changes the nature of the scattering solutions within the heterojunctions, and the space-time (PT) symmetry is responsible for the left-right asymmetry in the reflection and transmission coefficients. However, the non vanishing imaginary component of the potential near the heterojunctions gives new and interesting results.

  10. Neutron Stars in a Varying Speed of Light Theory

    E-Print Network [OSTI]

    A. W. Whinnett

    2003-05-21T23:59:59.000Z

    We study neutron stars in a varying speed of light (VSL) theory of gravity in which the local speed of light depends upon the value of a scalar field $\\phi$. We find that the masses and radii of the stars are strongly dependent on the strength of the coupling between $\\phi$ and the matter field and that for certain choices of coupling parameters, the maximum neutron star mass can be arbitrarily small. We also discuss the phenomenon of cosmological evolution of VSL stars (analogous to the gravitational evolution in scalar-tensor theories) and we derive a relation showing how the fractional change in the energy of a star is related to the change in the cosmological value of the scalar field.

  11. Spall behavior of cast iron with varying microstructures

    SciTech Connect (OSTI)

    Plume, Gifford; Rousseau, Carl-Ernst, E-mail: rousseau@uri.edu [Mechanical Engineering, University of Rhode Island, 92 Upper College Rd., Kingston, Rhode Island 02881 (United States)

    2014-07-21T23:59:59.000Z

    The spall strength of cast iron with varying microstructures has been investigated using plate impact at moderate speed. Stress history measurements were made with manganin stress gauges embedded between the back face of the specimen and a low impedance polycarbonate backing. Five separate cast irons were tested. Four of these consisted of gray cast iron with graphite in flake form, with three classified as Type VII A2 and the fourth containing a bimodal distribution of Types VII A4 and VII D8. The fifth casting consisted of ductile cast iron with graphite in nodular form, classified as Type I, size class 5. The spall strength for the Type VII A2 gray cast irons varied between 40 and 370?MPa, and that of the additional gray cast iron, between 410 and 490?MPa. The spall strength of the ductile cast iron fell within the range of 0.94–1.2?GPa. It is shown that the spall strength is linked to the damage level at the spall plane, where an increased level of tensile stress is required to generate higher levels of damage. Post mortem analysis was performed on the recovered samples, revealing the graphite phase to be the primary factor governing the spall fracture of cast irons, where crack nucleation is directly correlated to the debonding of graphite from the metal matrix. The average length of graphite found within a casting is linked to the material's strength, where strength increases as a function of decreasing length. The morphology and mean free path of graphite precipitates further govern the subsequent coalescence of initiated cracks to form a complete fracture plane. In cases where graphite spacing is large, increased energy level is required to complete the fracture process. A secondary factor governing the spall fracture of cast irons has also been linked to the microstructure of the metal matrix, with pearlite yielding higher spall strengths than free ferrite.

  12. Mixed lipid bilayers with locally varying spontaneous curvature and bending

    E-Print Network [OSTI]

    Guillaume Gueguen; Nicolas Destainville; Manoel Manghi

    2014-08-27T23:59:59.000Z

    A model of lipid bilayers made of a mixture of two lipids with different average compositions on both leaflets, is developed. A Landau hamiltonian describing the lipid-lipid interactions on each leaflet, with two lipidic fields $\\psi_1$ and $\\psi_2$, is coupled to a Helfrich one, accounting for the membrane elasticity, via both a local spontaneous curvature, which varies as $C_0+C_1(\\psi_1-\\psi_2)/2$, and a bending modulus equal to $\\kappa_0+\\kappa_1(\\psi_1+\\psi_2)/2$. This model allows us to define curved patches as membrane domains where the asymmetry in composition, $\\psi_1-\\psi_2$, is large, and thick and stiff patches where $\\psi_1+\\psi_2$ is large. These thick patches are good candidates for being lipidic rafts, as observed in cell membranes, which are composed primarily of saturated lipids forming a liquid-ordered domain and are known to be thick and flat nano-domains. The lipid-lipid structure factors and correlation functions are computed for globally spherical membranes and planar ones. Phase diagrams are established, within a Gaussian approximation, showing the occurrence of two types of Structure Disordered phases, with correlations between either curved or thick patches, and an Ordered phase, corresponding to the divergence of the structure factor at a finite wave vector. The varying bending modulus plays a central role for curved membranes, where the driving force $\\kappa_1C_0^2$ is balanced by the line tension, to form raft domains of size ranging from 10 to 100~nm. For planar membranes, raft domains emerge via the cross-correlation with curved domains. A global picture emerges from curvature-induced mechanisms, described in the literature for planar membranes, to coupled curvature- and bending-induced mechanisms in curved membranes forming a closed vesicle.

  13. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  14. Sensitivity of Utility-Scale Solar Deployment Projections in the SunShot Vision Study to Market and Performance Assumptions

    SciTech Connect (OSTI)

    Eurek, K.; Denholm, P.; Margolis, R.; Mowers, M.

    2013-04-01T23:59:59.000Z

    The SunShot Vision Study explored the potential growth of solar markets if solar prices decreased by about 75% from 2010 to 2020. The ReEDS model was used to simulate utility PV and CSP deployment for this present study, based on several market and performance assumptions - electricity demand, natural gas prices, coal retirements, cost and performance of non-solar renewable technologies, PV resource variability, distributed PV deployment, and solar market supply growth - in addition to the SunShot solar price projections. This study finds that utility-scale solar deployment is highly sensitive to solar prices. Other factors can have significant impacts, particularly electricity demand and natural gas prices.

  15. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  16. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  17. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  18. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  19. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  20. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  1. Eavesdropper's Optimal Information in Variations of Bennett-Brassard 1984 Quantum Key Distribution in the Coherent Attacks

    E-Print Network [OSTI]

    W. Y. Hwang; D. Ahn; S. W. Hwang

    2001-02-03T23:59:59.000Z

    We calculate eavesdropper's optimal information on raw bits in Bennett-Brassard 1984 quantum key distribution (BB84 QKD) and six-state scheme in coherent attacks, using a formula by Lo and Chau [Science 283 (1999) 2050] with single photon assumption. We find that eavesdropper's optimal information in QKD without public announcement of bases [Phys. Lett. A 244 (1998) 489] is the same as that of a corresponding QKD WITH it in the coherent attack. We observe a sum-rule concerning each party's information.

  2. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  3. Fractal dimensions of the galaxy distribution varying by steps?

    E-Print Network [OSTI]

    Marie-Noelle Celerier; Reuben Thieberger

    2005-04-20T23:59:59.000Z

    The structure of the large scale distribution of the galaxies have been widely studied since the publication of the first catalogs. Since large redshift samples are available, their analyses seem to show fractal correlations up to the observational limits. The value of the fractal dimension(s) calculated by different authors have become the object of a large debate, as have been the value of the expected transition from fractality to a possible large scale homogeneity. Moreover, some authors have proposed that different scaling regimes might be discerned at different lenght scales. To go further on into this issue, we have applied the correlation integral method to the wider sample currently available. We therefore obtain a fractal dimension of the galaxy distribution which seems to vary by steps whose width might be related to the organization hierarchy observed for the galaxies. This result could explain some of the previous results obtained by other authors from the analyses of less complete catalogs and maybe reconcile their apparent discrepancy. However, the method applied here needs to be further checked, since it produces odd fluctuations at each transition scale, which need to be thoroughly explained.

  4. Observational constraints on holographic dark energy with varying gravitational constant

    SciTech Connect (OSTI)

    Lu, Jianbo; Xu, Lixin [Institute of Theoretical Physics, School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian, 116024 (China); Saridakis, Emmanuel N. [College of Mathematics and Physics, Chongqing University of Posts and Telecommunications, Chongqing, 400065 (China); Setare, M.R., E-mail: lvjianbo819@163.com, E-mail: msaridak@phys.uoa.gr, E-mail: rezakord@ipm.ir, E-mail: lxxu@dlut.edu.cn [Department of Science of Bijar, University of Kurdistan, Bijar (Iran, Islamic Republic of)

    2010-03-01T23:59:59.000Z

    We use observational data from Type Ia Supernovae (SN), Baryon Acoustic Oscillations (BAO), Cosmic Microwave Background (CMB) and observational Hubble data (OHD), and the Markov Chain Monte Carlo (MCMC) method, to constrain the cosmological scenario of holographic dark energy with varying gravitational constant. We consider both flat and non-flat background geometry, and we present the corresponding constraints and contour-plots of the model parameters. We conclude that the scenario is compatible with observations. In 1? we find ?{sub ?0} = 0.72{sup +0.03}{sub ?0.03}, ?{sub k0} = ?0.0013{sup +0.0130}{sub ?0.0040}, c = 0.80{sup +0.19}{sub ?0.14} and ?{sub G}?G'/G = ?0.0025{sup +0.0080}{sub ?0.0050}, while for the present value of the dark energy equation-of-state parameter we obtain w{sub 0} = ?1.04{sup +0.15}{sub ?0.20}.

  5. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  6. Complete Chaotic Mixing in an Electro-osmotic Flow by Destabilization of Key Periodic Pathlines

    E-Print Network [OSTI]

    R. Chabreyrie; C. Chandre; P. Singh; N. Aubry

    2011-02-07T23:59:59.000Z

    The ability to generate complete, or almost complete, chaotic mixing is of great interest in numerous applications, particularly for microfluidics. For this purpose, we propose a strategy that allows us to quickly target the parameter values at which complete mixing occurs. The technique is applied to a time periodic, two-dimensional electro-osmotic flow with spatially and temporally varying Helmoltz-Smoluchowski slip boundary conditions. The strategy consists of following the linear stability of some key periodic pathlines in parameter space (i.e., amplitude and frequency of the forcing), particularly through the bifurcation points at which such pathlines become unstable.

  7. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  8. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  9. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  10. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  11. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  12. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  13. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  14. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  15. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  16. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  17. A New Methodology for Frequency Domain Analysis of Wave Energy Converters with Periodically Varying Physical Parameters

    E-Print Network [OSTI]

    Victoria, University of

    A New Methodology for Frequency Domain Analysis of Wave Energy Converters with Periodically Varying Methodology for Frequency Domain Analysis of Wave Energy Converters with Periodically Varying Physical of Mechanical Engineering) ABSTRACT Within a wave energy converter's operational bandwidth, device operation

  18. A New Indirect Adaptive Control Scheme for Time-Varying Plants

    E-Print Network [OSTI]

    Ioannou, Petros

    A New Indirect Adaptive Control Scheme for Time-Varying Plants Absrmcr of the indirectadaptiveschemewhicharemoreappropriatefortime-varying plants that for successful estimation. the oyerall plant is notrestrictedto var?slowl)withtime. The new estimatorandcontrol

  19. The Effects of Varying Task Priorities on Language Production by Young and Older Adults

    E-Print Network [OSTI]

    Kemper, Susan; Schmalzried, RaLynn Cheri; Herman, Ruth; Mohankumar, Deepthi

    2011-02-01T23:59:59.000Z

    The present study compared how varying task priorities affected young and older adults' language production. Both young and older adults responded to monetary incentives to vary their performance when simultaneously talking ...

  20. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  1. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  2. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  3. The Role Of Modeling Assumptions And Policy Instruments in Evaluating The Global Implications Of U.S. Biofuel Policies

    SciTech Connect (OSTI)

    Oladosu, Gbadebo A [ORNL; Kline, Keith L [ORNL

    2010-01-01T23:59:59.000Z

    The primary objective of current U.S. biofuel law the Energy Independence and Security Act of 2007 (EISA) is to reduce dependence on imported oil, but the law also requires biofuels to meet carbon emission reduction thresholds relative to petroleum fuels. EISA created a renewable fuel standard with annual targets for U.S. biofuel use that climb gradually from 9 billion gallons per year in 2008 to 36 billion gallons (or about 136 billion liters) of biofuels per year by 2022. The most controversial aspects of the biofuel policy have centered on the global social and environmental implications of its potential land use effects. In particular, there is an ongoing debate about whether indirect land use change (ILUC) make biofuels a net source, rather sink, of carbon emissions. However, estimates of ILUC induced by biofuel production and use can only be inferred through modeling. This paper evaluates how model structure, underlying assumptions, and the representation of policy instruments influence the results of U.S. biofuel policy simulations. The analysis shows that differences in these factors can lead to divergent model estimates of land use and economic effects. Estimates of the net conversion of forests and grasslands induced by U.S. biofuel policy range from 0.09 ha/1000 gallons described in this paper to 0.73 ha/1000 gallons from early studies in the ILUC change debate. We note that several important factors governing LUC change remain to be examined. Challenges that must be addressed to improve global land use change modeling are highlighted.

  4. Residential applliance data, assumptions and methodology for end-use forecasting with EPRI-REEPS 2.1

    SciTech Connect (OSTI)

    Hwang, R.J,; Johnson, F.X.; Brown, R.E.; Hanford, J.W.; Kommey, J.G.

    1994-05-01T23:59:59.000Z

    This report details the data, assumptions and methodology for end-use forecasting of appliance energy use in the US residential sector. Our analysis uses the modeling framework provided by the Appliance Model in the Residential End-Use Energy Planning System (REEPS), which was developed by the Electric Power Research Institute. In this modeling framework, appliances include essentially all residential end-uses other than space conditioning end-uses. We have defined a distinct appliance model for each end-use based on a common modeling framework provided in the REEPS software. This report details our development of the following appliance models: refrigerator, freezer, dryer, water heater, clothes washer, dishwasher, lighting, cooking and miscellaneous. Taken together, appliances account for approximately 70% of electricity consumption and 30% of natural gas consumption in the US residential sector. Appliances are thus important to those residential sector policies or programs aimed at improving the efficiency of electricity and natural gas consumption. This report is primarily methodological in nature, taking the reader through the entire process of developing the baseline for residential appliance end-uses. Analysis steps documented in this report include: gathering technology and market data for each appliance end-use and specific technologies within those end-uses, developing cost data for the various technologies, and specifying decision models to forecast future purchase decisions by households. Our implementation of the REEPS 2.1 modeling framework draws on the extensive technology, cost and market data assembled by LBL for the purpose of analyzing federal energy conservation standards. The resulting residential appliance forecasting model offers a flexible and accurate tool for analyzing the effect of policies at the national level.

  5. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  6. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  7. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  8. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  9. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  10. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  11. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  12. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  13. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  14. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  15. A time varying GARCH (p, q) model and related statistical inference

    E-Print Network [OSTI]

    Bandyopadhyay, Antar

    A time varying GARCH (p, q) model and related statistical inference Technical Report No: ISINE Institute North-East Centre, Tezpur, Assam-784028 #12;A time varying GARCH (p, q) model and related varying GARCH (tvGARCH (p, q)) model and consider certain related inferential problems. A two-step local

  16. Multi-lane Vehicle-to-Vehicle Networks with Time-Varying Radio Ranges

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Multi-lane Vehicle-to-Vehicle Networks with Time-Varying Radio Ranges: Information Propagation propagation speed in multi-lane vehicle-to-vehicle networks such as roads or highways. We focus on the impact of time-varying radio ranges and of multiple lanes of vehicles, varying in speed and in density. We assess

  17. ASYMPTOTIC DISTRIBUTION OF ESTIMATES FOR A TIME-VARYING PARAMETER IN A HARMONIC MODEL

    E-Print Network [OSTI]

    Irizarry, Rafael A.

    ASYMPTOTIC DISTRIBUTION OF ESTIMATES FOR A TIME-VARYING PARAMETER IN A HARMONIC MODEL WITH MULTIPLE harmonic regression models are useful for cases where harmonic parameters appear to be time-varying. Least, harmonic regression, signal processing, sound analysis, time-varying parameters, weighted least squares

  18. Analysis of Sulfur And Selenium Assimilation in 'Astragalus' Plants With Varying Capacities to Accumulate Selenium

    SciTech Connect (OSTI)

    Sors, T.G.; Ellis, D.R.; Na, G.Nam.; Lahner, B.; Lee, S.; Leustek, T.; Pickering, I.J.; Salt, D.E.; /Purdue U. /Rutgers U., Piscataway /Saskatchewan U.

    2007-08-08T23:59:59.000Z

    Several Astragalus species have the ability to hyperaccumulate selenium (Se) when growing in their native habitat. Given that the biochemical properties of Se parallel those of sulfur (S), we examined the activity of key S assimilatory enzymes ATP sulfurylase (ATPS), APS reductase (APR), and serine acetyltransferase (SAT), as well as selenocysteine methyltransferase (SMT), in eight Astragalus species with varying abilities to accumulate Se. Se hyperaccumulation was found to positively correlate with shoot accumulation of S-methylcysteine (MeCys) and Se-methylselenocysteine (MeSeCys), in addition to the level of SMT enzymatic activity. However, no correlation was observed between Se hyperaccumulation and ATPS, APR, and SAT activities in shoot tissue. Transgenic Arabidopsis thaliana overexpressing both ATPS and APR had a significant enhancement of selenate reduction as a proportion of total Se, whereas SAT overexpression resulted in only a slight increase in selenate reduction to organic forms. In general, total Se accumulation in shoots was lower in the transgenic plants overexpressing ATPS, PaAPR, and SAT. Root growth was adversely affected by selenate treatment in both ATPS and SAT overexpressors and less so in the PaAPR transgenic plants. Such observations support our conclusions that ATPS and APR are major contributors of selenate reduction in planta. However, Se hyperaccumulation in Astragalus is not driven by an overall increase in the capacity of these enzymes, but rather by either an increased Se flux through the S assimilatory pathway, generated by the biosynthesis of the sink metabolites MeCys or MeSeCys, or through an as yet unidentified Se assimilation pathway.

  19. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  20. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  1. Large Engineering Systems Conference on Power Engineering, July 2004, Halifax Canada. IEEE 2004 1 Abstract--One important assumption in a model of an

    E-Print Network [OSTI]

    is with the Department of Electrical and Computer Engineering, University of Wisconsin, Madison, WI 53706 USA (e Abstract--One important assumption in a model of an electricity market is the format of bids and costs. Most literature on electricity markets uses piecewise linear or quadratic functions to represent costs

  2. 1 Jitter correction formulae; mmc 11 Oct 97 We start with the assumption that the V 2 reduction can be written

    E-Print Network [OSTI]

    1 Jitter correction formulae; mmc 11 Oct 97 We start with the assumption that the V 2 reduction can be written V 2 = exp \\Gammaoe 2 h ; where oe 2 h is the high­pass phase jitter, given by the frequency \\Gamma2 , C = 0:128. When jitter correction is applied, I have tended to use a conservative value C = 0

  3. 1 Jitter correction formulae; mmc 11 Oct 97 We start with the assumption that the V 2reduction can be written

    E-Print Network [OSTI]

    1 Jitter correction formulae; mmc 11 Oct 97 We start with the assumption that the V 2 jitter, given by the frequency- domain integral Z oe2h: for W (f) / f-2 , C = 0.128. When jitter correction is applied, I have tended to use a conservative

  4. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  5. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  6. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  7. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  8. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  9. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  10. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  11. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  12. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  13. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  14. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  15. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  16. A Comparison of Two Gasoline and Two Diesel Cars with Varying...

    Broader source: Energy.gov (indexed) [DOE]

    local lower for gasoline: local NO NO 2 2 , acidification, , acidification, eutrophication eutrophication F F Cancer risk: low, in general, but with varying Cancer risk:...

  17. The Distributional and Environmental Effects of Time-Varying Prices in Competitive Electricity Markets

    E-Print Network [OSTI]

    Holland, Stephen P.; MANSUR, ERIN T

    2005-01-01T23:59:59.000Z

    to rates that vary by time of use. The results are robust toresults with ?at rate variation by month and by time of use

  18. Xylose Monomer and Oligomer Yields for Uncatalyzed Hydrolysis of Sugarcane Bagasse Hemicellulose at Varying Solids Concentration

    E-Print Network [OSTI]

    California at Riverside, University of

    Xylose Monomer and Oligomer Yields for Uncatalyzed Hydrolysis of Sugarcane Bagasse Hemicellulose of varying sugarcane bagasse concentrations on xylose monomer and oligomer yields was experimentally measured

  19. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  20. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  1. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  2. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  3. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  4. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  5. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  6. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  7. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  8. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  9. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  10. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  11. 7-117 The claim of a heat pump designer regarding the COP of the heat pump is to be evaluated. Assumptions The heat pump operates steadily.

    E-Print Network [OSTI]

    Bahrami, Majid

    7-47 7-117 The claim of a heat pump designer regarding the COP of the heat pump is to be evaluated. Assumptions The heat pump operates steadily. HP Wnet,in QH QL TL TH Analysis The maximum heat pump coefficient of performance would occur if the heat pump were completely reversible, 5.7 K026K300 K300 COP maxHP, LH H TT

  12. Joint Carrier Frequency Offset and Fast Time-varying Channel Estimation for

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    environment. An L-path channel model with known path delays is considered to jointly estimate the multi1 Joint Carrier Frequency Offset and Fast Time-varying Channel Estimation for MIMO-OFDM Systems, a novel pilot-aided iterative algorithm is developed for MIMO-OFDM systems operating in fast time- varying

  13. Storage of water on vegetation under simulated rainfall of varying intensity

    E-Print Network [OSTI]

    Keim, Richard

    Storage of water on vegetation under simulated rainfall of varying intensity R.F. Keim a,*, A Little is understood about how storage of water on forest canopies varies during rainfall, even though storage changes intensity of throughfall and thus affects a variety of hydrological processes

  14. Linear MPC with TimeVarying Terminal Cost using Sparse Convex Combinations and Bisection Search

    E-Print Network [OSTI]

    #12; #12; Linear MPC with Time­Varying Terminal Cost using Sparse Convex Combinations and Bisection--- In recent years, different constrained MPC­ schemes using a time­varying terminal cost have been in, compared to MPC with fixed terminal cost. The main focus of this paper is the introduction of a new method

  15. Analysis of Heart Rate Variability Using Time-Varying Filtering of Heart Transplanted Patients

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Analysis of Heart Rate Variability Using Time-Varying Filtering of Heart Transplanted Patients the heart rate variability (HRV), obtained by using the time-varying integral pulse frequency modulation (TVIPFM) which is well adapted to the exercise stress testing. We consider that the mean heart period

  16. 4.1.1.6 Quiet and slowly varying radio emissions Arnold O. Benz

    E-Print Network [OSTI]

    4.1.1.6 Quiet and slowly varying radio emissions of the sun Arnold O. Benz The solar atmosphere emits radio emission at all wavelengths and at all times. Its total flux density varies with magnetic. It is reached when the sun has been free of spots for some weeks. This is called the quiet radio emission

  17. Lyapunov Function Constructions for Slowly Time-Varying Systems Frederic Mazenc and Michael Malisoff

    E-Print Network [OSTI]

    Sontag, Eduardo

    Lyapunov Function Constructions for Slowly Time-Varying Systems Fr´ed´eric Mazenc and Michael Malisoff Abstract-- We provide general methods for explicitly con- structing strict Lyapunov functions previous Lyapunov function constructions for rapidly time-varying dynamics. We also explicitly construct

  18. On Control-Lyapunov Functions for Hybrid Time-Varying Systems Michael Malisoff and Frederic Mazenc

    E-Print Network [OSTI]

    Sontag, Eduardo

    On Control-Lyapunov Functions for Hybrid Time-Varying Systems Michael Malisoff and Fr´ed´eric Mazenc Abstract-- We explicitly construct strict input-to-state stable Lyapunov functions for time varying hybrid systems, in terms of given nonstrict Lyapunov functions and persistency of excitation

  19. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  20. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  1. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  2. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  3. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  4. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  5. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  6. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  7. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  8. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  9. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  10. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  11. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  12. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  13. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  14. Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01T23:59:59.000Z

    "Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

  15. Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01T23:59:59.000Z

    Grid parity--or break-even cost--for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that local incentives rather than ?technical? parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  16. Modeling indoor exposures to VOCs and SVOCs as ventilation rates vary

    E-Print Network [OSTI]

    Parthasarathy, Srinandini

    2013-01-01T23:59:59.000Z

    J. 2008. Analysis of ventilation data from the United StatesASHRAE Standard 62.1-2010, Ventilation for Acceptable Indoorto VOCs and   SVOCs as ventilation rates vary   Srinandini 

  17. Scheduling algorithms for throughput maximization in time-varying networks with reconfiguration delays

    E-Print Network [OSTI]

    Celik, Guner Dincer

    2012-01-01T23:59:59.000Z

    We consider the control of possibly time-varying wireless networks under reconfiguration delays. Reconfiguration delay is the time it takes to switch network resources from one subset of nodes to another and it is a ...

  18. Dynamic Structured Partitioning for Parallel Scientific Applications with Pointwise Varying Workloads

    E-Print Network [OSTI]

    Daniels, Jeffrey J.

    Dynamic Structured Partitioning for Parallel Scientific Applications with Pointwise Varying", a dynamic structured partition- ing strategy that has been applied to parallel uniform and adaptive and overall application performance. Keywords: Dynamic load balancing, structured grids, pointwise processes

  19. Throughput Optimal Scheduling Over Time-Varying Channels in the Presence of Heavy-Tailed Traffic

    E-Print Network [OSTI]

    Jagannathan, Krishna

    We study the problem of scheduling over time varying links in a network that serves both heavy-tailed and light tailed traffic. We consider a system consisting of two parallel queues, served by a single server. One of the ...

  20. Analysis of the Effects of Compositional and Configurational Assumptions on Product Costs for the Thermochemical Conversion of Lignocellulosic Biomass to Mixed Alcohols -- FY 2007 Progress Report

    SciTech Connect (OSTI)

    Zhu, Yunhua; Gerber, Mark A.; Jones, Susanne B.; Stevens, Don J.

    2008-12-05T23:59:59.000Z

    The purpose of this study was to examine alternative biomass-to-ethanol conversion process assumptions and configuration options to determine their relative effects on overall process economics. A process-flow-sheet computer model was used to determine the heat and material balance for each configuration that was studied. The heat and material balance was then fed to a costing spreadsheet to determine the impact on the ethanol selling price. By examining a number of operational and configuration alternatives and comparing the results to the base flow sheet, alternatives having the greatest impact the performance and cost of the overall system were identified and used to make decisions on research priorities.

  1. Compiled 11/ 14/ 2011 by OPBA. These assumptions are for modeling purposes only. They are subject to change. Page 1 of 2

    E-Print Network [OSTI]

    Vonessen, Nikolaus

    .1 Electricity 2% 2% 231.7 3.7 Fuel Oil 9% 8% 240.8 3.9 Natural Gas -25% 0% 253.1 5.1 Lab Gas 0% 0% 260.3 2.8 Water 3% 3% 273.2 5.0 Sewer 6% 5% 279.3 2.2 Garbage 4% 4% 281.8 0.9 *FY13 based on projections dated 6.03% 18.46% 3.33% 5.54% Higher Education Price Index (HEPI)* Utility Assumptions Fiscal Year 2002 3,679 3

  2. Holographic dark energy with varying gravitational constant in Ho?ava-Lifshitz cosmology

    SciTech Connect (OSTI)

    Setare, M.R. [Department of Physics, University of Kurdistan, Pasdaran Ave., Sanandaj (Iran, Islamic Republic of); Jamil, Mubasher, E-mail: rezakord@ipm.ir, E-mail: mjamil@camp.nust.edu.pk [Center for Advanced Mathematics and Physics, National University of Sciences and Technology, Rawalpindi, 46000 (Pakistan)

    2010-02-01T23:59:59.000Z

    We investigate the holographic dark energy scenario with a varying gravitational constant in a flat background in the context of Ho?ava-Lifshitz gravity. We extract the exact differential equation determining the evolution of the dark energy density parameter, which includes G variation term. Also we discuss a cosmological implication of our work by evaluating the dark energy equation of state for low redshifts containing varying G corrections.

  3. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  4. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  5. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  6. Stochastic Modeling and Power Control of Time-Varying Wireless Communication Networks

    SciTech Connect (OSTI)

    Olama, Mohammed M [ORNL; Djouadi, Seddik M [ORNL; Charalambous, Prof. Charalambos [University of Cyprus

    2014-01-01T23:59:59.000Z

    Wireless networks are characterized by nodes mobility, which makes the propagation environment time-varying and subject to fading. As a consequence, the statistical characteristics of the received signal vary continuously, giving rise to a Doppler power spectral density (DPSD) that varies from one observation instant to the next. This paper is concerned with dynamical modeling of time-varying wireless fading channels, their estimation and parameter identification, and optimal power control from received signal measurement data. The wireless channel is characterized using a stochastic state-space form and derived by approximating the time-varying DPSD of the channel. The expected maximization and Kalman filter are employed to recursively identify and estimate the channel parameters and states, respectively, from online received signal strength measured data. Moreover, we investigate a centralized optimal power control algorithm based on predictable strategies and employing the estimated channel parameters and states. The proposed models together with the estimation and power control algorithms are tested using experimental measurement data and the results are presented.

  7. Preliminary Assumptions for Wind Technologies

    E-Print Network [OSTI]

    and incentives for renewable resources Federal Production Tax Credit (PTC) 2.3 cents/kWh over first 10 years of operation Investment Tax Credit (ITC) alternative 30% towards developer's income tax for qualifying solar, fuel cell and small wind (geothermal, CHP BETC ­ just Oregon (now expired) 5 #12

  8. Section 25: Future State Assumptions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking Over OurSecretaryFigureAtmospheric

  9. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  10. Visulization of Time-Varying Multiresolution Date Using Error-Based Temporal-Spatial Resuse

    SciTech Connect (OSTI)

    Nuber, C; LaMar, E; Hamann, B; Joy, K

    2002-04-22T23:59:59.000Z

    In this paper, we report results on exploration of two-dimensional (2D) time varying datasets. We extend the notion of multiresolution spatial data approximation of static datasets to spatio-temporal approximation of time-varying datasets. Time-varying datasets typically do not change ''uniformly,'' i.e., some spatial sub-domains can experience only little or no change for extended periods of time. In these sub-domains, we show that approximation error bounds can be met when using sub-domains from other time-steps effectively. We generate a more general approximation scheme where sub-domains may approximate congruent sub-domains from any other time steps. While this incurs an O(T2) overhead, where T is the total number of time-steps, we show significant reduction in data transmission. We also discuss ideas for improvements to reduce overhead.

  11. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  12. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  13. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  14. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  15. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  16. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  17. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  18. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  19. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  20. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  1. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  2. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  3. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  4. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  5. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  6. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  7. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  8. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  9. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  10. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  11. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  12. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  13. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  14. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  15. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  16. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  17. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  18. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  19. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  20. Assumptions and Criteria for Performing a Feasability Study of the Conversion of the High Flux Isotope Reactor Core to Use Low-Enriched Uranium Fuel

    SciTech Connect (OSTI)

    Primm, R.T., III; Ellis, R.J.; Gehin, J.C.; Moses, D.L.; Binder, J.L.; Xoubi, N. (U. of Cincinnati)

    2006-02-01T23:59:59.000Z

    A computational study will be initiated during fiscal year 2006 to examine the feasibility of converting the High Flux Isotope Reactor from highly enriched uranium fuel to low-enriched uranium. The study will be limited to steady-state, nominal operation, reactor physics and thermal-hydraulic analyses of a uranium-molybdenum alloy that would be substituted for the current fuel powder--U{sub 3}O{sub 8} mixed with aluminum. The purposes of this document are to (1) define the scope of studies to be conducted, (2) define the methodologies to be used to conduct the studies, (3) define the assumptions that serve as input to the methodologies, (4) provide an efficient means for communication with the Department of Energy and American research reactor operators, and (5) expedite review and commentary by those parties.

  1. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  2. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  3. Ris-R-1500(EN) Control design for a pitch-regulated, vari-

    E-Print Network [OSTI]

    Risø-R-1500(EN) Control design for a pitch-regulated, vari- able speed wind turbine Morten H speed wind tur- bine Department: Wind Energy Department Risø-R-1500(EN) January 2005 ISSN 0106-2840 ISBN wind speed, which can be almost removed by changing the parameters of the frequency converter

  4. NANO EXPRESS Open Access Au/Pd core-shell nanoparticles with varied hollow

    E-Print Network [OSTI]

    Liu, Fuqiang

    NANO EXPRESS Open Access Au/Pd core-shell nanoparticles with varied hollow Au cores for enhanced has been developed to synthesize Au/Pd core-shell nanoparticles via galvanic replacement of Cu by Pd on hollow Au nanospheres. The unique nanoparticles were characterized by X-ray diffraction, X

  5. TIME-VARYING LINEAR MODEL APPROXIMATION: APPLICATION TO THERMAL AND AIRFLOW BUILDING SIMULATION

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    TIME-VARYING LINEAR MODEL APPROXIMATION: APPLICATION TO THERMAL AND AIRFLOW BUILDING SIMULATION Nowadays, most of the numerical tools dedicated to simulating the thermal behavior of buildings, consider is demonstrated by its application to the simulation of a multi-zones building. THERMAL AND AIRFLOW MODELS

  6. Market-based emissions regulation when damages vary across sources: What are the gains from differentiation?

    E-Print Network [OSTI]

    Fowlie, Meredith

    For much of the air pollution currently regulated under U.S. emissions trading programs, health pernicious air quality problems in the United States involve non-uniformly mixed pollutants. Examples include policies can accommodate non-uniformly mixed pollution by using emissions penalties that vary with damages

  7. LQG Control of Linear Systems with Network-Induced Varying Delay using the Delta Operator

    E-Print Network [OSTI]

    LQG Control of Linear Systems with Network-Induced Varying Delay using the Delta Operator Masakazu be represented as a linear delay- depending feedback from the state and the previous control signal. Finally control of linear systems with long random time delays in delta domain is proposed in [22]. By using

  8. Learning Curve: Analysis of an Agent Pricing Strategy Under Varying Conditions

    E-Print Network [OSTI]

    in employing these real-time agents is understanding the costs and benefits to different agent pricingLearning Curve: Analysis of an Agent Pricing Strategy Under Varying Conditions Joan Morris, Pattie@cs.brown.edu Abstract - By employing dynamic pricing, the act of changing prices over time within a marketplace, sellers

  9. Optimal Control of Discrete-Time Linear Systems with Network-Induced Varying Delay

    E-Print Network [OSTI]

    importance in modern systems applications. However, most traditional digital control and algorithmsOptimal Control of Discrete-Time Linear Systems with Network-Induced Varying Delay Hiroyuki Hirano for networked control systems, that have network induced time delay in the communication networks. In our

  10. Calculation of higher moments of the neutron multiplication process in a time-varying medium

    E-Print Network [OSTI]

    Pázsit, Imre

    , which only calculates this new component added and com- pletely ignores the zero-power reactor noiseCalculation of higher moments of the neutron multiplication process in a time-varying medium Y Available online 20 April 2007 Abstract The zero-power reactor noise theory in a steady neutron multiplying

  11. Laser Safety Web Resources The web links below represent varied resources for laser safety information and

    E-Print Network [OSTI]

    Houston, Paul L.

    Laser Safety Web Resources The web links below represent varied resources for laser safety information and equipment. The inclusion or exclusion of any given resource is not meant to reflect endorsement by Georgia Tech. Please contact the Laser Safety Officer if you know of any helpful resources

  12. Quantitative Depth Recovery from Time-Varying Optical Flow in a Kalman Filter

    E-Print Network [OSTI]

    Barron, John

    Quantitative Depth Recovery from Time-Varying Optical Flow in a Kalman Filter Framework John Barron Julich, 52425 Julich, Germany h.spies@fz-juelich.de Abstract. We present a Kalman lter framework, Depth from Optical Flow, Kalman Filter, 3D Camera Motion, Quantitative Error Analysis 1 Introduction We

  13. One-Way Wave Propagation Through Smoothly Varying Media Controlling the Energy Production at Home

    E-Print Network [OSTI]

    Al Hanbali, Ahmad

    One-Way Wave Propagation Through Smoothly Varying Media Controlling the Energy Production at Home propagation through the earth, governed by the acoustic wave equation. Downward continuation is a technique, Citadel T100 As part of the application called migration or reflection seismic imaging, we model wave

  14. 1.14 Note: Actual time to complete varies by discipline and departmental requirements. Dissertation Timeline

    E-Print Network [OSTI]

    Papalambros, Panos

    1.14 Note: Actual time to complete varies by discipline and departmental requirements. Dissertation Timeline STUDENT SERVICES: ACADEMIC RECORDS & DISSERTATIONS 915 E. Washington Street · 0120 Rackham://wolverineaccess.umich.edu/ 6 months prior to Group Pre-Defense Review Rackham Format Guidelines http://www.rackham.umich.edu/downloads/oard-dissertation

  15. Varying the prior 29 Appendix C. Quality of the posterior estimates from prior replacement

    E-Print Network [OSTI]

    Varying the prior 29 Appendix C. Quality of the posterior estimates from prior replacement replacement may out-perform prior-specific training in some aspects of the quality of the estimated posterior, since the prior is known analytically, the posterior can also be estimated by prior replacement. To do

  16. Learning Multiple Models of Non-Linear Dynamics for Control under Varying Contexts

    E-Print Network [OSTI]

    Vijayakumar, Sethu

    Learning Multiple Models of Non-Linear Dynamics for Control under Varying Contexts Georgios Petkos for adaptive motor control exist which learn the system's inverse dynamics online and use this single model;II Command Context 1 Context 2 Dynamics models Context n Control Learning Commands Switch / Mix

  17. Learning Multiple Models of Non-Linear Dynamics for Control under Varying Contexts

    E-Print Network [OSTI]

    Toussaint, Marc

    Learning Multiple Models of Non-Linear Dynamics for Control under Varying Contexts Georgios Petkos for adaptive motor control exist which learn the system's inverse dynamics online and use this single model version - to appear in ICANN 2006 #12;II Command Context 1 Context 2 Dynamics models Context n Control

  18. A Perceptual Study on Haptic Rendering of Surface Topography when Both Surface Height and Stiffness Vary

    E-Print Network [OSTI]

    Tan, Hong Z.

    A Perceptual Study on Haptic Rendering of Surface Topography when Both Surface Height and Stiffness of surface topography when both surface height and surface stiffness vary. Three psychophysical experiments of haptic virtual environments. 1 Introduction How do people perceive the surface topography1 of a virtual

  19. Cell Adhesion on Polyelectrolyte Multilayer Coated Polydimethylsiloxane Surfaces with Varying Topographies

    E-Print Network [OSTI]

    Lee, Ilsoon

    and CHRISTINA CHAN1,2 ABSTRACT This article demonstrates that the micro-topography of the surface with respect, and suggest that surface topography, in part, regulates cell adhesion and proliferation. Therefore, varying the surface topography may provide a method to influence cell attachment and proliferation for tissue

  20. Stochastic optimal control under randomly varying distributed delays NAN-CHYUAN TSAI and ASOK RAY

    E-Print Network [OSTI]

    Ray, Asok

    . The performance cost is formulated as the conditional expectation of a quadratic func- tional adjoined dynamic systems, such as advanced aircraft, autonomous manufacturing and chemical plants, to interconnect of randomly varying distributed delays in the stochastic setting. However, the certainty equivalence property

  1. Linear Parameter-Varying versus Linear Time-Invariant Control Design for a Pressurized Water Reactor

    E-Print Network [OSTI]

    Bodenheimer, Bobby

    -dependent control to a nuclear pressurized water reactor is investigated and is compared to that of using an H1Linear Parameter-Varying versus Linear Time-Invariant Control Design for a Pressurized Water Reactor Pascale Bendotti y Electricit e de France Direction des Etudes et Recherches 6 Quai Watier, 78401

  2. High-throughput generation of hydrogel microbeads with varying elasticity for cell encapsulation

    E-Print Network [OSTI]

    Zandstra, Peter W.

    High-throughput generation of hydrogel microbeads with varying elasticity for cell encapsulation a microfluidic approach for high-throughput generation of 3D microenvironments with different elasticity for studies of cell fate. The generation of agarose microgels with different elastic moduli was achieved by (i

  3. Linear ParameterVarying versus Linear TimeInvariant Control Design for a Pressurized Water Reactor

    E-Print Network [OSTI]

    Bodenheimer, Bobby

    . The plant can thus have widely varying dynamics over the operating range. The controllers designed perform to a description of the problem statement. Section 4 describes the identification and modelling of the plant. Se the worst­case time variation of a measurable parameter which enters the plant in a linear fractional manner

  4. Experiments for Online Estimation of Heavy Vehicle's Mass and Time-Varying Road Grade

    E-Print Network [OSTI]

    Stefanopoulou, Anna

    's vehicle, and also marketing strategies in industry, has fuelled extensive research for automation of partExperiments for Online Estimation of Heavy Vehicle's Mass and Time-Varying Road Grade Ardalan for online estimation of Heavy Duty Vehicle mass and road grade. The test data is obtained from high- way

  5. Control-Oriented Linear Parameter-Varying Modelling of a Turbocharged Diesel Engine

    E-Print Network [OSTI]

    Cambridge, University of

    Control-Oriented Linear Parameter-Varying Modelling of a Turbocharged Diesel Engine Merten Jung-- In this paper, a third order nonlinear model of the airpath of a turbocharged diesel engine is derived, which and to a higher order nonlinear model suggests the validity of this approach. I. INTRODUCTION Modern diesel

  6. The Effects of Varied Imidization Conditions on Rubbed Polyimide Film Surface Morphology

    E-Print Network [OSTI]

    Chiang, Shirley

    The Effects of Varied Imidization Conditions on Rubbed Polyimide Film Surface Morphology C. L. H InterScience (www.interscience.wiley.com). ABSTRACT: The thermal histories of polyimide films were films; rubbing; polyimide INTRODUCTION In recent years, there has been much attention placed on rubbed

  7. Transient effective hydraulic conductivities under slowly and rapidly varying mean gradients in bounded three-

    E-Print Network [OSTI]

    Tartakovsky, Daniel M.

    Transient effective hydraulic conductivities under slowly and rapidly varying mean gradients it Darcian in real or transformed domains. Each such situation gives rise to an effective hydraulic-time. In this paper we develop first-order analytical expressions for effective hydraulic conductivity under three

  8. Effects of Mass Varying Neutrinos on Cosmological Parameters as determined from the Cosmic Microwave Background

    E-Print Network [OSTI]

    Akshay Ghalsasi; Ann E. Nelson

    2014-05-04T23:59:59.000Z

    In models with a light scalar field (the `acceleron') coupled to neutrinos, neutrino masses depend on neutrino density. The resulting coupled system of mass varying neutrinos (MaVaNs) and the acceleron can act as a negative pressure fluid and is a candidate for dark energy \\cite{Fardon:2003eh} . MaVaNs also allow for higher $\\Sigma$m$_\

  9. Library hours vary by semester; Check lib.usf.edu After midnight, USF ID required

    E-Print Network [OSTI]

    Meyers, Steven D.

    Library hours vary by semester; Check lib.usf.edu After midnight, USF ID required lib.usf.edu (813? To learn how to: Integrate the library into Canvas, Invite a librarian to join your course's Canvas site, or Request a tailored research guide or library research assignment, Contact: Susan Silver | ssilver

  10. THE MOTION OF SUPERCONDUCTING VORTICES IN THIN FILMS OF VARYING THICKNESS

    E-Print Network [OSTI]

    Chapman, Jon

    with superconductor/vacuum interfaces is considered. A vortex is #12;rst shown to intersect such an interface normallyTHE MOTION OF SUPERCONDUCTING VORTICES IN THIN FILMS OF VARYING THICKNESS S.J. CHAPMAN #3; D.R. HERON y MATHEMATICAL INSTITUTE OXFORD OX1 3LB UK Abstract. The interaction of superconducting vortices

  11. On the Adaptivity of today's Energy-Efficient MAC Protocols under varying Traffic Conditions

    E-Print Network [OSTI]

    Braun, Torsten

    On the Adaptivity of today's Energy-Efficient MAC Protocols under varying Traffic Conditions typically accounts for a major portion of a WSN node's power consumption, researchers have proposed Energy-Efficient. Such protocols typically trade off energy-efficiency versus classical quality of service parameters (e

  12. Math 421, Fourier Analysis Suppose we sample a periodically varying quantity such as an intensity or

    E-Print Network [OSTI]

    Offin, Dan

    Math 421, Fourier Analysis Suppose we sample a periodically varying quantity such as an intensity tone 200 400 600 800 100012001400 5 10 15 20 25 The Fourier analysis of the tone Which button was pressed? A general method was found by Jean Baptiste Joseph Fourier (1768 - 1830) in 1807. His method

  13. Structural Nested Mean Models for Assessing Time-Varying Causal Effect Moderation

    E-Print Network [OSTI]

    Murphy, Susan A.

    = No Effect Outpatient substance abuse treatment is better than residential treatment for individuals of Suicide in Primary Care Elderly: CT) (a1, a2) Time-varying treatment pattern; at is binary (0,1) Y (a1, a21 Thomas R. Ten Have2 Susan A. Murphy3 1 Health Services Research in Primary Care, Durham VA MC 1

  14. Posting type Advisory Subject Varying bias of XRF sulfur relative to IC sulfate

    E-Print Network [OSTI]

    Fischer, Emily V.

    Posting type Advisory Subject Varying bias of XRF sulfur relative to IC sulfate Module/Species A of evidence point to XRF measurement bias as the source of most of the observed variation. Figure 1 shows that was offset by two abrupt increases, each coming at the start of a new sample month. The XRF analyses, unlike

  15. The electromagnetic fields and the radiation of a spatio-temporally varying electric current loop

    E-Print Network [OSTI]

    Markus Lazar

    2013-04-12T23:59:59.000Z

    The electric and magnetic fields of a spatio-temporally varying electric current loop are calculated using the Jefimenko equations. The radiation and the nonradiation parts of the electromagnetic fields are derived in the framework of Maxwell's theory of electromagnetic fields. In this way, a new, exact, analytical solution of the Maxwell equation is found.

  16. Holographic Dark Energy with Time Varying n^2 Parameter in Non-Flat Universe

    E-Print Network [OSTI]

    Bushra Majeed; Mubasher Jamil; Azad A. Siddiqui

    2014-11-01T23:59:59.000Z

    We consider a holographic dark energy model, with a varying parameter, n, which evolves slowly with time. We obtain the differential equation describing evolution of the dark energy density parameter, $\\Omega_d$, for the flat and non-flat FRW universes. The equation of state parameter in this generalized version of holographic dark energy depends on n.

  17. Dynamic measurements of the nonlinear elastic parameter A in rock under varying conditions

    E-Print Network [OSTI]

    saturation. INDEX TERMS: 5102 Physical Properties of Rocks: Acoustic properties; 5112 Physical Properties of Rocks: Microstructure; 5199 Physical Properties of Rocks: General or miscellaneous; 9810 GeneralDynamic measurements of the nonlinear elastic parameter A in rock under varying conditions Paul A

  18. STABLE FREQUENCY RESPONSE TO VARYING STIMULUS INTENSITY IN A MODEL OF THE RAT OLFACTORY BULB

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    STABLE FREQUENCY RESPONSE TO VARYING STIMULUS INTENSITY IN A MODEL OF THE RAT OLFACTORY BULB Thomas Neurosciences et Systèmes sensoriels, CNRS UMR 5020, Lyon, France ABSTRACT In the rat olfactory bulb (OB), fast. Introduction The rat olfactory bulb (OB) is a rich and complex sensory processing system that shows stimulus

  19. Tuning the plasmon energy of Palladium-Hydrogen systems by varying the Hydrogen concentration

    E-Print Network [OSTI]

    Muiño, Ricardo Díez

    Tuning the plasmon energy of Palladium-Hydrogen systems by varying the Hydrogen concentration V M of the resonance energy on the hydrogen concentration is roughly similar to that in bulk. PACS numbers: 71.20.Be on hydrogen uptake used in Reference [8] seems well grounded [10], there is no theoretical support for its

  20. Response of a Vertical Axis Wind Turbine to Time Varying Wind Conditions found within the Urban

    E-Print Network [OSTI]

    Tullis, Stephen

    Response of a Vertical Axis Wind Turbine to Time Varying Wind Conditions found within the Urban, 2010 PP 389­401 389 ABSTRACT Experimental testing of a vertical axis wind turbine within the urban of the turbine. Temporal variation of the wind with respect to the direction and velocity fluctuations

  1. Generation of Undular Bores in the Shelves of Slowly-Varying Solitary Waves

    E-Print Network [OSTI]

    Generation of Undular Bores in the Shelves of Slowly-Varying Solitary Waves G.A. El 1 School the long-time evolution of the trailing shelves that form behind solitary waves moving through of the variable background medium. We describe the nonlinear evolution of the shelves in terms of exact solutions

  2. Continuous time-varying biasing approach for spectrally tunable infrared detectors

    E-Print Network [OSTI]

    Hayat, Majeed M.

    and Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87106, USA this capability, an algorithm is developed for designing the time- varying bias for an arbitrary spectral-sensing window of interest. Since continuous-time biasing can be implemented within the readout circuit

  3. Journal of Mammalogy, 84(2):354368, 2003 MAMMALIAN RESPONSE TO GLOBAL WARMING ON VARIED

    E-Print Network [OSTI]

    California at Berkeley, University of

    354 Journal of Mammalogy, 84(2):354­368, 2003 MAMMALIAN RESPONSE TO GLOBAL WARMING ON VARIED how Rocky Mountain mam- malian communities changed during past global warming events characterized not) in different ways. Nevertheless, examination of past global warming episodes suggested

  4. Oxygen isotope records of goethite from ferricrete deposits indicate regionally varying Holocene climate change in

    E-Print Network [OSTI]

    Hren, Michael

    Oxygen isotope records of goethite from ferricrete deposits indicate regionally varying Holocene isotopes of goethite from ferricrete deposits were measured from both northern and southern Rocky Mountain in oxygen isotope values of 14 C-dated goethites in the northern Rocky Mountains suggests a regional

  5. Lyapunov functions for time varying systems satisfying generalized conditions of Matrosov

    E-Print Network [OSTI]

    Nesic, Dragan

    Lyapunov functions for time varying systems satisfying generalized conditions of Matrosov theorem F a weak Lyapunov function (positive definite, decrescent, with negative semi- definite derivative along of the Lyapunov function is zero [M1]. Recently, sev- eral generalizations of the classical Matrosov theorem

  6. Performance analysis of symbol timing estimators for time-varying MIMO channels

    E-Print Network [OSTI]

    Panduru, Flaviu Gabriel

    2004-11-15T23:59:59.000Z

    antennas and M denotes the number of receive antennas, the 2 X 2 system used by S.-A. Yangand J. Wu and the 4 X 4system used by Y.-C. Wu and E. Serpedin. The second model has been extended to take into account the symbol time-varying fading. The theoretical...

  7. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  8. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  9. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  10. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  11. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  12. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  13. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  14. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  15. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  16. Analysis of the Effects of Compositional and Configurational Assumptions on Product Costs for the Thermochemical Conversion of Lignocellulosic Biomass to Mixed Alcohols – FY 2007 Progress Report

    SciTech Connect (OSTI)

    Zhu, Yunhua; Gerber, Mark A.; Jones, Susanne B.; Stevens, Don J.

    2009-02-01T23:59:59.000Z

    The purpose of this study was to examine alternative biomass-to-ethanol conversion process assumptions and configuration options to determine their relative effects on overall process economics. A process-flow-sheet computer model was used to determine the heat and material balance for each configuration that was studied. The heat and material balance was then fed to a costing spreadsheet to determine the impact on the ethanol selling price. By examining a number of operational and configuration alternatives and comparing the results to the base flow sheet, alternatives having the greatest impact the performance and cost of the overall system were identified and used to make decisions on research priorities. This report, which was originally published in December 2008, has been revised primarily to correct information presented in Appendix B -- Base Case Flow Sheets and Model Results. The corrections to Appendix B include replacement of several pages in Table B.1 that duplicated previous pages of the table. Other changes were made in Appendix B to correct inconsistencies between stream labels presented in the tables and the stream labels in the figures.

  17. Notes on Gauss law applied for time varying electric field in vacuum

    E-Print Network [OSTI]

    Zhakatayev, Altay

    2015-01-01T23:59:59.000Z

    Gauss's law in integral form states that closed surface integral of electric field is proportional to net charge present within the volume bounded by this closed surface. Gauss's law in differential form states that divergence of electric field is proportional to charge's volume density. From Gauss's law it is concluded that in vacuum, where no electric charges are present, divergence of electric field and closed surface integral of electric field are zero. In this paper we make an attempt to theoretically prove that for time-varying electric fields Gauss's law is not valid. In other words, for time-varying electric field even in vacuum divergence of electric field and closed surface integral of electric field are non-zero. We do this by considering simple sinusoidal motion of the charge and then by calculating closed surface integral at specific time of time-varying electric field due to charge motion. Results show that for charges at still and at motion with constant velocity Gauss's law is valid. However f...

  18. Morphology of rain water channelization in systematically varied model sandy soils

    E-Print Network [OSTI]

    Y. Wei; C. M. Cejas; R. Barrois; R. Dreyfus; D. J. Durian

    2014-03-13T23:59:59.000Z

    We visualize the formation of fingered flow in dry model sandy soils under different raining conditions using a quasi-2d experimental set-up, and systematically determine the impact of soil grain diameter and surface wetting property on water channelization phenomenon. The model sandy soils we use are random closely-packed glass beads with varied diameters and surface treatments. For hydrophilic sandy soils, our experiments show that rain water infiltrates into a shallow top layer of soil and creates a horizontal water wetting front that grows downward homogeneously until instabilities occur to form fingered flows. For hydrophobic sandy soils, in contrast, we observe that rain water ponds on the top of soil surface until the hydraulic pressure is strong enough to overcome the capillary repellency of soil and create narrow water channels that penetrate the soil packing. Varying the raindrop impinging speed has little influence on water channel formation. However, varying the rain rate causes significant changes in water infiltration depth, water channel width, and water channel separation. At a fixed raining condition, we combine the effects of grain diameter and surface hydrophobicity into a single parameter and determine its influence on water infiltration depth, water channel width, and water channel separation. We also demonstrate the efficiency of several soil water improvement methods that relate to rain water channelization phenomenon, including pre-wetting sandy soils at different level before rainfall, modifying soil surface flatness, and applying superabsorbent hydrogel particles as soil modifiers.

  19. Quantization of systems with temporally varying discretization. I. Evolving Hilbert spaces

    SciTech Connect (OSTI)

    Höhn, Philipp A., E-mail: phoehn@perimeterinstitute.ca [Perimeter Institute for Theoretical Physics, 31 Caroline Street North, Waterloo, Ontario N2L 2Y5 (Canada)

    2014-08-15T23:59:59.000Z

    A temporally varying discretization often features in discrete gravitational systems and appears in lattice field theory models subject to a coarse graining or refining dynamics. To better understand such discretization changing dynamics in the quantum theory, an according formalism for constrained variational discrete systems is constructed. While this paper focuses on global evolution moves and, for simplicity, restricts to flat configuration spaces R{sup N}, a Paper II [P. A. Höhn, “Quantization of systems with temporally varying discretization. II. Local evolution moves,” J. Math. Phys., e-print http://arxiv.org/abs/arXiv:1401.7731 [gr-qc].] discusses local evolution moves. In order to link the covariant and canonical picture, the dynamics of the quantum states is generated by propagators which satisfy the canonical constraints and are constructed using the action and group averaging projectors. This projector formalism offers a systematic method for tracing and regularizing divergences in the resulting state sums. Non-trivial coarse graining evolution moves lead to non-unitary, and thus irreversible, projections of physical Hilbert spaces and Dirac observables such that these concepts become evolution move dependent on temporally varying discretizations. The formalism is illustrated in a toy model mimicking a “creation from nothing.” Subtleties arising when applying such a formalism to quantum gravity models are discussed.

  20. Device calibration impacts security of quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16T23:59:59.000Z

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  1. An experimental study of a six key handprint chord keyboard

    E-Print Network [OSTI]

    Wolstein, Sheldon Aaron

    1986-01-01T23:59:59.000Z

    er Dr. R. Quinn Brackett Head o Department Dr. Leland T. Blank May 1986 ABSTRACT An Exper1mental Study of a Six Key Handprlnt Chord Keyboard (May 1986) Sheldon Aaron Wolstein, B. S. , Texas ASM University Cha1r of Advisory Committee: Dr... PRACTICE ARTICLE UITA 7Z 7B IUU IUB 1U7 11U 111 LIST OF TABLES Page TABLE I Results of Typing Test: Means and Standard Deviations 25 TABLE 2 Means and Variances for Letter Sequence Times 28 TABLE 3 Analysis of Variance for Letter Sequence...

  2. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  3. Effects of color coding on keying time and errors

    E-Print Network [OSTI]

    Wooldridge, Brenda Gail

    1983-01-01T23:59:59.000Z

    were to determine the effects if any oi' color coding upon the error rate and location time of special func- tion keys on a computer keyboard. An ACT-YA CRT keyboard interfaced with a Kromemco microcomputer was used. There were 84 high schoool... to comnunicate with more and more computer-like devices. The most common computer/human interface is the terminal, consisting of a display screen, and keyboard. The format and layout on the display screen of computer-generated information is generally...

  4. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  5. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  6. DOE Announces More Key Administration Posts | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartmentConsumersDevelopmentDepartmentofKey

  7. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues

  8. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey

  9. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy- FORTechnology Key to

  10. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKey

  11. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,KeyTex

  12. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  13. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA Key

  14. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyA

  15. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAA

  16. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAAA

  17. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  18. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteriesmetal-organic frameworks |A photo ofMay 2015andKEY

  19. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to Preserving

  20. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to PreservingIron

  1. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental AssessmentsGeoffrey Campbell isOklahoma City, USA OklahomaTiratIs Key

  2. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) MappingOctober 12,U.S.U.S. DOEJoanKaye D. Lathrop,KevinKey

  3. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Nobel Laureate's

  4. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  5. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  6. Encryption Key Search using Java-based ALiCE Grid

    E-Print Network [OSTI]

    Virkar, Ameya

    Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

  7. $?$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Jameel-Un Nabi; Irgaziev Bakhadir

    2011-08-04T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model results. This study can prove useful for the core-collapse simulators.

  8. Per-plant eco-physiological responses of maize to varied nitrogen availability at low and high plant densities

    E-Print Network [OSTI]

    Boomsma, Christopher R; Vyn, Tony J

    2009-01-01T23:59:59.000Z

    and low nitrogen availability. Agron. J. 2009; forthcoming.the impacts of nitrogen (N) availability on intra-specificgenotypes to varied N availability at both low and high

  9. Target Selection for the LBTI Exozodi Key Science Program

    E-Print Network [OSTI]

    Weinberger, Alycia J; Kennedy, Grant M; Roberge, Aki; Defrère, Denis; Hinz, Philip M; Millan-Gabet, Rafael; Rieke, George; Bailey, Vanessa P; Danchi, William C; Haniff, Chris; Mennesson, Bertrand; Serabyn, Eugene; Skemer, Andrew J; Stapelfeldt, Karl R; Wyatt, Mark C

    2015-01-01T23:59:59.000Z

    The Hunt for Observable Signatures of Terrestrial planetary Systems (HOSTS) on the Large Binocular Telescope Interferometer will survey nearby stars for faint emission arising from ~300 K dust (exozodiacal dust), and aims to determine the exozodiacal dust luminosity function. HOSTS results will enable planning for future space telescopes aimed at direct spectroscopy of habitable zone terrestrial planets, as well as greater understanding of the evolution of exozodiacal disks and planetary systems. We lay out here the considerations that lead to the final HOSTS target list. Our target selection strategy maximizes the ability of the survey to constrain the exozodi luminosity function by selecting a combination of stars selected for suitability as targets of future missions and as sensitive exozodi probes. With a survey of approximately 50 stars, we show that HOSTS can enable an understanding of the statistical distribution of warm dust around various types of stars and is robust to the effects of varying levels ...

  10. Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices

    SciTech Connect (OSTI)

    Sharon Kramer; Mirko Previsic; Peter Nelson; Sheri Woo

    2010-06-17T23:59:59.000Z

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: ? 4 wave energy generation technologies ? 3 tidal energy generation technologies ? 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal) ? 3 project sizes: pilot, small commercial, and large commercial The possible combinations total 24 wave technology scenarios and 9 tidal technology scenarios. We evaluated 3 of the 33 scenarios in detail: 1. A small commercial OPT Power Buoy project off the Humboldt County, California coast 2. A small commercial Pelamis Wave Power P-2 project off Makapu’u Point, Oahu, Hawaii 3. A pilot MCT SeaGen tidal project, sited in the Tacoma Narrows, Washington This framework document used information available from permitting documents that were written to support actual wave or tidal energy projects, but the results obtained here should not be confused with those of the permitting documents1. The main difference between this framework document and permitting documents of currently proposed pilot projects is that this framework identifies key environmental concerns and describes the next steps in addressing those concerns; permitting documents must identify effects, find or declare thresholds of significance, evaluate the effects against the thresholds, and find mitigation measures that will minimize or avoid the effects so they can be considered less-than-significant. Two methodologies, 1) an environmental effects analysis and 2) Raptools, were developed and tested to identify potential environmental effects associated with wave or tidal energy conversion projects. For the environmental effects analysis, we developed a framework based on standard risk assessment techniques. The framework was applied to the three scenarios listed above. The environmental effects analysis addressed questions such as: ? What is the temporal and spatial exposure of a species at a site? ? What are the specific potential project effects on that species? ? What measures could minimize, mitigate, or eliminate negative effects? ? Are there potential effects of the project, or species’ response to the effect, that are highly uncertain and warrant additional study? The second methodology, Raptools, is a collaborative approach useful for evaluating multiple characteristi

  11. Nuclear Car Wash sensitivity in varying thicknesses of wood and steel cargo

    SciTech Connect (OSTI)

    Church, J; Slaughter, D; Asztalos, S; Biltoft, P; Descalle, M; Hall, J; Manatt, D; Mauger, J; Norman, E; Petersen, D; Prussin, S

    2006-10-05T23:59:59.000Z

    The influence of incident neutron attenuation on signal strengths in the Nuclear Car Wash has been observed experimentally for both wood and steel-pipe mock cargos. Measured decay curves are presented for {beta}-delayed high-energy {gamma}-rays and thermalized neutrons following neutron-induced fission of HEU through varying irradiation lengths. Error rates are extracted for delayed-{gamma} and delayed-n signals integrated to 30 seconds, assuming Gaussian distributions for the active background. The extrapolation to a field system of 1 mA deuterium current and to a 5 kg sample size is discussed.

  12. Fermion Pair Production From an Electric Field Varying in Two Dimensions

    E-Print Network [OSTI]

    J. E. Seger; A. B. Balantekin

    1995-06-26T23:59:59.000Z

    The Hamiltonian describing fermion pair production from an arbitrarily time-varying electric field in two dimensions is studied using a group-theoretic approach. We show that this Hamiltonian can be encompassed by two, commuting SU(2) algebras, and that the two-dimensional problem can therefore be reduced to two one-dimensional problems. We compare the group structure for the two-dimensional problem with that previously derived for the one-dimensional problem, and verify that the Schwinger result is obtained under the appropriate conditions.

  13. Redshifting of cosmological black bodies in BSBM varying-alpha theories

    E-Print Network [OSTI]

    Barrow, John D.; Magueijo, João

    2014-11-04T23:59:59.000Z

    the density of photons with frequency ? is N = ?/(~?). The Stefan-Boltzmann law for a decoupled black body is therefore also preserved, with the temperature receiving no new effects due to a varying ? (other than those due to the gravitational effect of ?... term exists for pure radiation, the field ? does not lose or gain energy (other than redshifting like 1/a6 due to its own pressure) and likewise the energy for ra- diation should be defined so that it does not depart from the usual 1/a4 law. Thus...

  14. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  15. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19T23:59:59.000Z

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  16. Key Science Observations of AGNs with KaVA Array

    E-Print Network [OSTI]

    Kino, Motoki; Zhao, Guang-Yao; Sohn, Bong Won

    2015-01-01T23:59:59.000Z

    KaVA (KVN and VERA Array) is a new combined VLBI array with KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). First, we briefly review the imaging capabilities of KaVA array which actually achieves more than three times better dynamic range than that achieved by VERA alone. The KaVA images clearly show detailed structures of extended radio jets in AGNs. Next, we represent the key science program to be led by KaVA AGN sub working group. We will conduct the monitoring observations of Sgr A* and M87 because of the largeness of their central super-massive black hole angular sizes. The main science goals of the program are (i) testing magnetically-driven-jet paradigm by mapping velocity fields of the M87 jet, and (ii) obtaining tight constraints on physical properties of radio emitting region in Sgr A*.

  17. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  18. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  19. Quantization of systems with temporally varying discretization I: Evolving Hilbert spaces

    E-Print Network [OSTI]

    Philipp A. Hoehn

    2014-10-02T23:59:59.000Z

    A temporally varying discretization often features in discrete gravitational systems and appears in lattice field theory models subject to a coarse graining or refining dynamics. To better understand such discretization changing dynamics in the quantum theory, an according formalism for constrained variational discrete systems is constructed. While the present manuscript focuses on global evolution moves and, for simplicity, restricts to Euclidean configuration spaces, a companion article discusses local evolution moves. In order to link the covariant and canonical picture, the dynamics of the quantum states is generated by propagators which satisfy the canonical constraints and are constructed using the action and group averaging projectors. This projector formalism offers a systematic method for tracing and regularizing divergences in the resulting state sums. Non-trivial coarse graining evolution moves lead to non-unitary, and thus irreversible, projections of physical Hilbert spaces and Dirac observables such that these concepts become evolution move dependent on temporally varying discretizations. The formalism is illustrated in a toy model mimicking a `creation from nothing'. Subtleties arising when applying such a formalism to quantum gravity models are discussed.

  20. A TIME-VARYING KALMAN FILTER APPLIED TO MOVING TARGET TRACKING Nicolas Obolensky, Deniz Erdogmus, Jose C. Principe

    E-Print Network [OSTI]

    Slatton, Clint

    A TIME-VARYING KALMAN FILTER APPLIED TO MOVING TARGET TRACKING Nicolas Obolensky, Deniz Erdogmus, obolensk@cnel.ufl.edu Abstract: In this paper, we describe a time varying extension to the Kalman Filter to be inaccurate. The proposed Kalman Filter adapts its model (i.e. the state transition matrix) at each step

  1. Real-Time Combustion Torque Estimation on a Diesel Engine Test Bench Using Time-Varying Kalman Filtering

    E-Print Network [OSTI]

    Real-Time Combustion Torque Estimation on a Diesel Engine Test Bench Using Time-Varying Kalman sensor the easily available instantaneous crankshaft angle speed. The observer consists in a Kalman torque observer, we use a physics-based model underlying the role of time-varying inertia. A Kalman

  2. Robust and fault-tolerant linear parameter-varying control of wind turbines Christoffer Sloth a,,1

    E-Print Network [OSTI]

    Hansen, René Rydhof

    Robust and fault-tolerant linear parameter-varying control of wind turbines Christoffer Sloth a,,1 Keywords: Wind turbine control Linear parameter-varying (LPV) control Fault-tolerant control Robust control a b s t r a c t High performance and reliability are required for wind turbines to be competitive

  3. Break-Even Cost for Residential Solar Water Heating in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Cassard, H.; Denholm, P.; Ong, S.

    2011-02-01T23:59:59.000Z

    This paper examines the break-even cost for residential rooftop solar water heating (SWH) technology, defined as the point where the cost of the energy saved with a SWH system equals the cost of a conventional heating fuel purchased from the grid (either electricity or natural gas). We examine the break-even cost for the largest 1,000 electric and natural gas utilities serving residential customers in the United States as of 2008. Currently, the break-even cost of SWH in the United States varies by more than a factor of five for both electricity and natural gas, despite a much smaller variation in the amount of energy saved by the systems (a factor of approximately one and a half). The break-even price for natural gas is lower than that for electricity due to a lower fuel cost. We also consider the relationship between SWH price and solar fraction and examine the key drivers behind break-even costs. Overall, the key drivers of the break-even cost of SWH are a combination of fuel price, local incentives, and technical factors including the solar resource location, system size, and hot water draw.

  4. Design Impacts of Stochastically-Varying Input Parameters on Advanced Thermoelectric Conversion Systems

    SciTech Connect (OSTI)

    Hendricks, Terry J.; Karri, Naveen K.

    2007-06-30T23:59:59.000Z

    Advanced, direct thermal energy conversion technologies are receiving increased research attention in order to recover waste thermal energy in advanced vehicles and industrial processes. Advanced thermoelectric (TE) systems necessarily require integrated system-level analyses to establish accurate optimum system designs. Past system-level design and analysis has relied on well-defined deterministic input parameters even though many critically important environmental and system design parameters in the above mentioned applications are often randomly variable, sometimes according to complex relationships, rather than discrete, well-known deterministic variables. This work describes new research and development creating techniques and capabilities for probabilistic design and analysis of advanced TE power generation systems to quantify the effects of randomly uncertain design inputs in determining more robust optimum TE system designs and expected outputs. Selected case studies involving stochastic TE .material properties and coupled multi-variable stochasticity in key environmental and design parameters are presented and discussed to demonstrate key impacts from considering stochastic design inputs on the TE design optimization process. Critical findings show that: 1) stochastic Gaussian input distributions may produce Gaussian or non-Gaussian outcome probability distributions for critical TE design parameters, and 2) probabilistic input considerations can create design effects that warrant significant modifications to deterministically-derived optimum TE system designs. Magnitudes and directions of these design modifications are quantified for selected TE system design analysis cases.

  5. Design Impacts of Stochastically-Varying Input Parameters on Advanced Thermoelectric Conversion

    SciTech Connect (OSTI)

    Hendricks, Terry J.; Karri, Naveen K.

    2007-07-18T23:59:59.000Z

    Advanced, direct thermal energy conversion technologies are receiving increased research attention in order to recover waste thermal energy in advanced vehicles and industrial processes. Advanced thermoelectric (TE) systems necessarily require integrated system-level analyses to establish accurate optimum system designs. Past system-level design and analysis has relied on well-defined deterministic input parameters even though many critically important environmental and system design parameters in the above mentioned applications are often randomly variable, sometimes according to complex relationships, rather than discrete, well-known deterministic variables. This work describes new research and development creating techniques and capabilities for probabilistic design and analysis of advanced TE power generation systems to quantify the effects of randomly uncertain design inputs in determining more robust optimum TE system designs and expected outputs. Selected case studies involving stochastic TE .material properties and coupled multi-variable stochasticity in key environmental and design parameters are presented and discussed to demonstrate key impacts from considering stochastic design inputs on the TE design optimization process. Critical findings show that: 1) stochastic Gaussian input distributions may produce Gaussian or non-Gaussian outcome probability distributions for critical TE design parameters, and 2) probabilistic input considerations can create design effects that warrant significant modifications to deterministically-derived optimum TE system designs. Magnitudes and directions of these design modifications are quantified for selected TE system design analysis cases.

  6. An Adaptive Particle Filtering Approach to Tracking Modes in a Varying Shallow Ocean Environment

    SciTech Connect (OSTI)

    Candy, J V

    2011-03-22T23:59:59.000Z

    The shallow ocean environment is ever changing mostly due to temperature variations in its upper layers (< 100m) directly affecting sound propagation throughout. The need to develop processors that are capable of tracking these changes implies a stochastic as well as an 'adaptive' design. The stochastic requirement follows directly from the multitude of variations created by uncertain parameters and noise. Some work has been accomplished in this area, but the stochastic nature was constrained to Gaussian uncertainties. It has been clear for a long time that this constraint was not particularly realistic leading a Bayesian approach that enables the representation of any uncertainty distribution. Sequential Bayesian techniques enable a class of processors capable of performing in an uncertain, nonstationary (varying statistics), non-Gaussian, variable shallow ocean. In this paper adaptive processors providing enhanced signals for acoustic hydrophonemeasurements on a vertical array as well as enhanced modal function estimates are developed. Synthetic data is provided to demonstrate that this approach is viable.

  7. Ultrasonic liquid-level detector for varying temperature and pressure environments

    DOE Patents [OSTI]

    Anderson, R.L.; Miller, G.N.

    1981-10-26T23:59:59.000Z

    An ultrasonic liquid level detector for use in varying temperature and pressure environments, such as a pressurized water nuclear reactor vessel, is provided. The detector employs ultrasonic extensional and torsional waves launched in a multiplexed alternating sequence into a common sensor. The sensor is a rectangular cross section stainless steel rod which extends into the liquid medium whose level is to be detected. The sensor temperature derived from the extensional wave velocity measurements is used to compensate for the temperature dependence of the torsional wave velocity measurements which are also level dependent. The torsional wave velocity measurements of a multiple reflection sensor then provide a measurement of liquid level over a range of several meters with a small uncertainty over a temperature range of 20 to 250/sup 0/C and pressures up to 15 MPa.

  8. Varying properties of in situ heat treatment of a tar sands formation based on assessed viscosities

    DOE Patents [OSTI]

    Karanikas, John Michael; Vinegar, Harold J

    2014-03-04T23:59:59.000Z

    A method for treating a tar sands formation includes providing heat to at least part of a hydrocarbon layer in the formation from a plurality of heaters located in the formation. The heat is allowed to transfer from the heaters to at least a portion of the formation. A viscosity of one or more zones of the hydrocarbon layer is assessed. The heating rates in the zones are varied based on the assessed viscosities. The heating rate in a first zone of the formation is greater than the heating rate in a second zone of the formation if the viscosity in the first zone is greater than the viscosity in the second zone. Fluids are produced from the formation through the production wells.

  9. Violent relaxation in two-dimensional flows with varying interaction range

    E-Print Network [OSTI]

    Venaille, A; Ruffo, S

    2015-01-01T23:59:59.000Z

    Understanding the relaxation of a system towards equilibrium is a longstanding problem in statistical mechanics. Here we address the role of long-range interactions in this process by considering a class of two-dimensional or geophysical flows where the interaction between fluid particles varies with the distance as $\\sim$$r^{$\\alpha$--2}$ with $\\alpha$ \\textgreater{} 0. Previous studies in the Euler case $\\alpha$ = 2 had shown convergence towards a variety of quasi-stationary states by changing the initial state. Unexpectedly, all those regimes are recovered by changing $\\alpha$ with a prescribed initial state. For small $\\alpha$, a coarsening process leads to the formation of a sharp interface between two regions of homogenized $\\alpha$-vorticity; for large $\\alpha$, the flow is attracted to a stable dipolar structure through a filamentation process.

  10. Influence of spatially varying pseudo-magnetic field on a 2D electron gas in graphene

    E-Print Network [OSTI]

    L. G. da Silva Leite; D. Cogollo; C. Filgueiras; Edilberto O. Silva

    2015-01-28T23:59:59.000Z

    The effect of a varying pseudo-magnetic field, which falls as $1/x^2$, on a two dimensional electron gas in graphene is investigated. By considering the second order Dirac equation, we show that its correct general solution is that which might present singular wavefunctions since such field induced by elastic deformations diverges as $x\\rightarrow0$. We show that only this consideration yields the known relativistic Landau levels when we remove such elastic field. We have observed that the zero Landau level fails to develop for certain values of it. We then speculate about the consequences of these facts to the quantum Hall effect on graphene. We also analyze the changes in the relativistic cyclotron frequency. We hope our work being probed in these contexts, since graphene has great potential for electronic applications.

  11. Varying speed of light cosmology from a stringy short distance cutoff

    E-Print Network [OSTI]

    J. C. Niemeyer

    2001-11-26T23:59:59.000Z

    It is shown that varying speed of light cosmology follows from a string-inspired minimal length uncertainty relation. Due to the reduction of the available phase space volume per quantum mode at short wavelengths, the equation of state of ultrarelativistic particles stiffens at very high densities. This causes a stronger than usual deceleration of the scale factor which competes with a higher than usual propagation speed of the particles. Various measures for the effective propagation speed are analyzed: the group and phase velocity in the high energy tail, the thermal average of the group and phase velocity, and the speed of sound. Of these three groups, only the first provides a possible solution to the cosmological horizon problem.

  12. Varying speed of light cosmology from a stringy short distance cutoff

    E-Print Network [OSTI]

    Niemeyer, J C

    2002-01-01T23:59:59.000Z

    It is shown that varying speed of light cosmology follows from a string-inspired minimal length uncertainty relation. Due to the reduction of the available phase space volume per quantum mode at short wavelengths, the equation of state of ultrarelativistic particles stiffens at very high densities. This causes a stronger than usual deceleration of the scale factor which competes with a higher than usual propagation speed of the particles. Various measures for the effective propagation speed are analyzed: the group and phase velocity in the high energy tail, the thermal average of the group and phase velocity, and the speed of sound. Of these three groups, only the first provides a possible solution to the cosmological horizon problem.

  13. Spatially varying embedded stochastic galerkin methods for steady-state PDEs.

    SciTech Connect (OSTI)

    Cyr, Eric Christopher

    2013-07-01T23:59:59.000Z

    Existing discretizations for stochastic PDEs, based on a tensor product between the deterministic basis and the stochastic basis, treat the required resolution of uncertainty as uniform across the physical domain. However, solutions to many PDEs of interest exhibit spatially localized features that may result in uncertainty being severely over or under-resolved by existing discretizations. In this report, we explore the mechanics and accuracy of using a spatially varying stochastic expansion. This is achieved through an adaptive refinement algorithm where simple error estimates are used to independently drive refinement of the stochastic basis at each point in the physical domain. Results are presented comparing the accuracy of the adaptive techinque to the accuracy achieved using uniform refinement.

  14. Peristaltic Pumping of Blood Through Small Vessels of Varying Cross-section

    E-Print Network [OSTI]

    J. C. Misra; S. Maiti

    2012-01-30T23:59:59.000Z

    The paper is devoted to a study of the peristaltic motion of blood in the micro-circulatory system. The vessel is considered to be of varying cross-section. The progressive peristaltic waves are taken to be of sinusoidal nature. Blood is considered to be a Herschel-Bulkley fluid. Of particular concern here is to investigate the effects of amplitude ratio, mean pressure gradient, yield stress and the power law index on the velocity distribution, streamline pattern and wall shear stress. On the basis of the derived analytical expression, extensive numerical calculations have been made. The study reveals that velocity of blood and wall shear stress are appreciably affected due to the non-uniform geometry of blood vessels. They are also highly sensitive to the magnitude of the amplitude ratio and the value of the fluid index.

  15. Two part condenser for varying the rate of condensing and related method

    DOE Patents [OSTI]

    Dobos, James G. (North Augusta, SC)

    2007-12-11T23:59:59.000Z

    A heat transfer apparatus, such as a condenser, is provided. The apparatus includes a first component with a first heat transfer element that has first component inlet and outlet ports through which a first fluid may pass. A second component is also included and likewise has a second heat transfer element with second component inlet and outlet ports to pass a second fluid. The first component has a body that can receive a third fluid for heat transfer with the first heat transfer element. The first and second components are releasably attachable with one another so that when attached both the first and second heat transfer elements effect heat transfer with the third fluid. Attachment and removal of the first and second components allows for the heat transfer rate of the apparatus to be varied. An associated method is also provided.

  16. Redshifting of cosmological black bodies in BSBM varying-alpha theories

    E-Print Network [OSTI]

    John D. Barrow; Joao Magueijo

    2014-11-03T23:59:59.000Z

    We analyse the behaviour of black-body radiation in theories of electromagnetism which allow the electron charge and the fine structure constant to vary in space and time. We show that such theories can be expressed as relativistic generalizations of a conventional dielectric. By making the appropriate definition of the vector potential and associated gauge transformations, we can identify the equivalent of the electric and displacement fields, $\\mathbf{E}$ and $\\mathbf{D}$, as well as the magnetic $ \\mathbf{B}$ and $\\mathbf{H}$ fields. We study the impact of such dielectrics on the propagation of light in the so-called BSBM theory and conclude that no changes are created to the standard cosmological evolution of the temperature and energy-density of black-body radiation.

  17. Primordial black holes as a probe of the early universe and a varying gravitational constant

    E-Print Network [OSTI]

    B. J. Carr

    2001-03-20T23:59:59.000Z

    We discuss recent developments in the study of primordial black holes, focussing particularly on their formation and quantum evaporation. Such studies can place important constraints on models of the early Universe. An especially interesting development has been the realization that such constraints may be severely modified if the value of the gravitational "constant" G varies with cosmological epoch, a possibility which arises in many scenarios for the early Universe. The nature of the modification depends upon whether the value of $G$ near a black hole maintains the value it had at its formation epoch (corresponding to gravitational memory) or whether it tracks the background cosmological value. This is still uncertain but we discuss various approaches which might help to resolve the issue.

  18. An asymptotic formula for polynomials orthonormal with respect to a varying weight. II

    SciTech Connect (OSTI)

    Komlov, A V; Suetin, S P [Steklov Mathematical Institute of Russian Academy of Sciences (Russian Federation)

    2014-09-30T23:59:59.000Z

    This paper gives a proof of the theorem announced by the authors in the preceding paper with the same title. The theorem states that asymptotically the behaviour of the polynomials which are orthonormal with respect to the varying weight e{sup ?2nQ(x)}p{sub g}(x)/?(?{sub j=1}{sup 2p}(x?e{sub j})) coincides with the asymptotic behaviour of the Nuttall psi-function, which solves a special boundary-value problem on the relevant hyperelliptic Riemann surface of genus g=p?1. Here e{sub 1}

  19. Using Graphs for Fast Error Term Approximation of Time-varying Datasets

    SciTech Connect (OSTI)

    Nuber, C; LaMar, E C; Pascucci, V; Hamann, B; Joy, K I

    2003-02-27T23:59:59.000Z

    We present a method for the efficient computation and storage of approximations of error tables used for error estimation of a region between different time steps in time-varying datasets. The error between two time steps is defined as the distance between the data of these time steps. Error tables are used to look up the error between different time steps of a time-varying dataset, especially when run time error computation is expensive. However, even the generation of error tables itself can be expensive. For n time steps, the exact error look-up table (which stores the error values for all pairs of time steps in a matrix) has a memory complexity and pre-processing time complexity of O(n2), and O(1) for error retrieval. Our approximate error look-up table approach uses trees, where the leaf nodes represent original time steps, and interior nodes contain an average (or best-representative) of the children nodes. The error computed on an edge of a tree describes the distance between the two nodes on that edge. Evaluating the error between two different time steps requires traversing a path between the two leaf nodes, and accumulating the errors on the traversed edges. For n time steps, this scheme has a memory complexity and pre-processing time complexity of O(nlog(n)), a significant improvement over the exact scheme; the error retrieval complexity is O(log(n)). As we do not need to calculate all possible n2 error terms, our approach is a fast way to generate the approximation.

  20. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  1. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  2. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  3. Direct and Reverse Secret-Key Capacities of a Quantum Channel

    E-Print Network [OSTI]

    Braunstein, Samuel L.

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

  4. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01T23:59:59.000Z

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  5. Origin of a complex key innovation in an obligate insectplant mutualism

    E-Print Network [OSTI]

    Krenn, Harald W.

    Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

  6. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-Print Network [OSTI]

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  7. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  8. Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser

    E-Print Network [OSTI]

    Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

  9. On the security of some password-based key agreement schemes

    E-Print Network [OSTI]

    on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19

  10. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  11. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770­2 [7] is vulnerable to a replay attack and also

  12. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks

    E-Print Network [OSTI]

    Hu, Jiankun

    A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Kejie propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous, the wireless sensor network can achieve higher key connectivity and higher resilience. I. INTRODUCTION Wireless

  13. Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates

    E-Print Network [OSTI]

    Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat the environmental correlates exert of the realized fitness of a species (Johnson and O'Neil 2001). They include

  14. Evaluation of the effects of a highway improvement project on Key deer

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30T23:59:59.000Z

    assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

  15. A Remark on Secret-Key Generation over Correlated Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    A Remark on Secret-Key Generation over Correlated Fading Channels Ashish Khisti ECE Dept. Univ@ee.ucla.edu Abstract-- We study secret-key agreement with public discussion over a flat-fading wiretap channel model. INTRODUCTION In recent years there has been a significant interest in developing secret-key agreement protocols

  16. Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion Ashish Khisti Member, IEEE Abstract Fundamental limits of secret-key generation over a two-way, reciprocal and block establish upper and lower bounds on the secret-key generation capacity with public discussion. The upper

  17. Secret-key Agreement with Channel State Information at the Transmitter

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-key Agreement with Channel State Information at the Transmitter Ashish Khisti, Member of secret-key agreement over a wiretap channel with state parameters. The transmitter com- municates discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound

  18. Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach Ashish: akhisti@comm.utoronto.ca Abstract--Fundamental limits of secret-key agreement over reciprocal wireless source generation. The resulting secret-key involves contributions of both channel sequences and source

  19. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number

  20. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  1. Quantification of uncertainty in reservoir simulations influenced by varying input geological parameters, Maria Reservoir, CaHu Field 

    E-Print Network [OSTI]

    Schepers, Karine Chrystel

    2005-02-17T23:59:59.000Z

    QUANTIFICATION OF UNCERTAINTY IN RESERVOIR SIMULATIONS INFLUENCED BY VARYING INPUT GEOLOGICAL PARAMETERS, MARIA RESERVOIR, CAHU FIELD A Thesis by KARINE CHRYSTEL SCHEPERS Submitted to the Office of Graduate... BY VARYING INPUT GEOLOGICAL PARAMETERS, MARIA RESERVOIR, CAHU FIELD A Thesis by KARINE CHRYSTEL SCHEPERS Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree...

  2. Quantification of uncertainty in reservoir simulations influenced by varying input geological parameters, Maria Reservoir, CaHu Field

    E-Print Network [OSTI]

    Schepers, Karine Chrystel

    2005-02-17T23:59:59.000Z

    QUANTIFICATION OF UNCERTAINTY IN RESERVOIR SIMULATIONS INFLUENCED BY VARYING INPUT GEOLOGICAL PARAMETERS, MARIA RESERVOIR, CAHU FIELD A Thesis by KARINE CHRYSTEL SCHEPERS Submitted to the Office of Graduate... BY VARYING INPUT GEOLOGICAL PARAMETERS, MARIA RESERVOIR, CAHU FIELD A Thesis by KARINE CHRYSTEL SCHEPERS Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree...

  3. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  4. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    SciTech Connect (OSTI)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01T23:59:59.000Z

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  5. Searching for non-diagonal Mass varying mechanism in the $?_?$-$?_?$ system

    E-Print Network [OSTI]

    D. R. Gratieri; O. L. G. Peres

    2014-05-27T23:59:59.000Z

    We use atmospheric neutrino data and MINOS data to constrain the MaVaN (Mass Varying Neutrinos) mechanism. The MaVaN model was largely studied in cosmology scenarios and comes from the coupling of the neutrinos with a neutral scalar depending on the local matter density. For atmospheric neutrinos, this new interaction affects the neutrino propagation inside the Earth, and as consequence, induces modifications in their oscillation pattern. To perform such test for a non-standard oscillation mechanism with a non-diagonal neutrino coupling in the mass basis, we analyze the angular distribution of atmospheric neutrino events as seen by the Super-Kamiokande experiment for the events in the Sub-GeV and multi-GeV range and muon neutrinos (anti-neutrinos) in MINOS experiment. From the combined analysis of these two sets of data we obtain the best fit for $\\Delta m^{2}_{32}=2.45 \\times 10^{-3}$ eV$^{2}$, $sin^{2}(\\theta_{23})=0.42 $ and MaVaN parameter $\\alpha_{32}=0.28$ with modest improvement, $\\Delta \\chi^{2}= 1.8$, over the standard oscillation scenario. The combination of MINOS data and Super-Kamiokande data prefers small values of MaVaN parameter $\\alpha_{32} < 0.31 $ at $90 \\%$ C. L..

  6. Interpolation Approach to Hamiltonian-varying Quantum Systems and the Adiabatic Theorem

    E-Print Network [OSTI]

    Yu Pan; Zibo Miao; Nina H. Amini; Valery Ugrinovskii; Matthew R. James

    2015-03-11T23:59:59.000Z

    Quantum control could be implemented by varying the system Hamiltonian. According to adiabatic theorem, a slowly changing Hamiltonian can approximately keep the system at the ground state during the evolution if the initial state is a ground state. In this paper we consider this process as an interpolation between the initial and final Hamiltonians. We use the mean value of a single operator to measure the distance between the final state and the ideal ground state. This measure could be taken as the error of adiabatic approximation. We prove under certain conditions, this error can be precisely estimated for an arbitrarily given interpolating function. This error estimation could be used as guideline to induce adiabatic evolution. According to our calculation, the adiabatic approximation error is not proportional to the average speed of the variation of the system Hamiltonian and the inverse of the energy gaps in many cases. In particular, we apply this analysis to an example on which the applicability of the adiabatic theorem is questionable.

  7. Reconstructing the Profile of Time-Varying Magnetic Fields With Quantum Sensors

    E-Print Network [OSTI]

    Easwar Magesan; Alexandre Cooper; Honam Yum; Paola Cappellaro

    2013-05-28T23:59:59.000Z

    Quantum systems have shown great promise for precision metrology thanks to advances in their control. This has allowed not only the sensitive estimation of external parameters but also the reconstruction of their temporal profile. In particular, quantum control techniques and orthogonal function theory have been applied to the reconstruction of the complete profiles of time-varying magnetic fields. Here, we provide a detailed theoretical analysis of the reconstruction method based on the Walsh functions, highlighting the relationship between the orthonormal Walsh basis, sensitivity of field reconstructions, data compression techniques, and dynamical decoupling theory. Specifically, we show how properties of the Walsh basis and a detailed sensitivity analysis of the reconstruction protocol provide a method to characterize the error between the reconstructed and true fields. In addition, we prove various results about the negligibility function on binary sequences which lead to data compression techniques in the Walsh basis and a more resource-efficient reconstruction protocol. The negligibility proves a fruitful concept to unify the information content of Walsh functions and their dynamical decoupling power, which makes the reconstruction method robust against noise.

  8. Daily Thermal Predictions of the AGR-1 Experiment with Gas Gaps Varying with Time

    SciTech Connect (OSTI)

    Grant Hawkes; James Sterbentz; John Maki; Binh Pham

    2012-06-01T23:59:59.000Z

    A new daily as-run thermal analysis was performed at the Idaho National Laboratory on the Advanced Gas Reactor (AGR) test experiment number one at the Advanced Test Reactor (ATR). This thermal analysis incorporates gas gaps changing with time during the irradiation experiment. The purpose of this analysis was to calculate the daily average temperatures of each compact to compare with experimental results. Post irradiation examination (PIE) measurements of the graphite holder and fuel compacts showed the gas gaps varying from the beginning of life. The control temperature gas gap and the fuel compact – graphite holder gas gaps were linearly changed from the original fabrication dimensions, to the end of irradiation measurements. A steady-state thermal analysis was performed for each daily calculation. These new thermal predictions more closely match the experimental data taken during the experiment than previous analyses. Results are presented comparing normalized compact average temperatures to normalized log(R/B) Kr-85m. The R/B term is the measured release rate divided by the predicted birth rate for the isotope Kr-85m. Correlations between these two normalized values are presented.

  9. Tuneable drug-loading capability of chitosan hydrogels with varied network architectures

    E-Print Network [OSTI]

    Tronci, Giuseppe; Russell, Stephen J; Wood, David J; Akashi, Mitsuru

    2013-01-01T23:59:59.000Z

    Advanced bioactive systems with defined macroscopic properties and spatio-temporal sequestration of extracellular biomacromolecules are highly desirable for next generation therapeutics. Here, chitosan hydrogels were prepared with neutral or negatively-charged crosslinkers in order to promote selective electrostatic complexation with charged drugs. Chitosan (CT) was functionalised with varied dicarboxylic acids, such as tartaric acid (TA), poly(ethylene glycol) bis(carboxymethyl) ether (PEG), 1.4-Phenylenediacetic acid (4Ph) and 5-Sulfoisophthalic acid monosodium salt (PhS), whereby PhS was hypothesised to act as a simple mimetic of heparin. ATR FT-IR showed the presence of C=O amide I, N-H amide II and C=O ester bands, providing evidence of covalent network formation. The crosslinker content was reversely quantified by 1H-NMR on partially-degraded network oligomers, so that 18 mol% PhS was exemplarily determined. Swellability, compressability, material morphology, and drug-loading capability were successfull...

  10. Does the Newton's gravitational constant vary sinusoidally with time? An independent test with planetary orbital motions

    E-Print Network [OSTI]

    Iorio, Lorenzo

    2015-01-01T23:59:59.000Z

    A sinusoidally time-varying pattern for the values of the Newton's constant of gravitation $G$ measured in Earth-based laboratories over the latest decades has been recently reported in the literature. Its amplitude and period amount to $A_G=1.619\\times 10^{-14} \\textrm{kg}^{-1} \\textrm{m}^3 \\textrm{s}^{-2}, P_G=5.899 \\textrm{yr}$, respectively. Given the fundamental role played by $G$ in the currently accepted theory of gravitation and the attempts to merge it with quantum mechanics, it is important to put to the test the hypothesis that the aforementioned harmonic variation may pertain $G$ itself in a direct and independent way. The bounds on $\\dot G/G$ existing in the literature may not be extended straightforwardly to the present case since they were inferred by considering just secular variations. Thus, we numerically integrated the ad-hoc modified equations of motion of the major bodies of the Solar System by finding that the orbits of the planets would be altered by an unacceptably larger amount in vie...

  11. Positivity, Discontinuity, Finite Resources and Nonzero Error for Arbitrarily Varying Quantum Channels

    E-Print Network [OSTI]

    H. Boche; J. Noetzel

    2014-05-07T23:59:59.000Z

    This work is motivated by a quite general question: Under which circumstances are the capacities of information transmission systems continuous? The research is explicitly carried out on arbitrarily varying quantum channels (AVQCs). We give an explicit example that answers the recent question whether the transmission of messages over AVQCs can benefit from distribution of randomness between the legitimate sender and receiver in the affirmative. The specific class of channels introduced in that example is then extended to show that the deterministic capacity does have discontinuity points, while that behaviour is, at the same time, not generic: We show that it is continuous around its positivity points. This is in stark contrast to the randomness-assisted capacity, which is always continuous in the channel. Our results imply that the deterministic message transmission capacity of an AVQC can be discontinuous only in points where it is zero, while the randomness assisted capacity is nonzero. Apart from the zero-error capacities, this is the first result that shows a discontinuity of a capacity for a large class of quantum channels. The continuity of the respective capacity for memoryless quantum channels had, among others, been listed as an open problem on the problem page of the ITP Hannover for about six years before it was proven to be continuous. We also quantify the interplay between the distribution of finite amounts of randomness between the legitimate sender and receiver, the (nonzero) decoding error with respect to the average error criterion that can be achieved over a finite number of channel uses and the number of messages that can be sent. This part of our results also applies to entanglement- and strong subspace transmission. In addition, we give a new sufficient criterion for the entanglement transmission capacity with randomness assistance to vanish.

  12. Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using “Omics”

    SciTech Connect (OSTI)

    Myrold, David D. [Oregon State University; Bottomely, Peter J. [Oregon State University; Jumpponen, Ari [Kansas State University; Rice, Charles W. [Kansas State University; Zeglin, Lydia H. [Kansas State University; David, Maude M. [Lawrence Berkeley National Laboratory; Jansson, Janet K. [Lawrence Berkeley National Laboratory; Prestat, Emmanuel [Lawrence Berkeley National Laboratory; Hettich, Robert L. [Oak Ridge National Laboratory

    2014-09-17T23:59:59.000Z

    Soils process and store large amounts of C; however, considerable uncertainty still exists about the details of that influence microbial partitioning of C into soil C pools, and what are the main influential forces that control the fraction of the C input that is stabilized. The soil microbial community is genotypically and phenotypically diverse. Despite our ability to predict the kinds of regional environmental changes that will accompany global climate change, it is not clear how the microbial community will respond to climate-induced modification of precipitation and inter-precipitation intervals, and if this response will affect the fate of C deposited into soil by the local plant community. Part of this uncertainty lies with our ignorance of how the microbial community adapts genotypically and physiologically to changes in soil moisture brought about by shifts in precipitation. Our overarching goal is to harness the power of multiple meta-omics tools to gain greater understanding of the functioning of whole-soil microbial communities and their role in C cycling. We will do this by meeting the following three objectives: 1. Further develop and optimize a combination of meta-omics approaches to study how environmental factors affect microbially-mediated C cycling processes. 2. Determine the impacts of long-term changes in precipitation timing on microbial C cycling using an existing long-term field manipulation of a tallgrass prairie soil. 3. Conduct laboratory experiments that vary moisture and C inputs to confirm field observations of the linkages between microbial communities and C cycling processes. We took advantage of our state-of-the-art expertise in community “omics” to better understand the functioning soil C cycling within the Great Prairie ecosystem, including our ongoing Konza Prairie soil metagenome flagship project at JGI and the unique rainfall manipulation plots (RaMPs) established at this site more than a decade ago. We employed a systems biology approach, considering the complex soil microbial community as a functioning system and using state-of-the-art metatranscriptomic, metaproteomic, and metabolomic approaches. These omics tools were refined, applied to field experiments, and confirmed with controlled laboratory studies. Our experiments were designed to specifically identify microbial community members and processes that are instrumental players in processing of C in the prairie soils and how these processes are impacted by wetting and drying events. This project addresses a key ecosystem in the United States that current climate models predict will be subjected to dramatic changes in rainfall patterns as a result of global warming. Currently Mollisols, such as those of the tallgrass prairie, are thought to sequester more C than is released into the atmosphere, but it is not known what changes in rainfall patterns will have on future C fluxes. Through an analysis of the molecular response of the soil microbial community to shifts in precipitation cycles that are accompanied by phenologically driven changes in quality of plant C rhizodeposits, we gained deeper insight into how the metabolism of microbes has adapted to different precipitation regimes and the impact of this adaption on the fate of C deposited into soil. In doing so, we addressed key questions about the microbial cycling of C in soils that have been identified by the DOE.

  13. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09T23:59:59.000Z

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  14. Generalized decoding, effective channels, and simplified security proofs in quantum key distribution

    SciTech Connect (OSTI)

    Renes, Joseph M. [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany); Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck-Forschungsgruppe, Institut fuer Optik, Information und Photonik, Universitaet Erlangen-Nuernberg, Staudtstrasse 7, D-91058 Erlangen (Germany); Grassl, Markus [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany)

    2006-08-15T23:59:59.000Z

    Prepare and measure quantum key distribution protocols can be decomposed into two basic steps: delivery of the signals over a quantum channel and distillation of a secret key from the signal and measurement records by classical processing and public communication. Here we formalize the distillation process for a general protocol in a purely quantum-mechanical framework and demonstrate that it can be viewed as creating an 'effective' quantum channel between the legitimate users Alice and Bob. The process of secret key generation can then be viewed as entanglement distribution using this channel, which enables application of entanglement-based security proofs to essentially any prepare and measure protocol. To ensure secrecy of the key, Alice and Bob must be able to estimate the channel noise from errors in the key, and we further show how symmetries of the distillation process simplify this task. Applying this method, we prove the security of several key distribution protocols based on equiangular spherical codes.

  15. System and method for constructing filters for detecting signals whose frequency content varies with time

    DOE Patents [OSTI]

    Qian, S.; Dunham, M.E.

    1996-11-12T23:59:59.000Z

    A system and method are disclosed for constructing a bank of filters which detect the presence of signals whose frequency content varies with time. The present invention includes a novel system and method for developing one or more time templates designed to match the received signals of interest and the bank of matched filters use the one or more time templates to detect the received signals. Each matched filter compares the received signal x(t) with a respective, unique time template that has been designed to approximate a form of the signals of interest. The robust time domain template is assumed to be of the order of w(t)=A(t)cos(2{pi}{phi}(t)) and the present invention uses the trajectory of a joint time-frequency representation of x(t) as an approximation of the instantaneous frequency function {phi}{prime}(t). First, numerous data samples of the received signal x(t) are collected. A joint time frequency representation is then applied to represent the signal, preferably using the time frequency distribution series. The joint time-frequency transformation represents the analyzed signal energy at time t and frequency f, P(t,f), which is a three-dimensional plot of time vs. frequency vs. signal energy. Then P(t,f) is reduced to a multivalued function f(t), a two dimensional plot of time vs. frequency, using a thresholding process. Curve fitting steps are then performed on the time/frequency plot, preferably using Levenberg-Marquardt curve fitting techniques, to derive a general instantaneous frequency function {phi}{prime}(t) which best fits the multivalued function f(t). Integrating {phi}{prime}(t) along t yields {phi}{prime}(t), which is then inserted into the form of the time template equation. A suitable amplitude A(t) is also preferably determined. Once the time template has been determined, one or more filters are developed which each use a version or form of the time template. 7 figs.

  16. CORN DEVELOPMENT AND KEY GROWTH STAGES Brent Bean and Carl Patrick, Extension Agronomist and Entomologist

    E-Print Network [OSTI]

    Mukhtar, Saqib

    CORN DEVELOPMENT AND KEY GROWTH STAGES Brent Bean and Carl Patrick, Extension Agronomist to have the soil profile full of water prior to tas

  17. Modeling Metal Fatigue As a Key Step in PV Module Life Time Prediction (Presentation)

    SciTech Connect (OSTI)

    Bosco, N.

    2012-02-01T23:59:59.000Z

    This presentation covers modeling metal fatigue as a key step in photovoltaic (PV) module lifetime predictions. Described are time-dependent and time-independent case studies.

  18. California's water futures: How water conservation and varying Delta exports affect water supply in the face of climate change

    E-Print Network [OSTI]

    Lund, Jay R.

    i California's water futures: How water conservation and varying Delta exports affect water supply implications of changes in urban water conservation, Delta export capacity, and a dry form of climate warming desalination, and expanded water recycling. Results indicate that, depending on climate and Delta export

  19. Careers in forestry are exceptionally varied, challenging, and personally satisfying. Opportunities are available in rural and urban settings

    E-Print Network [OSTI]

    FORESTRY Careers in forestry are exceptionally varied, challenging, and personally satisfying. Opportunities are available in rural and urban settings worldwide. With the many facets of forestry today, jobs are myriad--forest science, urban forestry, forest conservation, forest ecology, forest biology, resource

  20. Careers in forestry are exceptionally varied, challenging, and personally satisfying. Opportunities are available in rural and urban settings

    E-Print Network [OSTI]

    FORESTRY Careers in forestry are exceptionally varied, challenging, and personally satisfying. Opportunities are available in rural and urban settings worldwide. With the many facets of forestry today, jobs are myriad--forest science, urban forestry, forest conservation, forest ecology, forest biology, forest re