National Library of Energy BETA

Sample records for varying key assumptions

  1. Key Assumptions Policy Issues

    E-Print Network [OSTI]

    Supply Limitations 8 Withi h B l i8. Within-hour Balancing 9. Capacity and Energy Values for Wind · Independent Power Producers C t ti· Current assumptions · Winter: full availability ~ 3,200 MW · Summer: 1 t b it d d li d· Thermal: must be sited and licensed · Wind/solar: must be sited and licensed · EE

  2. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Wayne Moe

    2013-05-01

    This document provides key definitions, plant capabilities, and inputs and assumptions related to the Next Generation Nuclear Plant to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor. These definitions, capabilities, and assumptions were extracted from a number of NGNP Project sources such as licensing related white papers, previously issued requirement documents, and preapplication interactions with the Nuclear Regulatory Commission (NRC).

  3. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Phillip Mills

    2012-02-01

    This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

  4. Preliminary Review of Models, Assumptions, and Key Data used in Performance Assessments and Composite Analysis at the Idaho National Laboratory

    SciTech Connect (OSTI)

    Arthur S. Rood; Swen O. Magnuson

    2009-07-01

    This document is in response to a request by Ming Zhu, DOE-EM to provide a preliminary review of existing models and data used in completed or soon to be completed Performance Assessments and Composite Analyses (PA/CA) documents, to identify codes, methodologies, main assumptions, and key data sets used.

  5. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    's power plan to include a forecast of electricity demand for the next 20 years. Demand, to a large extent, is....................................................................................................................................... 16 Forecast of Retail Electricity Prices................................................................................................................... 17 SUMMARY OF KEY FINDINGS Pacific Northwest population and energy costs are expected to increase

  6. declaration assumption,

    E-Print Network [OSTI]

    Ábrahám, Erika

    Initial Type Assumption A 0 A 0 (x) = 8a: a for all x 2 V A 0 (c) = pre-de#12;ned type schema in haskell, for all c 2 C 0 A 0 (constr) = 8 (type 1 ! : : : ! type n ! (tyconstr a 1 : : : am )); A 0 (bot;) or the computation fails because of a failing uni#12;cation problem. Let c 2 C [ V. #15; W(A + fc :: 8a 1

  7. DRAFT, 8/2/07 List of Key Assumptions

    E-Print Network [OSTI]

    of waste, 35 lb for empty 30 gallon drum and 4 lb for lift webbing inside the shielded container) v. pass all DOT-7A tests (4 foot drop and stacking test expected to govern design) vi. will be filtered b waste stack) and it is all contact handled b. The shielded containers will be placed with CH waste

  8. Heap Assumptions on Demand Andreas Podelski1

    E-Print Network [OSTI]

    Wies, Thomas

    Heap Assumptions on Demand Andreas Podelski1 , Andrey Rybalchenko2 , and Thomas Wies1 1 University checker and shape analysis. The shape analysis pro- duces heap assumptions on demand to eliminate.e., it applies shape analysis on demand. The shape analysis produces a heap assumption, which is an assertion

  9. Time-varying Spectral Analysis in Neurophysiological Time Series Using Hilbert

    E-Print Network [OSTI]

    Whitcher, Brandon

    ability to detect time-varying coherence and phase properties. Key words: Coherence, electromyographic

  10. Manufacturing Energy and Carbon Footprint Definitions and Assumptions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Definitions and Assumptions, October 2012 Manufacturing Energy and Carbon Footprint Definitions and Assumptions, October 2012 footprintsassumptionsdefinitions2012.pdf More...

  11. Cosmology with Varying Constants

    E-Print Network [OSTI]

    C. J. A. P. Martins

    2000-08-18

    I motivate and discuss some recent work on theories with varying constants, and consider some possible observational consequences and tests. Particular emphasis is given to models which can (almost) exactly mimic the predictions of standard inflationary models.

  12. Counterexamples to commonly held Assumptions on

    E-Print Network [OSTI]

    Gatterbauer, Wolfgang

    Counterexamples to commonly held Assumptions on Unit Commitment and Market Power Assessment NAPS and Decentralized Unit Commitment (PoolCo vs. PX) · Determination of Market Power revisiting the fundamental Information 1: PoolCo vs PX · Unit Commitment: Technological constraints (minimum up-time, starting costs

  13. Preliminary Assumptions for Natural Gas Peaking

    E-Print Network [OSTI]

    ; adjusted to 2012$, state construction cost index, vintage of cost estimate, scope of estimate to extent's Discussion Aeroderivative Gas Turbine Technology Proposed reference plant and assumptions Preliminary cost Robbins 2 #12;Peaking Power Plant Characteristics 6th Power Plan ($2006) Unit Size (MW) Capital Cost ($/k

  14. KEY PERSONNEL

    National Nuclear Security Administration (NNSA)

    KEY PERSONNEL 7062015 TITLE NAME President Christopher C. Gentile Vice President, Engineering Robin Stubenhofer Vice President, Integrated Supply Chain Rick Lavelock Director,...

  15. A new scenario framework for climate change research: The concept of Shared Climate Policy Assumptions

    SciTech Connect (OSTI)

    Kriegler, Elmar; Edmonds, James A.; Hallegatte, Stephane; Ebi, Kristie L.; Kram, Tom; Riahi, Keywan; Winkler, Harald; Van Vuuren, Detlef

    2014-04-01

    The paper presents the concept of shared climate policy assumptions as an important element of the new scenario framework. Shared climate policy assumptions capture key climate policy dimensions such as the type and scale of mitigation and adaptation measures. They are not specified in the socio-economic reference pathways, and therefore introduce an important third dimension to the scenario matrix architecture. Climate policy assumptions will have to be made in any climate policy scenario, and can have a significant impact on the scenario description. We conclude that a meaningful set of shared climate policy assumptions is useful for grouping individual climate policy analyses and facilitating their comparison. Shared climate policy assumptions should be designed to be policy relevant, and as a set to be broad enough to allow a comprehensive exploration of the climate change scenario space.

  16. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions to

  17. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions to00

  18. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions

  19. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions33

  20. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions3302

  1. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions330247

  2. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions330247

  3. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions330247

  4. Manufacturing Energy and Carbon Footprint Definitions and Assumptions, October 2012

    Broader source: Energy.gov [DOE]

    Definitions of parameters and table of assumptions for the Manufacturing Energy and Carbon Footprint

  5. Session-Key Generation using Human Passwords Only Oded Goldreich

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session-Key Generation using Human Passwords Only Oded Goldreich Department of Computer Science present session-key generation protocols in a model where the legitimate parties share only a human assumptions. Keywords: Session-key generation (authenticated key-exchange), mutual authentication proto- cols

  6. SessionKey Generation using Human Passwords Only # Oded Goldreich +

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session­Key Generation using Human Passwords Only # Oded Goldreich + Department of Computer Science present session­key generation protocols in a model where the legitimate parties share only a human setup assumptions. Keywords: Session­key generation (authenticated key­exchange), mutual authentication

  7. Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Allison to yield a construction of pseudorandom functions under the decisional k-Linear Assumption, for each k 1 In this paper, we generalize Naor and Reingold's construction of pseudorandom functions under the DDH Assumption

  8. Assumption-Commitment Support for CSP Model Checking

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 Assumption-Commitment Support for CSP Model Checking Nick Moffat1 Systems Assurance using CSP. In our formulation, an assumption-commitment style property of a process SYS takes the form-Guarantee, CSP, Model Checking, Compositional Reasoning 1 Introduction The principle of compositional program

  9. Analyzing spatially-varying blur

    E-Print Network [OSTI]

    Chakrabarti, Ayan

    Blur is caused by a pixel receiving light from multiple scene points, and in many cases, such as object motion, the induced blur varies spatially across the image plane. However, the seemingly straight-forward task of ...

  10. STUDENT FORM GENERAL RELEASE FORM & ASSUMPTION OF RISK

    E-Print Network [OSTI]

    Schaefer, Marcus

    STUDENT FORM GENERAL RELEASE FORM & ASSUMPTION OF RISK DePaul University School of Cinematic Arts I that while enrolling in the Course may be a requirement for achieving my degree in Cinematic Arts at De

  11. Computational soundness for standard assumptions of formal cryptography

    E-Print Network [OSTI]

    Herzog, Jonathan, 1975-

    2004-01-01

    This implementation is conceptually simple, and relies only on general assumptions. Specifically, it can be thought of as a 'self-referential' variation on a well-known encryption scheme. 4. Lastly, we show how the ...

  12. Unconscious Biases and Assumptions: The Origins of Discrimination?

    E-Print Network [OSTI]

    Sheridan, Jennifer

    #12;Unconscious Biases and Assumptions: The Origins of Discrimination? #12;Outline Examples of subtle discrimination What is "unconscious bias" and do I have it? What to do? #12;Applications is causing these phenomena? Discrimination? Or... Unconscious Bias? #12;Mind-blindness Count

  13. Utilizing Symmetry when Model Checking under Fairness Assumptions: An Automatatheoretic

    E-Print Network [OSTI]

    Emerson, E. Allen

    ­ current Programming General Terms: Verification, Model Checking, Temporal Logic, Abstraction AdditionalUtilizing Symmetry when Model Checking under Fairness Assumptions: An Automata­theoretic Approach E temporal logic model checking. In previous work it is shown how, using some basic notions of group theory

  14. Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions Nico D¨ottling, Thilo Mie, J¨orn M for obfuscation, and using tamper-proof hardware tokens to achieve general code obfuscation. Following this last on the security of this CRS. Keywords: Obfuscation, Stateless Tamper-Proof hardware, Universal Composability

  15. COMPARING ALASKA'S OIL PRODUCTION TAXES: INCENTIVES AND ASSUMPTIONS1

    E-Print Network [OSTI]

    Pantaleone, Jim

    1 COMPARING ALASKA'S OIL PRODUCTION TAXES: INCENTIVES AND ASSUMPTIONS1 Matthew Berman In a recent analysis comparing the current oil production tax, More Alaska Production Act (MAPA, also known as SB 21 oil prices, production rates, and costs. He noted that comparative revenues are highly sensitive

  16. QPE: Using assumption-based truth maintenance for qualitative simulation

    E-Print Network [OSTI]

    Forbus, Kenneth D.

    writin g such programs. This paper identifies several abstractions for organizing ATMS-based problem a mechanism for making closed-world assumptions . We sketch the design of the Qualitative Process Engine, QPE simulation as a module in a larger task . All of these research directions require substantially more

  17. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  18. Unifying classical and quantum key distillation

    E-Print Network [OSTI]

    Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

    2007-02-28

    Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

  19. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  20. Local Varying-Alpha Theories

    E-Print Network [OSTI]

    John D. Barrow; Joao Magueijo

    2015-01-30

    In a recent paper we demonstrated how the simplest model for varying alpha may be interpreted as the effect of a dielectric material, generalized to be consistent with Lorentz invariance. Unlike normal dielectrics, such a medium cannot change the speed of light, and its dynamics obey a Klein-Gordon equation. This work immediately suggests an extension of the standard theory, even if we require compliance with Lorentz invariance. Instead of a wave equation, the dynamics may satisfy a local algebraic relation involving the permittivity and the properties of the electromagnetic field, in analogy with more conventional dielectric (but still preserving Lorentz invariance). We develop the formalism for such theories and investigate some phenomenological implications. The problem of the divergence of the classical self-energy can be solved, or at least softened, in this framework. Some interesting new cosmological solutions for the very early universe are found, including the possibility of a bounce, inflation and expansion with a loitering phase, all of which are induced by early variations in alpha.

  1. Developing a decision model to describe levels of self-directedness based upon the key assumptions of andragogy 

    E-Print Network [OSTI]

    Richards, Lance Jonathan

    2005-11-01

    As workplace demands change, a need has developed for alternatives to traditional education. With advancements in electronic telecommunication technologies, distance education has become a viable alternative to traditional ...

  2. Assumption Parish, Louisiana: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAandAmminex A SOpenAshley, Ohio: Energy-Resource |CarbonAssumption Parish,

  3. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  4. Testing the assumptions of linear prediction analysis in normal vowels

    E-Print Network [OSTI]

    Max Little; Patrick E. McSharry; Irene M. Moroz; Stephen J. Roberts

    2006-01-04

    This paper develops an improved surrogate data test to show experimental evidence, for all the simple vowels of US English, for both male and female speakers, that Gaussian linear prediction analysis, a ubiquitous technique in current speech technologies, cannot be used to extract all the dynamical structure of real speech time series. The test provides robust evidence undermining the validity of these linear techniques, supporting the assumptions of either dynamical nonlinearity and/or non-Gaussianity common to more recent, complex, efforts at dynamical modelling speech time series. However, an additional finding is that the classical assumptions cannot be ruled out entirely, and plausible evidence is given to explain the success of the linear Gaussian theory as a weak approximation to the true, nonlinear/non-Gaussian dynamics. This supports the use of appropriate hybrid linear/nonlinear/non-Gaussian modelling. With a calibrated calculation of statistic and particular choice of experimental protocol, some of the known systematic problems of the method of surrogate data testing are circumvented to obtain results to support the conclusions to a high level of significance.

  5. The contour method cutting assumption: error minimization and correction

    SciTech Connect (OSTI)

    Prime, Michael B; Kastengren, Alan L

    2010-01-01

    The recently developed contour method can measure 2-D, cross-sectional residual-stress map. A part is cut in two using a precise and low-stress cutting technique such as electric discharge machining. The contours of the new surfaces created by the cut, which will not be flat if residual stresses are relaxed by the cutting, are then measured and used to calculate the original residual stresses. The precise nature of the assumption about the cut is presented theoretically and is evaluated experimentally. Simply assuming a flat cut is overly restrictive and misleading. The critical assumption is that the width of the cut, when measured in the original, undeformed configuration of the body is constant. Stresses at the cut tip during cutting cause the material to deform, which causes errors. The effect of such cutting errors on the measured stresses is presented. The important parameters are quantified. Experimental procedures for minimizing these errors are presented. An iterative finite element procedure to correct for the errors is also presented. The correction procedure is demonstrated on experimental data from a steel beam that was plastically bent to put in a known profile of residual stresses.

  6. Key Directions and a Roadmap for Electrical Design for Manufacturability

    E-Print Network [OSTI]

    Kahng, Andrew B.

    Key Directions and a Roadmap for Electrical Design for Manufacturability (Invited Talk) Andrew B by design and design-for- manufacturability (DFM) techniques. This talk addresses trends and a roadmap assumptions come true? The second part will give a roadmap for electrical DFM technologies, motivated

  7. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  8. Cost and Performance Assumptions for Modeling Electricity Generation Technologies

    SciTech Connect (OSTI)

    Tidball, R.; Bluestein, J.; Rodriguez, N.; Knoke, S.

    2010-11-01

    The goal of this project was to compare and contrast utility scale power plant characteristics used in data sets that support energy market models. Characteristics include both technology cost and technology performance projections to the year 2050. Cost parameters include installed capital costs and operation and maintenance (O&M) costs. Performance parameters include plant size, heat rate, capacity factor or availability factor, and plant lifetime. Conventional, renewable, and emerging electricity generating technologies were considered. Six data sets, each associated with a different model, were selected. Two of the data sets represent modeled results, not direct model inputs. These two data sets include cost and performance improvements that result from increased deployment as well as resulting capacity factors estimated from particular model runs; other data sets represent model input data. For the technologies contained in each data set, the levelized cost of energy (LCOE) was also evaluated, according to published cost, performance, and fuel assumptions.

  9. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  10. The Power of a Few Large Blocks: A credible assumption with incredible efficiency

    E-Print Network [OSTI]

    Foster, Dean P.

    i.i.d. assumption about the error structure, the two-sample t-statistic for oil was significantThe Power of a Few Large Blocks: A credible assumption with incredible efficiency Dongyu Lin and Dean P. Foster Abstract The most powerful assumption in data analysis is that of independence. Unfortu

  11. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  12. Key Reference Agilent Technologies

    E-Print Network [OSTI]

    Anlage, Steven

    is provided "as is", and is subject to being changed, without notice, in future editions. Further with the User and should any of the contract terms conflict with these terms, the contract terms shall control enables you to define the number of points in a step sweep. When you press this key, the current value

  13. Key Research Results Achievement

    E-Print Network [OSTI]

    ) evaluated several common figures of merit used to compare the electrical and optical performance of TCsKey Research Results Achievement NREL research significantly contributed to inadequate existing not yet at performance levels of TCOs, demonstrate a much better combination of transmission

  14. Key Research Results Achievement

    E-Print Network [OSTI]

    % energy savings in new buildings and major renovations. Researchers at the National Renewable Energy%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvancedEnergy to use signifi- cantly less energy--reducing operating costs and greenhouse gas emissions. This new K-12

  15. Solar mass-varying neutrino oscillations

    E-Print Network [OSTI]

    Marfatia, Danny; Huber, P.; Barger, V.

    2005-11-18

    We propose that the solar neutrino deficit may be due to oscillations of mass-varying neutrinos (MaVaNs). This scenario elucidates solar neutrino data beautifully while remaining comfortably compatible with atmospheric ...

  16. Key Management in Historical Context

    E-Print Network [OSTI]

    ;Rolling Keys Why change keys? --- cryptoperiod (intrinsic to cryptosystem) --- management issuesKey Management in Historical Context Whitfield Diffie Internet Corporation for Assigned Names to become the security or insecurity of the message. #12;Key management systems both reflect and shape

  17. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  18. Microwave fidelity studies by varying antenna coupling

    E-Print Network [OSTI]

    B. Köber; U. Kuhl; H. -J. Stöckmann; T. Gorin; D. V. Savin; T. H. Seligman

    2010-09-16

    The fidelity decay in a microwave billiard is considered, where the coupling to an attached antenna is varied. The resulting quantity, coupling fidelity, is experimentally studied for three different terminators of the varied antenna: a hard wall reflection, an open wall reflection, and a 50 Ohm load, corresponding to a totally open channel. The model description in terms of an effective Hamiltonian with a complex coupling constant is given. Quantitative agreement is found with the theory obtained from a modified VWZ approach [Verbaarschot et al, Phys. Rep. 129, 367 (1985)].

  19. BEHAVIORAL ASSUMPTION-BASED PREDICTION FOR HIGH-LATENCY HIDING IN MOBILE GAMES

    E-Print Network [OSTI]

    Bidarra, Rafael

    Carpentier and Rafael Bidarra Computer Graphics and CAD/CAM Group Faculty of Electrical Engineering assumptions, designed to be suitable for racing titles. Although these assumptions limit the accuracy it possible to create a real-time multi-player race game using today's GPRS network. INTRODUCTION The widely

  20. The Thermal Collector With Varied Glass Covers

    SciTech Connect (OSTI)

    Luminosu, I.; Pop, N.

    2010-08-04

    The thermal collector with varied glass covers represents an innovation realized in order to build a collector able to reach the desired temperature by collecting the solar radiation from the smallest surface, with the highest efficiency. In the case of the thermal collector with variable cover glasses, the number of the glass plates covering the absorber increases together with the length of the circulation pipe for the working fluid. The thermal collector with varied glass covers compared to the conventional collector better meet user requirements because: for the same temperature increase, has the collecting area smaller; for the same collection area, realizes the highest temperature increase and has the highest efficiency. This works is addressed to researchers in the solar energy and to engineers responsible with air-conditioning systems design or industrial and agricultural products drying.

  1. Moldy Assumptions

    E-Print Network [OSTI]

    Heully, Gustave Paul

    2012-01-01

    historian of architecture and technology had waded out tillspores tie architecture’s tectonics and technologies to theon architecture’s connection to philosophy, technology and

  2. System Identification: Time Varying and Nonlinear Methods 

    E-Print Network [OSTI]

    Majji, Manoranjan

    2010-07-14

    fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Approved by: Chair of Committee, John L. Junkins Committee Members, Aniruddha Datta Jer-Nan Juang Daniele Mortari Othon K. Rediniotis Srinivas R. Vadali Head of Department... time varying systems are governed by a set of difference equations governing the evolution of the state in time being given by 1k k k k kA B+ = +x x u (2.1) together with a corresponding initial state vector 0x . The state variable nk ?x ? is most...

  3. The role of geologic assumptions in solving complex contaminant transport problems 

    E-Print Network [OSTI]

    Bustamante, Louis Sorola

    1995-01-01

    Commonly used ground-water flow and con t transport computer models often assume a homogeneous, isotropic medium. Most hydrogeological systems are very complex and violate the basic assumptions underlying these models. However, even complex...

  4. Washington International Renewable Energy Conference (WIREC) 2008 Pledges. Methodology and Assumptions Summary

    SciTech Connect (OSTI)

    Babiuch, Bill; Bilello, Daniel E.; Cowlin, Shannon C.; Mann, Margaret; Wise, Alison

    2008-08-01

    This report describes the methodology and assumptions used by NREL in quantifying the potential CO2 reductions resulting from more than 140 governments, international organizations, and private-sector representatives pledging to advance the uptake of renewable energy.

  5. Justification of the Modeling Assumptions in the Intermediate Fidelity Models for Portable Power Generation

    E-Print Network [OSTI]

    . For drastically different approaches, e.g., homogeneous combustion [7, 8] this assumption may not be appropriate. 2.1.2 3d-CFD Duct-Reactor Simulation Here we examine the effect of averaging the heat conductivity

  6. CBE UFAD cost analysis tool: Life cycle cost model, issues and assumptions

    E-Print Network [OSTI]

    Webster, Tom; Benedek, Corinne; Bauman, Fred

    2008-01-01

    Building Maintenance and Repair Cost Reference. ” WhitestoneJ. Wallis and H. Lin. 2008. “CBE UFAD Cost Analysis Tool:UFAD First Cost Model, Issues and Assumptions. ” Center for

  7. WVU Regional Research Institute grad assistant wins national award for throwing assumptions out the window

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    WVU Regional Research Institute grad assistant wins national award for throwing assumptions out the window Silicon Valley conjures images of leading edge technology. Las Vegas makes one think of gambling

  8. Policy on Keys and Keycards Policy on Keys and Keycards

    E-Print Network [OSTI]

    Sridhar, Srinivas

    department is responsible for the total cost of lock changes and new keys/cards to secure areas compromised has been compromised, and avoid potentially significant costs due to theft, vandalism, or excessive be given access to keys/cards that permit entry to buildings and locked spaces on the University campuses

  9. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  10. On Security Models and Compilers for Group Key Exchange Protocols (Full version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On Security Models and Compilers for Group Key Exchange Protocols (Full version) Emmanuel Bresson1-known generic solutions (compilers) for AKE- and MA-security of GKE pro- tocols proposed based compiler which provides AKE- and MA-security for any GKE protocol, under standard cryptographic assumptions

  11. Optical vortex array in spatially varying lattice

    E-Print Network [OSTI]

    Kapoor, Amit; Senthilkumaran, P; Joseph, Joby

    2015-01-01

    We present an experimental method based on a modified multiple beam interference approach to generate an optical vortex array arranged in a spatially varying lattice. This method involves two steps which are: numerical synthesis of a consistent phase mask by using two-dimensional integrated phase gradient calculations and experimental implementation of produced phase mask by utilizing a phase only spatial light modulator in an optical 4f Fourier filtering setup. This method enables an independent variation of the orientation and period of the vortex lattice. As working examples, we provide the experimental demonstration of various spatially variant optical vortex lattices. We further confirm the existence of optical vortices by formation of fork fringes. Such lattices may find applications in size dependent trapping, sorting, manipulation and photonic crystals.

  12. Time varying arctic climate change amplification

    SciTech Connect (OSTI)

    Chylek, Petr [Los Alamos National Laboratory; Dubey, Manvendra K [Los Alamos National Laboratory; Lesins, Glen [DALLHOUSIE U; Wang, Muyin [NOAA/JISAO

    2009-01-01

    During the past 130 years the global mean surface air temperature has risen by about 0.75 K. Due to feedbacks -- including the snow/ice albedo feedback -- the warming in the Arctic is expected to proceed at a faster rate than the global average. Climate model simulations suggest that this Arctic amplification produces warming that is two to three times larger than the global mean. Understanding the Arctic amplification is essential for projections of future Arctic climate including sea ice extent and melting of the Greenland ice sheet. We use the temperature records from the Arctic stations to show that (a) the Arctic amplification is larger at latitudes above 700 N compared to those within 64-70oN belt, and that, surprisingly; (b) the ratio of the Arctic to global rate of temperature change is not constant but varies on the decadal timescale. This time dependence will affect future projections of climate changes in the Arctic.

  13. Time varying, multivariate volume data reduction

    SciTech Connect (OSTI)

    Ahrens, James P; Fout, Nathaniel; Ma, Kwan - Liu

    2010-01-01

    Large-scale supercomputing is revolutionizing the way science is conducted. A growing challenge, however, is understanding the massive quantities of data produced by large-scale simulations. The data, typically time-varying, multivariate, and volumetric, can occupy from hundreds of gigabytes to several terabytes of storage space. Transferring and processing volume data of such sizes is prohibitively expensive and resource intensive. Although it may not be possible to entirely alleviate these problems, data compression should be considered as part of a viable solution, especially when the primary means of data analysis is volume rendering. In this paper we present our study of multivariate compression, which exploits correlations among related variables, for volume rendering. Two configurations for multidimensional compression based on vector quantization are examined. We emphasize quality reconstruction and interactive rendering, which leads us to a solution using graphics hardware to perform on-the-fly decompression during rendering. In this paper we present a solution which addresses the need for data reduction in large supercomputing environments where data resulting from simulations occupies tremendous amounts of storage. Our solution employs a lossy encoding scheme to acrueve data reduction with several options in terms of rate-distortion behavior. We focus on encoding of multiple variables together, with optional compression in space and time. The compressed volumes can be rendered directly with commodity graphics cards at interactive frame rates and rendering quality similar to that of static volume renderers. Compression results using a multivariate time-varying data set indicate that encoding multiple variables results in acceptable performance in the case of spatial and temporal encoding as compared to independent compression of variables. The relative performance of spatial vs. temporal compression is data dependent, although temporal compression has the advantage of offering smooth animations, while spatial compression can handle volumes of larger dimensions.

  14. The Assumption of Class-Conditional Independence in Category Learning Jana Jarecki (jarecki@mpib-berlin.mpg.de)

    E-Print Network [OSTI]

    Nelson, Jonathan D.

    The Assumption of Class-Conditional Independence in Category Learning Jana Jarecki (jarecki Berlin, Germany Abstract This paper investigates the role of the assumption of class- conditional. Treating features as class- conditionally independent can in many situations substantially facilitate

  15. NAME GRAD'NG KEY .

    E-Print Network [OSTI]

    MA 165 EXAM 3 Fall 2002 Page 1/4. NAME GRAD'NG KEY . Page 1 / 18. STUDENT ID Page 2 / 32. Page 3 /18. RECITATION INSTRUCTOR. Page 4 / 32.

  16. Quantum Hacking on Continuous-Variable Quantum Key Distribution System using a Wavelength Attack

    E-Print Network [OSTI]

    Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2013-07-24

    The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be added before performing the monitoring detection.

  17. Diversity & Flexibility Key to Sustainability | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Diversity & Flexibility Key to Sustainability Diversity & Flexibility Key to Sustainability Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting...

  18. Sensitivity of Rooftop PV Projections in the SunShot Vision Study to Market Assumptions

    SciTech Connect (OSTI)

    Drury, E.; Denholm, P.; Margolis, R.

    2013-01-01

    The SunShot Vision Study explored the potential growth of solar markets if solar prices decreased by about 75% from 2010 to 2020. The SolarDS model was used to simulate rooftop PV demand for this study, based on several PV market assumptions--future electricity rates, customer access to financing, and others--in addition to the SunShot PV price projections. This paper finds that modeled PV demand is highly sensitive to several non-price market assumptions, particularly PV financing parameters.

  19. Water transfer in soil at low water content. Is the local equilibrium assumption still appropriate?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Water transfer in soil at low water content. Is the local equilibrium assumption still appropriate Montpellier, France Abstract The dynamics of water content in the superficial layers of soils is critical a retardation time and a decrease in phase change rate as the water content gets lower. Therefore, the objective

  20. Human lightness perception is guided by simple assumptions about reflectance and lighting

    E-Print Network [OSTI]

    Murray, Richard

    Human lightness perception is guided by simple assumptions about reflectance and lighting Richard F 0009, Toronto, Ontario, Canada, M3J 1P3 ABSTRACT Lightness constancy is the remarkable ability of human successful approaches to understanding lightness perception that have developed along independent paths

  1. RETI Phase 1B Final Report Update NET SHORT RECALCULATION AND NEW PV ASSUMPTIONS

    E-Print Network [OSTI]

    RETI Phase 1B Final Report Update NET SHORT RECALCULATION AND NEW PV ASSUMPTIONS With Revisions distributed photovoltaic (PV) installations in the Report is unclear and perhaps misleading. At the direction-generation is required. The CEC forecast assumed that 1,082 GWh will be self-generated by consumers from new PV

  2. Biennial Assessment of the Fifth Power Plan Gas Turbine Power Plant Planning Assumptions

    E-Print Network [OSTI]

    from the heat recovery steam generator powers an additional steam turbine, providing extra electricBiennial Assessment of the Fifth Power Plan Gas Turbine Power Plant Planning Assumptions October 17, 2006 Simple- and combined-cycle gas turbine power plants fuelled by natural gas are among the bulk

  3. Complete Knowledge Assumption Often you want to assume that your knowledge is complete.

    E-Print Network [OSTI]

    Valtorta, Marco

    Complete Knowledge Assumption Often you want to assume that your knowledge is complete. Example: assume that a database of what students are enrolled in a course is complete. The definite clause language is monotonic: adding clauses can't invalidate a previous conclusion. Under the complete knowledge

  4. External review of the thermal energy storage (TES) cogeneration study assumptions. Final report

    SciTech Connect (OSTI)

    Lai, B.Y.; Poirier, R.N.

    1996-08-01

    This report is to provide a detailed review of the basic assumptions made in the design, sizing, performance, and economic models used in the thermal energy storage (TES)/cogeneration feasibility studies conducted by Pacific Northwest Laboratory (PNL) staff. This report is the deliverable required under the contract.

  5. 1 Relaxing the Multivariate Normality Assumption in the Simulation 2 of Transportation System Dependencies

    E-Print Network [OSTI]

    Kockelman, Kara M.

    1 1 Relaxing the Multivariate Normality Assumption in the Simulation 2 of Transportation System network analysis literature is the3 use of the multivariate normal (MVN) distribution. While in certain to sample from these case-specific multivariate distributions in simulation studies (see, e.g.,14 Ghosh

  6. Requirements Engineering for Cross-organizational ERP Implementation: Undocumented Assumptions and Potential Mismatches

    E-Print Network [OSTI]

    Wieringa, Roel

    Requirements Engineering for Cross-organizational ERP Implementation: Undocumented Assumptions) for Enterprise Resource Planning (ERP) in a cross- organizational context is how to find a match between the ERP for analyzing coordination requirements in inter-organizational ERP projects from a coordination theory

  7. Experimental quantum key distribution without monitoring signal disturbance

    E-Print Network [OSTI]

    Hiroki Takesue; Toshihiko Sasaki; Kiyoshi Tamaki; Masato Koashi

    2015-05-29

    Since the invention of Bennett-Brassard 1984 (BB84) protocol, many quantum key distribution (QKD) protocols have been proposed and some protocols are operated even in field environments. One of the striking features of QKD is that QKD protocols are provably secure unlike cryptography based on computational complexity assumptions. It has been believed that, to guarantee the security of QKD, Alice and Bob have to monitor the statistics of the measurement outcomes which are used to determine the amount of the privacy amplification to generate a key. Recently a new type of QKD protocol, called round robin differential phase shift (RRDPS) protocol, was proposed, and remarkably this protocol can generate a key without monitoring any statistics of the measurement outcomes. Here we report an experimental realization of the RRDPS protocol. We used a setup in which Bob randomly chooses one from four interferometers with different pulse delays so that he could implement phase difference measurements for all possible combinations with five-pulse time-bin states. Using the setup, we successfully distributed keys over 30 km of fiber, making this the first QKD experiment that does not rely on signal disturbance monitoring.

  8. Key China Energy Statistics 2012

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  9. Key China Energy Statistics 2011

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  10. Key Issues | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKey

  11. Key Steps | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKeyKey Steps

  12. Online Support Vector Regression with Varying Parameters for Time-Dependent Data

    SciTech Connect (OSTI)

    Omitaomu, Olufemi A [ORNL; Jeong, Myong K [ORNL; Badiru, Adedeji B [ORNL

    2011-01-01

    Support vector regression (SVR) is a machine learning technique that continues to receive interest in several domains including manufacturing, engineering, and medicine. In order to extend its application to problems in which datasets arrive constantly and in which batch processing of the datasets is infeasible or expensive, an accurate online support vector regression (AOSVR) technique was proposed. The AOSVR technique efficiently updates a trained SVR function whenever a sample is added to or removed from the training set without retraining the entire training data. However, the AOSVR technique assumes that the new samples and the training samples are of the same characteristics; hence, the same value of SVR parameters is used for training and prediction. This assumption is not applicable to data samples that are inherently noisy and non-stationary such as sensor data. As a result, we propose Accurate On-line Support Vector Regression with Varying Parameters (AOSVR-VP) that uses varying SVR parameters rather than fixed SVR parameters, and hence accounts for the variability that may exist in the samples. To accomplish this objective, we also propose a generalized weight function to automatically update the weights of SVR parameters in on-line monitoring applications. The proposed function allows for lower and upper bounds for SVR parameters. We tested our proposed approach and compared results with the conventional AOSVR approach using two benchmark time series data and sensor data from nuclear power plant. The results show that using varying SVR parameters is more applicable to time dependent data.

  13. Architecture BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Architecture BA (Hons) Key details Duration: 4 years (honours degree) Delivery type: Day Intake in the subject of Architecture, including a portfolio of Design, Technical and Theoretical courses covering all aspects of Architectural Theory and Practice. The course has been designed with reference to the RIBA

  14. INFORMATION: THE KEY TO SUSTAINABILITY

    E-Print Network [OSTI]

    Bateman, Ian J.

    of construction and demolition wastes and the introduction of demolition plans. Examples of information sources in the UK, Europe and the US are provided. Key words: waste management, construction, demolition, secondary sector so are concerned with re-use and recycling construction and demolition waste (C & D). However many

  15. Few-key Text Entry Revisited: Mnemonic Gestures on Four Keys

    E-Print Network [OSTI]

    Wobbrock, Jacob O.

    of Roman letters for high learnability. We compare this new 4-key method to predominant 3-key and 5-key present a new 4-key method that relies on mnemonic gestures reminiscent of Roman letters. Our method-key methods rely on two keys to move a selector left and right and a third key to select a letter. Although

  16. Initial Type Assumption A0 A0(x) = a. a for all x V

    E-Print Network [OSTI]

    Ábrahám, Erika

    Initial Type Assumption A0 A0(x) = a. a for all x V A0(c) = pre-defined type schema in haskell, for all c C0 A0(constr) = (type1 . . . typen (tyconstr a1 . . . am)), A0(bot) = a. a A0(isa fails because of a failing unification problem. Let c C V. · W( A + {c :: a1, . . . , an. }, c

  17. Initial Type Assumption A0 A0(x) = a. a for all x V

    E-Print Network [OSTI]

    Ábrahám, Erika

    Initial Type Assumption A0 A0(x) = a. a for all x V A0(c) = pre-defined type schema in haskell, for all c C0 A0(constr) = (type1 . . . typen (tyconstr a1 . . . am)), A0(bot) = a. a A0(if) = a. Bool a pair (, ) or the computation fails because of a failing unification problem. Let c C V. · W( A + {c

  18. Identify key design elements of desired function

    E-Print Network [OSTI]

    Nawroth, Janna C.

    DESIGN Identify key design elements of desired function Identify functionally equivalent implementation of key design elements (e.g. structure, physiology, kinematics etc.) Quantify functional and standardize fabrication for repeatability . Test phase: Quantify implementation of key design elements

  19. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key

  20. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

  1. Key Opportunities and Challenges for Program Sustainability ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  2. An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    high expan- sion rate generators based on assumptions related to factoring [GR00,HSS93], we note). In return, we get a simpler generator where no hashing is necessary to extract the output (in contrastAn Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant

  3. Regularizing future cosmological singularities with varying speed of light

    E-Print Network [OSTI]

    F. Shojai; A. Shojai; M. Sanati

    2015-07-09

    Cosmological models may result in future singularities. We show that, in the framework of dynamical varying speed of light theories, it is possible to regularize those singularities.

  4. Kernel Carpentry for Online Regression using Randomly Varying Coefficient Model 

    E-Print Network [OSTI]

    Edakunni, Narayanan U.; Schaal, Stefan; Vijayakumar, Sethu

    2006-01-01

    We present a Bayesian formulation of locally weighted learning (LWL) using the novel concept of a randomly varying coefficient model. Based on this

  5. Sixth Northwest Conservation and Electric Power Plan Chapter 4: Conservation Supply Assumptions

    E-Print Network [OSTI]

    ........................................................................................................................ 3 New Sources of Potential Savings.............................................. 22 SUMMARY OF KEY FINDINGS The Council defines conservation as improved energy efficiency. This means that less electricity is used to provide the same level of services. Conservation resources are measures

  6. Key Activities | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey

  7. Key Terms | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | International NuclearKaren AtkinsonAbout the FuelKey

  8. MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS

    E-Print Network [OSTI]

    Gao, Shuhong

    MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS SHUHONG GAO AND RAYMOND HEINDL for multivariate public key cryptosystems, which combines ideas from both triangular and oil-vinegar schemes. We the framework. 1. Introduction 1.1. Multivariate Public Key Cryptography. Public key cryptography plays

  9. BOLD noise assumptions in fMRI Alle Meije Wink1 and Jos B. T. M. Roerdink2,3

    E-Print Network [OSTI]

    Roerdink, Jos B.T.M.

    1 BOLD noise assumptions in fMRI Alle Meije Wink1 and Jos B. T. M. Roerdink2,3 1 Brain Mapping Unit-- This paper discusses the assumption of Gaussian noise in the blood oxygenation dependent (BOLD) contrast by reviewing differences between Rician and Gaussian noise. An analytic expression is derived for the null

  10. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  11. Bases, Assumptions, and Results of the Flowsheet Calculations for the Decision Phase Salt Disposition Alternatives

    SciTech Connect (OSTI)

    Dimenna, R.A.; Jacobs, R.A.; Taylor, G.A.; Durate, O.E.; Paul, P.K.; Elder, H.H.; Pike, J.A.; Fowler, J.R.; Rutland, P.L.; Gregory, M.V.; Smith III, F.G.; Hang, T.; Subosits, S.G.; Campbell, S.G.

    2001-03-26

    The High Level Waste (HLW) Salt Disposition Systems Engineering Team was formed on March 13, 1998, and chartered to identify options, evaluate alternatives, and recommend a selected alternative(s) for processing HLW salt to a permitted wasteform. This requirement arises because the existing In-Tank Precipitation process at the Savannah River Site, as currently configured, cannot simultaneously meet the HLW production and Authorization Basis safety requirements. This engineering study was performed in four phases. This document provides the technical bases, assumptions, and results of this engineering study.

  12. Assumptions and Expectations for Annual Energy Outlook 2015: Oil and Gas Working Group

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979Coal4 Arizona - NaturalYear Jan FebProved3)/1Assumptions

  13. Assumptions and Expectations for Annual Energy Outlook 2015: Oil and Gas Working Group

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979Coal4 Arizona - NaturalYear Jan FebProved3)/1Assumptions5:

  14. Cuton, cutoff transition of sound in slowly varying flow ducts

    E-Print Network [OSTI]

    Eindhoven, Technische Universiteit

    Cut­on, cut­off transition of sound in slowly varying flow ducts Sjoerd W. Rienstra 19­walled duct with irrotational isentropic mean flow is studied. The usual turning point behaviour was found. 1 Introduction The exact multiple scale solution for sound propagation in a slowly varying lined flow duct

  15. On the modeling of time-varying delays 

    E-Print Network [OSTI]

    Shah, Chirag Laxmikant

    2004-09-30

    This thesis is an effort to develop generalized dynamic models for systems with time-varying time delays. Unlike the simple time-delay model characterized by a transportation lag in the case of a fixed time delay, time-varying delays exhibit quite...

  16. On a Control Algorithm for Time-varying Processor Availability

    E-Print Network [OSTI]

    Gupta, Vijay

    On a Control Algorithm for Time-varying Processor Availability Vijay Gupta Department of Electrical control algorithm for the situation when the processor resource availability is time-varying. The basic the processing resources available at every time step. Thus, the system evolves as a discrete time hybrid system

  17. Time-Varying Stochastic Turbulence Model Curtis R. Vogela

    E-Print Network [OSTI]

    Vogel, Curtis

    Time-Varying Stochastic Turbulence Model Curtis R. Vogela aDepartment of Mathematical Sciences for time-varying turbulence. The model can be viewed as a linearization of the Navier-Stokes equation, with deterministic drift and diffusion terms, plus an additional stochastic driving term. Fixed-time realizations

  18. Time varying voltage combustion control and diagnostics sensor

    DOE Patents [OSTI]

    Chorpening, Benjamin T. (Morgantown, WV); Thornton, Jimmy D. (Morgantown, WV); Huckaby, E. David (Morgantown, WV); Fincham, William (Fairmont, WV)

    2011-04-19

    A time-varying voltage is applied to an electrode, or a pair of electrodes, of a sensor installed in a fuel nozzle disposed adjacent the combustion zone of a continuous combustion system, such as of the gas turbine engine type. The time-varying voltage induces a time-varying current in the flame which is measured and used to determine flame capacitance using AC electrical circuit analysis. Flame capacitance is used to accurately determine the position of the flame from the sensor and the fuel/air ratio. The fuel and/or air flow rate (s) is/are then adjusted to provide reduced flame instability problems such as flashback, combustion dynamics and lean blowout, as well as reduced emissions. The time-varying voltage may be an alternating voltage and the time-varying current may be an alternating current.

  19. Quantum Hacking on Quantum Key Distribution using Homodyne Detection

    E-Print Network [OSTI]

    Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2014-02-27

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  20. Washington International Renewable Energy Conference 2008 Pledges: Methodology and Assumptions Summary

    SciTech Connect (OSTI)

    Babiuch, B.; Bilello, D. E.; Cowlin, S. C.; Mann, M.; Wise, A.

    2008-08-01

    The 2008 Washington International Renewable Energy Conference (WIREC) was held in Washington, D.C., from March 4-6, 2008, and involved nearly 9,000 people from 125 countries. The event brought together worldwide leaders in renewable energy (RE) from governments, international organizations, nongovernmental organizations, and the private sector to discuss the role that renewables can play in alleviating poverty, growing economies, and passing on a healthy planet to future generations. The conference concluded with more than 140 governments, international organizations, and private-sector representatives pledging to advance the uptake of renewable energy. The U.S. government authorized the National Renewable Energy Laboratory (NREL) to estimate the carbon dioxide (CO2) savings that would result from the pledges made at the 2008 conference. This report describes the methodology and assumptions used by NREL in quantifying the potential CO2 reductions derived from those pledges.

  1. SOIL MICROBIOLOGY Resource Use of Soilborne Streptomyces Varies with Location,

    E-Print Network [OSTI]

    Thomas, David D.

    SOIL MICROBIOLOGY Resource Use of Soilborne Streptomyces Varies with Location, Phylogeny in prairie soils. Resource use patterns were highly variable among Streptomyces isolates and were soils less than 1 m apart differed significantly in their ability to use resources, indicating

  2. Efficiency Enhancement in a Tapered Free Electron Laser by Varying...

    Office of Scientific and Technical Information (OSTI)

    a Tapered Free Electron Laser by Varying the Electron Beam Radius Energy extraction efficiency of a free electron laser (FEL) can be increased when the undulator is tapered after...

  3. Tax Incidence Varies Across the Price Distribution Jeffrey M. Perloff*

    E-Print Network [OSTI]

    Perloff, Jeffrey M.

    , CA 94720-3310 #12;Tax Incidence Varies Across the Price Distribution Standard treatments of tax pass a generic good at marginal cost: p = m. A branded-good manufacturer--a dominant firm--sells its

  4. CRITICAL ASSUMPTIONS IN THE F-TANK FARM CLOSURE OPERATIONAL DOCUMENTATION REGARDING WASTE TANK INTERNAL CONFIGURATIONS

    SciTech Connect (OSTI)

    Hommel, S.; Fountain, D.

    2012-03-28

    The intent of this document is to provide clarification of critical assumptions regarding the internal configurations of liquid waste tanks at operational closure, with respect to F-Tank Farm (FTF) closure documentation. For the purposes of this document, FTF closure documentation includes: (1) Performance Assessment for the F-Tank Farm at the Savannah River Site (hereafter referred to as the FTF PA) (SRS-REG-2007-00002), (2) Basis for Section 3116 Determination for Closure of F-Tank Farm at the Savannah River Site (DOE/SRS-WD-2012-001), (3) Tier 1 Closure Plan for the F-Area Waste Tank Systems at the Savannah River Site (SRR-CWDA-2010-00147), (4) F-Tank Farm Tanks 18 and 19 DOE Manual 435.1-1 Tier 2 Closure Plan Savannah River Site (SRR-CWDA-2011-00015), (5) Industrial Wastewater Closure Module for the Liquid Waste Tanks 18 and 19 (SRRCWDA-2010-00003), and (6) Tank 18/Tank 19 Special Analysis for the Performance Assessment for the F-Tank Farm at the Savannah River Site (hereafter referred to as the Tank 18/Tank 19 Special Analysis) (SRR-CWDA-2010-00124). Note that the first three FTF closure documents listed apply to the entire FTF, whereas the last three FTF closure documents listed are specific to Tanks 18 and 19. These two waste tanks are expected to be the first two tanks to be grouted and operationally closed under the current suite of FTF closure documents and many of the assumptions and approaches that apply to these two tanks are also applicable to the other FTF waste tanks and operational closure processes.

  5. Neutrino spin-flavor oscillations in rapidly varying magnetic fields

    E-Print Network [OSTI]

    Maxim Dvornikov

    2006-11-13

    The general formalism for the description of neutrino oscillations in arbitrary rapidly varying external fields is elaborated. We obtain the new effective Hamiltonian which determines the evolution of the averaged neutrino wave function. The general technique is applied to the neutrino oscillations in rapidly varying magnetic fields. We evaluate the transition probabilities of the neutrino spin-flavor oscillations in magnetic fields of the Sun and compare them with the numerical solutions of the Schroedinger equation with the exact Hamiltonian.

  6. Technical considerations related to interim source-term assumptions for emergency planning and equipment qualification. [PWR; BWR

    SciTech Connect (OSTI)

    Niemczyk, S.J.; McDowell-Boyer, L.M.

    1982-09-01

    The source terms recommended in the current regulatory guidance for many considerations of light water reactor (LWR) accidents were developed a number of years ago when understandings of many of the phenomena pertinent to source term estimation were relatively primitive. The purpose of the work presented here was to develop more realistic source term assumptions which could be used for interim regulatory purposes for two specific considerations, namely, equipment qualification and emergency planning. The overall approach taken was to adopt assumptions and models previously proposed for various aspects of source term estimation and to modify those assumptions and models to reflect recently gained insights into, and data describing, the release and transport of radionuclides during and after LWR accidents. To obtain illustrative estimates of the magnitudes of the source terms, the results of previous calculations employing the adopted assumptions and models were utilized and were modified to account for the effects of the recent insights and data.

  7. Hash-based Multivariate Public Key Cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Hash-based Multivariate Public Key Cryptosystems WANG Hou-Zhen and ZHANG Huan-Guo The Key for the traditional multivariate public key cryp- tosystems. For example, the signature scheme SFLASH was broken. at ASIACRYPTO'09. Most multivariate schemes known so far are insecure, except maybe the sigature schemes UOV

  8. Special relativity as the limit of an Aristotelian universal friction theory under Reye's assumption

    E-Print Network [OSTI]

    E. Minguzzi

    2014-11-28

    This work explores a classical mechanical theory under two further assumptions: (a) there is a universal dry friction force (Aristotelian mechanics), and (b) the variation of the mass of a body due to wear is proportional to the work done by the friction force on the body (Reye's hypothesis). It is shown that mass depends on velocity as in Special Relativity, and that the velocity is constant for a particular characteristic value. In the limit of vanishing friction the theory satisfies a relativity principle as bodies do not decelerate and, therefore, the absolute frame becomes unobservable. However, the limit theory is not Newtonian mechanics, with its Galilei group symmetry, but rather Special Relativity. This result suggests to regard Special Relativity as the limit of a theory presenting universal friction and exchange of mass-energy with a reservoir (vacuum). Thus, quite surprisingly, Special Relativity follows from the absolute space (ether) concept and could have been discovered following studies of Aristotelian mechanics and friction. We end the work confronting the full theory with observations. It predicts the Hubble law through tired light, and hence it is incompatible with supernova light curves unless both mechanisms of tired light (locally) and universe expansion (non-locally) are at work. It also nicely accounts for some challenging numerical coincidences involving phenomena under low acceleration.

  9. Estimating Alarm Thresholds for Process Monitoring Data under Different Assumptions about the Data Generating Mechanism

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Burr, Tom; Hamada, Michael S.; Howell, John; Skurikhin, Misha; Ticknor, Larry; Weaver, Brian

    2013-01-01

    Process monitoring (PM) for nuclear safeguards sometimes requires estimation of thresholds corresponding to small false alarm rates. Threshold estimation dates to the 1920s with the Shewhart control chart; however, because possible new roles for PM are being evaluated in nuclear safeguards, it is timely to consider modern model selection options in the context of threshold estimation. One of the possible new PM roles involves PM residuals, where a residual is defined as residual = data ? prediction. This paper reviews alarm threshold estimation, introduces model selection options, and considers a range of assumptions regarding the data-generating mechanism for PM residuals.more »Two PM examples from nuclear safeguards are included to motivate the need for alarm threshold estimation. The first example involves mixtures of probability distributions that arise in solution monitoring, which is a common type of PM. The second example involves periodic partial cleanout of in-process inventory, leading to challenging structure in the time series of PM residuals.« less

  10. Photon propagation in slowly varying inhomogeneous electromagnetic fields

    E-Print Network [OSTI]

    Felix Karbstein; Rashid Shaisultanov

    2015-04-23

    Starting from the Heisenberg-Euler effective Lagrangian, we determine the photon current and photon polarization tensor in inhomogeneous, slowly varying electromagnetic fields. To this end, we consider background field configurations varying in both space and time, paying special attention to the tensor structure. As a main result, we obtain compact analytical expressions for the photon polarization tensor in realistic Gaussian laser pulses, as generated in the focal spots of high-intensity lasers. These expressions are of utmost importance for the investigation of quantum vacuum nonlinearities in realistic high-intensity laser experiments.

  11. Photon propagation in slowly varying inhomogeneous electromagnetic fields

    E-Print Network [OSTI]

    Karbstein, Felix

    2015-01-01

    Starting from the Heisenberg-Euler effective Lagrangian, we determine the photon current and photon polarization tensor in inhomogeneous, slowly varying electromagnetic fields. To this end, we consider background field configurations varying in both space and time, paying special attention to the tensor structure. As a main result, we obtain compact analytical expressions for the photon polarization tensor in realistic Gaussian laser pulses, as generated in the focal spots of high-intensity lasers. These expressions are of utmost importance for the investigation of quantum vacuum nonlinearities in realistic high-intensity laser experiments.

  12. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  13. Wind Vision: Analysis Highlights and Key Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Highlights and Key Results Eric Lantz (NREL) Ryan Wiser (LBNL) July 15, 2015 2 | Wind and Water Power Technologies Office eere.energy.gov Presentation Overview Wind...

  14. Monroe County Extension Services Key West Office

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    potable water is pumped to the Keys from the mainland through a 130-mile long transmission line irrigation and fertilizer, and are more

  15. Image-Based Reconstruction of Spatially Varying Materials

    E-Print Network [OSTI]

    Heidrich, Wolfgang

    Image-Based Reconstruction of Spatially Varying Materials Hendrik P. A. Lensch1 Jan Kautz1 Michael material properties is an important step towards photorealistic rendering. Many real-world objects are composed of a number of materials that often show subtle changes even within a single material. Thus

  16. SOUND PROPAGATION IN SLOWLY VARYING LINED FLOW DUCTS

    E-Print Network [OSTI]

    Eindhoven, Technische Universiteit

    SOUND PROPAGATION IN SLOWLY VARYING LINED FLOW DUCTS OF ARBITRARY CROSS SECTION S.W. Rienstra.w.rienstra@tue.nl November 20, 2002 Abstract Sound transmission through ducts of constant cross section with a uniform expansion, where the modes are eigenfunctions of the corresponding Laplace eigenvalue problem along a duct

  17. Visualization of Very Large Oceanography Time-Varying Volume Datasets

    E-Print Network [OSTI]

    Laidlaw, David

    Visualization of Very Large Oceanography Time-Varying Volume Datasets Sanghun Park1 , Chandrajit://grmanet.sogang.ac.kr/~ihm Abstract. This paper presents two visualization techniques suitable for huge oceanography time generated in the field of oceanography. The model has a resolution of 1/6 degree (2160 by 960 points

  18. Mutual information in time-varying biochemical systems

    E-Print Network [OSTI]

    Filipe Tostevin; Pieter Rein ten Wolde

    2010-06-16

    Cells must continuously sense and respond to time-varying environmental stimuli. These signals are transmitted and processed by biochemical signalling networks. However, the biochemical reactions making up these networks are intrinsically noisy, which limits the reliability of intracellular signalling. Here we use information theory to characterise the reliability of transmission of time-varying signals through elementary biochemical reactions in the presence of noise. We calculate the mutual information for both instantaneous measurements and trajectories of biochemical systems for a Gaussian model. Our results indicate that the same network can have radically different characteristics for the transmission of instantaneous signals and trajectories. For trajectories, the ability of a network to respond to changes in the input signal is determined by the timing of reaction events, and is independent of the correlation time of the output of the network. We also study how reliably signals on different time-scales can be transmitted by considering the frequency-dependent coherence and gain-to-noise ratio. We find that a detector that does not consume the ligand molecule upon detection can more reliably transmit slowly varying signals, while an absorbing detector can more reliably transmit rapidly varying signals. Furthermore, we find that while one reaction may more reliably transmit information than another when considered in isolation, when placed within a signalling cascade the relative performance of the two reactions can be reversed. This means that optimising signal transmission at a single level of a signalling cascade can reduce signalling performance for the cascade as a whole.

  19. Type II Migration: Varying Planet Mass and Disc Viscosity

    E-Print Network [OSTI]

    Richard G. Edgar

    2008-07-03

    This paper continues an earlier study of giant planet migration, examining the effect of planet mass and disc viscosity on the migration rate. We find that the migration rate of a gap-opening planet varies systematically with the planet's mass, as predicted in our earlier work. However, the variation with disc viscosity appears to be much weaker than expected.

  20. Interactive Direct Volume Rendering of Time-Varying Data

    E-Print Network [OSTI]

    (2563 ) dataset made up of 8-bit voxels at a frame rate of 10 Hz requires an input pipe capable have taken to support time-varying data. Our implementation is presented in Section 4. In Section 5 we address performance. In Section 6 we draw conclusions. 2 Related Work There have been numerous successful

  1. RAPID COMMUNICATION Yolk Testosterone Varies With Sex in

    E-Print Network [OSTI]

    Wade, Juli

    RAPID COMMUNICATION Yolk Testosterone Varies With Sex in Eggs of the Lizard, Anolis carolinensis), a lizard with genotypic sex determination, yolk testosterone (T) concentration is greater in male previous studies. If yolk T levels are also sex-specific before eggs are laid, a period during which

  2. On a Control Algorithm for Time-varying Processor Availability

    E-Print Network [OSTI]

    Gupta, Vijay

    1 On a Control Algorithm for Time-varying Processor Availability V. Gupta Member, IEEE and F. Luo Abstract-- We propose an anytime algorithm for control when the processor resource availability is limited vector sequentially to maximally utilize the processing resources available at every time step

  3. CONFIDENCE LIMITS FOR POPULATION PROJECTIONS WHEN VITAL RATES VARY RANDOMLY

    E-Print Network [OSTI]

    CONFIDENCE LIMITS FOR POPULATION PROJECTIONS WHEN VITAL RATES VARY RANDOMLY TIM GERRODE, age distribution, and vital rates are known (e.g., Leslie 1945; Keyfitz 1968). Such population rates are available. However, there is uncertainty in such projections. First, we rarely know vital

  4. What are the Starting Points? Evaluating Base-Year Assumptions in the Asian Modeling Exercise

    SciTech Connect (OSTI)

    Chaturvedi, Vaibhav; Waldhoff, Stephanie; Clarke, Leon E.; Fujimori, Shinichiro

    2012-12-01

    A common feature of model inter-comparison efforts is that the base year numbers for important parameters such as population and GDP can differ substantially across models. This paper explores the sources and implications of this variation in Asian countries across the models participating in the Asian Modeling Exercise (AME). Because the models do not all have a common base year, each team was required to provide data for 2005 for comparison purposes. This paper compares the year 2005 information for different models, noting the degree of variation in important parameters, including population, GDP, primary energy, electricity, and CO2 emissions. It then explores the difference in these key parameters across different sources of base-year information. The analysis confirms that the sources provide different values for many key parameters. This variation across data sources and additional reasons why models might provide different base-year numbers, including differences in regional definitions, differences in model base year, and differences in GDP transformation methodologies, are then discussed in the context of the AME scenarios. Finally, the paper explores the implications of base-year variation on long-term model results.

  5. Gene-Mating Dynamic Evolution Theory: fundamental assumptions, exactly solvable models and analytic solutions

    E-Print Network [OSTI]

    Juven Wang; Jiunn-Wei Chen

    2015-01-08

    Fundamental properties of macroscopic gene-mating dynamic evolutionary systems are investigated. A model is proposed to describe a large class of systems within population genetics. We focus on a single locus, arbitrary number alleles in a two-gender dioecious population. Our governing equations are time-dependent continuous differential equations labeled by a set of genotype frequencies. The full parameter space consists of all allowed genotype frequencies. Our equations are uniquely derived from four fundamental assumptions within any population: (1) a closed system; (2) average-and-random mating process (mean-field behavior); (3) Mendelian inheritance; (4) exponential growth and exponential death. Even though our equations are non-linear with time evolutionary dynamics, we have an exactly solvable model. Our findings are summarized from phenomenological and mathematical viewpoints. From the phenomenological viewpoint, any initial genotype frequency of a closed system will eventually approach a stable fixed point. Under time evolution, we show (1) the monotonic behavior of genotype frequencies, (2) any genotype or allele that appears in the population will never become extinct, (3) the Hardy-Weinberg law, and (4) the global stability without chaos in the parameter space. To demonstrate the experimental evidence, as an example, we show a mapping from the blood type genotype frequencies of world ethnic groups to our stable fixed-point solutions. From the mathematical viewpoint, the equilibrium solutions consist of a base manifold as a global stable attractor, attracting any initial point in a Euclidean fiber bundle to the fixed point where the fiber is attached. We can define the genetic distance of two populations as their geodesic distance on the equilibrium manifold. In addition, the modification of our theory under the process of natural selection and mutation is addressed.

  6. Technical assumption for Mo-99 production in the MARIA reactor. Feasibility study

    SciTech Connect (OSTI)

    Jaroszewicz, J.; Pytel, K.; Dabkowski, L.; Krzysztoszek, G. [Institute of Atomic Energy, 05-400 Otwock-Swierk (Poland)

    2008-07-15

    The main objective of U-235 irradiation is to obtain the Tc-99m isotope which is widely used in the domain of medical diagnostics. The decisive factor determining its availability, despite its short life time, is a reaction of radioactive decay of Mo-99 into Tc- 99m. One of the possible sources of molybdenum can be achieved in course of the U-235 fission reaction. The paper presents activities and the calculations results obtained upon the feasibility study on irradiation of U-235 targets for production of molybdenum in the MARIA reactor. The activities including technical assumption were focused on performing calculation for modelling of the target and irradiation device as well as adequate equipment and tools for processing in reactor. It has been assumed that the basic component of fuel charge is an aluminium cladded plate with dimensions of 40x230x1.45 containing 4.7 g U-235. The presumed mode of the heat removal generated in the fuel charge of the reactor primary cooling circuit influences the construction of installation to be used for irradiation and the technological instrumentation. The outer channel construction for irradiation has to be identical as the standard fuel channel construction of the MARIA reactor. It enables to use the existing slab and reactor mounting sockets for the fastening of the molybdenum channel as well as the cooling water delivery system. The measurement of water temperature cooling a fuel charge and control of water flow rate in the channel can also be carried out be means of the standard instrumentation of the reactor. (author)

  7. A method making fewer assumptions was recommended for estimating exposure–outcome associations in stratified case–cohort studies.

    E-Print Network [OSTI]

    Jones, Edmund; Sweeting, Michael J.; Sharp, Stephen J.; Thompson, Simon G.; EPIC-InterAct Consortium

    2015-04-29

    /plain; charset=UTF-8 ORIGINAL A A method making fewer assumptions s hen Con ary ridge chool amb 15; P on the full cohort can be expensive, for example if bio- different sampling fraction for selecting participants to be in the subcohort. For data from... Act. The subcohort selection for InterAct was34 participants, recruited from 1993 to 1999; this maller than the full EPIC-Europe cohort becauseshown to be very similar between one-stage and two- stage models [15]. The assumptions each model makes about the exposure...

  8. On multivariate signatureonly public key cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On multivariate signature­only public key cryptosystems Nicolas T. Courtois 1,2 courtois we argument that the problem has many natural solutions within the framework of the multivariate cryptography. First of all it seems that virtually any non­injective multivariate public key is inherently

  9. Deniable Internet Key Exchange Andrew C. Yao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Deniable Internet Key Exchange Andrew C. Yao Frances F. Yao Yunlei Zhao§ Bin Zhu¶ Abstract In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following of privacy protection (especially for E-commerce over Internet), this work is naturally of practical interest

  10. Varied morphology carbon nanotubes and method for their manufacture

    SciTech Connect (OSTI)

    Li, Wenzhi; Wen, Jian Guo; Ren, Zhi Feng

    2007-01-02

    The present invention describes the preparation of carbon nanotubes of varied morphology, catalyst materials for their synthesis. The present invention also describes reactor apparatus and methods of optimizing and controlling process parameters for the manufacture carbon nanotubes with pre-determined morphologies in relatively high purity and in high yields. In particular, the present invention provides methods for the preparation of non-aligned carbon nanotubes with controllable morphologies, catalyst materials and methods for their manufacture.

  11. Observational constraint on the varying speed of light theory

    E-Print Network [OSTI]

    Jing-Zhao Qi; Ming-Jian Zhang; Wen-Biao Liu

    2014-10-07

    The varying speed of light (VSL) theory is controversial. It succeeds in explaining some cosmological problems, but on the other hand it is excluded by mainstream physics because it will shake the foundation of physics. In the present paper, we devote ourselves to test whether the speed of light is varying from the observational data of the type Ia Supernova, Baryon Acoustic Oscillation, Observational $H(z)$ data and Cosmic Microwave Background (CMB). We select the common form $c(t)=c_0a^n(t)$ with the contribution of dark energy and matter, where $c_0$ is the current value of speed of light, $n$ is a constant, and consequently construct a varying speed of light dark energy model (VSLDE). The combined observational data show a much trivial constraint $n=-0.0033 \\pm 0.0045$ at 68.3\\% confidence level, which indicates that the speed of light may be a constant with high significance. By reconstructing the time-variable $c(t)$, we find that the speed of light almost has no variation for redshift $z light is only in order of $10^{-2}$. We also introduce the geometrical diagnostic $Om (z)$ to show the difference between the VSLDE and $\\Lambda$CDM model. The result shows that the current data are difficult to differentiate them. All the results show that the observational data favor the constant speed of light.

  12. Abstract--In the context of the ongoing deregulation of the electricity industry, we revisit the commonly held assumption that,

    E-Print Network [OSTI]

    Gatterbauer, Wolfgang

    the commonly held assumption that, under the condition of perfect information, a decentralized unit commitment of consecutive hours. Index Terms-- Centralized unit commitment, Decentralized unit commitment, Market power, a centralized unit commitment can be economically more efficient than a decentralized unit commitment

  13. A Project Report on NP: an Assumption.based NL Plan Inference System that uses Feature Structures

    E-Print Network [OSTI]

    A Project Report on NP: an Assumption.based NL Plan Inference System that uses Feature Structures-cho,Soraku-gun, Kyoto 619-02, Japan myers@atr-la.atr.co.jp Abstract This paper presents a project report on NP

  14. Green Enterprise Computing Data: Assumptions and Realities Maria Kazandjieva, Brandon Heller, Omprakash Gnawali , Philip Levis, and Christos Kozyrakis

    E-Print Network [OSTI]

    Pratt, Vaughan

    the individual datapoint relates to the full building energy use. The green computing research community canGreen Enterprise Computing Data: Assumptions and Realities Maria Kazandjieva, Brandon Heller, brandonh, pal, christos@cs.stanford.edu, gnawali@cs.uh.edu ABSTRACT Until now, green computing research

  15. Quasi-Newton inversion of seismic first arrivals using source finite1 bandwidth assumption: application to landslides characterization2

    E-Print Network [OSTI]

    Boyer, Edmond

    , Samyn et al. (2011) used a 3D seismic refraction traveltime52 tomography to provide a valuable-00749309,version1-7Nov2012 #12;recommended for all case studies. Seismic refraction can be basicallyQuasi-Newton inversion of seismic first arrivals using source finite1 bandwidth assumption

  16. READ AND SIGN THE PARTIAL ASSUMPTION OF RISK ON REVERSE Risk Management 12/2012 Risk Management

    E-Print Network [OSTI]

    Cina, Jeff

    READ AND SIGN THE PARTIAL ASSUMPTION OF RISK ON REVERSE Risk Management 12/2012 Risk Management Conditions of Volunteer Service Please send completed form to the Office of Risk Management: riskmanagement ___________________________________________ (name/title of department supervisor) and the Office of Risk Management, (541) 346-8316, within 24 hours

  17. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  18. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  19. Influence of assumptions about household waste composition in waste management LCAs

    SciTech Connect (OSTI)

    Slagstad, Helene, E-mail: helene.slagstad@ntnu.no [Department of Hydraulic and Environmental Engineering, Norwegian University of Science and Technology, N-7491 Trondheim (Norway); Brattebo, Helge [Department of Hydraulic and Environmental Engineering, Norwegian University of Science and Technology, N-7491 Trondheim (Norway)

    2013-01-15

    Highlights: Black-Right-Pointing-Pointer Uncertainty in waste composition of household waste. Black-Right-Pointing-Pointer Systematically changed waste composition in a constructed waste management system. Black-Right-Pointing-Pointer Waste composition important for the results of accounting LCA. Black-Right-Pointing-Pointer Robust results for comparative LCA. - Abstract: This article takes a detailed look at an uncertainty factor in waste management LCA that has not been widely discussed previously, namely the uncertainty in waste composition. Waste composition is influenced by many factors; it can vary from year to year, seasonally, and with location, for example. The data publicly available at a municipal level can be highly aggregated and sometimes incomplete, and performing composition analysis is technically challenging. Uncertainty is therefore always present in waste composition. This article performs uncertainty analysis on a systematically modified waste composition using a constructed waste management system. In addition the environmental impacts of several waste management strategies are compared when applied to five different cities. We thus discuss the effect of uncertainty in both accounting LCA and comparative LCA. We found the waste composition to be important for the total environmental impact of the system, especially for the global warming, nutrient enrichment and human toxicity via water impact categories.

  20. Key Renewable Energy Opportunities for Oklahoma Tribes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKeyKEY

  1. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  2. Civil Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Civil Engineering BEng (Hons) Key details Duration: Full-time: 4 years (BEng Hons) Delivery type engineering disciplines of Structures, Geotechnics, Water Engineering and Transportation Engineering civil or structural engineers. After graduation, students are equipped to work for consultants

  3. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  4. False Vacuum in the Supersymmetric Mass Varying Neutrinos Model

    E-Print Network [OSTI]

    Ryo Takahashi; Morimitsu Tanimoto

    2007-11-04

    We present detailed analyses of the vacuum structure of the scalar potential in a supersymmetric Mass Varying Neutrinos model. The observed dark energy density is identified with false vacuum energy and the dark energy scale of order $(10^{-3}eV)^4$ is understood by gravitationally suppressed supersymmetry breaking scale, $F({TeV})^2/M_{Pl}$, in the model. The vacuum expectation values of sneutrinos should be tiny in order that the model works. Some decay processes of superparticles into acceleron and sterile neutrino are also discussed in the model.

  5. Varying vacuum energy of a self-interacting scalar field

    E-Print Network [OSTI]

    Kostya Trachenko

    2015-07-25

    Understanding mechanisms capable of altering the vacuum energy is currently of interest in field theories and cosmology. We consider an interacting scalar field and show that the vacuum energy naturally takes any value between its maximum and zero because interaction affects the number of operating field modes, the assertion that involves no assumptions or postulates. The mechanism is similar to the recently discussed temperature evolution of collective modes in liquids. The cosmological implication concerns the evolution of scalar field $\\phi$ during the inflation of the Universe. $\\phi$ starts with all field modes operating and maximal vacuum energy in the early inflation-dominated epoch. As a result of inflation, $\\phi$ undergoes a dynamical crossover and arrives in the state with one long-wavelength longitudinal mode and small positive vacuum energy predicted to be asymptotically decreasing to zero in the late epoch. Accordingly, we predict that the currently observed cosmological constant will decrease in the future, and comment on the possibility of a cyclic Universe.

  6. Varying fine structure 'constant' and charged black holes

    SciTech Connect (OSTI)

    Bekenstein, Jacob D.; Schiffer, Marcelo

    2009-12-15

    Speculation that the fine-structure constant {alpha} varies in spacetime has a long history. We derive, in 4-D general relativity and in isotropic coordinates, the solution for a charged spherical black hole according to the framework for dynamical {alpha} J. D. Bekenstein, Phys. Rev. D 25, 1527 (1982).. This solution coincides with a previously known one-parameter extension of the dilatonic black hole family. Among the notable properties of varying-{alpha} charged black holes are adherence to a 'no hair' principle, the absence of the inner (Cauchy) horizon of the Reissner-Nordstroem black holes, the nonexistence of precisely extremal black holes, and the appearance of naked singularities in an analytic extension of the relevant metric. The exteriors of almost extremal electrically (magnetically) charged black holes have simple structures which makes their influence on applied magnetic (electric) fields transparent. We rederive the thermodynamic functions of the modified black holes; the otherwise difficult calculation of the electric potential is done by a shortcut. We confirm that variability of {alpha} in the wake of expansion of the universe does not threaten the generalized second law.

  7. A Comparison of Two Gasoline and Two Diesel Cars with Varying...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A Comparison of Two Gasoline and Two Diesel Cars with Varying Emission Control Technologies A Comparison of Two Gasoline and Two Diesel Cars with Varying Emission Control...

  8. Systems and methods of varying charged particle beam spot size

    SciTech Connect (OSTI)

    Chen, Yu-Jiuan

    2014-09-02

    Methods and devices enable shaping of a charged particle beam. A modified dielectric wall accelerator includes a high gradient lens section and a main section. The high gradient lens section can be dynamically adjusted to establish the desired electric fields to minimize undesirable transverse defocusing fields at the entrance to the dielectric wall accelerator. Once a baseline setting with desirable output beam characteristic is established, the output beam can be dynamically modified to vary the output beam characteristics. The output beam can be modified by slightly adjusting the electric fields established across different sections of the modified dielectric wall accelerator. Additional control over the shape of the output beam can be excreted by introducing intentional timing de-synchronization offsets and producing an injected beam that is not fully matched to the entrance of the modified dielectric accelerator.

  9. Optical waveguide device with an adiabatically-varying width

    DOE Patents [OSTI]

    Watts; Michael R. (Albuquerque, NM), Nielson; Gregory N. (Albuquerque, NM)

    2011-05-10

    Optical waveguide devices are disclosed which utilize an optical waveguide having a waveguide bend therein with a width that varies adiabatically between a minimum value and a maximum value of the width. One or more connecting members can be attached to the waveguide bend near the maximum value of the width thereof to support the waveguide bend or to supply electrical power to an impurity-doped region located within the waveguide bend near the maximum value of the width. The impurity-doped region can form an electrical heater or a semiconductor junction which can be activated with a voltage to provide a variable optical path length in the optical waveguide. The optical waveguide devices can be used to form a tunable interferometer (e.g. a Mach-Zehnder interferometer) which can be used for optical modulation or switching. The optical waveguide devices can also be used to form an optical delay line.

  10. Epidemic spreading in time-varying community networks

    SciTech Connect (OSTI)

    Ren, Guangming E-mail: ren-guang-ming@163.com; Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 ; Wang, Xingyuan E-mail: ren-guang-ming@163.com

    2014-06-15

    The spreading processes of many infectious diseases have comparable time scale as the network evolution. Here, we present a simple networks model with time-varying community structure, and investigate susceptible-infected-susceptible epidemic spreading processes in this model. By both theoretic analysis and numerical simulations, we show that the efficiency of epidemic spreading in this model depends intensively on the mobility rate q of the individuals among communities. We also find that there exists a mobility rate threshold q{sub c}. The epidemic will survive when q?>?q{sub c} and die when q?

  11. Spall behavior of cast iron with varying microstructures

    SciTech Connect (OSTI)

    Plume, Gifford; Rousseau, Carl-Ernst, E-mail: rousseau@uri.edu [Mechanical Engineering, University of Rhode Island, 92 Upper College Rd., Kingston, Rhode Island 02881 (United States)

    2014-07-21

    The spall strength of cast iron with varying microstructures has been investigated using plate impact at moderate speed. Stress history measurements were made with manganin stress gauges embedded between the back face of the specimen and a low impedance polycarbonate backing. Five separate cast irons were tested. Four of these consisted of gray cast iron with graphite in flake form, with three classified as Type VII A2 and the fourth containing a bimodal distribution of Types VII A4 and VII D8. The fifth casting consisted of ductile cast iron with graphite in nodular form, classified as Type I, size class 5. The spall strength for the Type VII A2 gray cast irons varied between 40 and 370?MPa, and that of the additional gray cast iron, between 410 and 490?MPa. The spall strength of the ductile cast iron fell within the range of 0.94–1.2?GPa. It is shown that the spall strength is linked to the damage level at the spall plane, where an increased level of tensile stress is required to generate higher levels of damage. Post mortem analysis was performed on the recovered samples, revealing the graphite phase to be the primary factor governing the spall fracture of cast irons, where crack nucleation is directly correlated to the debonding of graphite from the metal matrix. The average length of graphite found within a casting is linked to the material's strength, where strength increases as a function of decreasing length. The morphology and mean free path of graphite precipitates further govern the subsequent coalescence of initiated cracks to form a complete fracture plane. In cases where graphite spacing is large, increased energy level is required to complete the fracture process. A secondary factor governing the spall fracture of cast irons has also been linked to the microstructure of the metal matrix, with pearlite yielding higher spall strengths than free ferrite.

  12. Slowly Varying Dilaton Cosmologies and Their Field Theory Duals

    SciTech Connect (OSTI)

    Awad, Adel; Das, Sumit R.; Ghosh, Archisman; Oh, Jae-Hyuk; Trivedi, Sandip P.; /Tata Inst. /Stanford U., ITP /SLAC

    2011-06-28

    We consider a deformation of the AdS{sub 5} x S{sup 5} solution of IIB supergravity obtained by taking the boundary value of the dilaton to be time dependent. The time dependence is taken to be slowly varying on the AdS scale thereby introducing a small parameter {epsilon}. The boundary dilaton has a profile which asymptotes to a constant in the far past and future and attains a minimum value at intermediate times. We construct the sugra solution to first non-trivial order in {epsilon}, and find that it is smooth, horizon free, and asymptotically AdS{sub 5} x S{sup 5} in the far future. When the intermediate values of the dilaton becomes small enough the curvature becomes of order the string scale and the sugra approximation breaks down. The resulting dynamics is analysed in the dual SU(N) gauge theory on S{sup 3} with a time dependent coupling constant which varies slowly. When N{epsilon} << 1, we find that a quantum adiabatic approximation is applicable, and use it to argue that at late times the geometry becomes smooth AdS{sub 5} x S{sup 5} again. When N{epsilon} >> 1, we formulate a classical adiabatic perturbation theory based on coherent states which arises in the large N limit. For large values of the tHooft coupling this reproduces the supergravity results. For small 'tHooft coupling the coherent state calculations become involved and we cannot reach a definite conclusion. We argue that the final state should have a dual description which is mostly smooth AdS5 space with the possible presence of a small black hole.

  13. SU-D-19A-02: Electron and Photon Absorbed Fractions for Tumors of Varying Sizes and Compositions

    SciTech Connect (OSTI)

    Olguin, E; Bolch, W [UniversityFlorida, Gainesville, FL (United States)

    2014-06-01

    Purpose: To calculate absorbed fractions for mono-energetic photons and electrons in tumors of varying compositions using Monte Carlo simulations in MCNPX. Although tumor dosimetry has been previously investigated, these studies are very limited as they only consider absorbed fractions for soft-tissue tumors. Methods: The tumors were modeled as spheres with radii ranging from 0.10 cm to 6.0 cm and with compositions varying from 100% soft tissue to 100% bone. The energies of both the photons and electrons were varied from 10 keV to 10 MeV and were homogenously distributed throughout the tumor volume. Furthermore, this investigation addresses the issue of spherical versus elliptical tumors. Both prolate and oblate spheroid tumors of different compositions were modeled, and absorbed fractions were calculated for various electron and photon energies. Results: The data clearly shows an absorbed fraction dependence on tumor composition. For example, a soft-tissue model for a 3 MeV electron emitted in a 1 cm diameter bone tumor would have an 83% error, and this same assumption for a 500 keV photon would yield a 74% error. Ultimately, empirical fits were created for each of the five material compositions in order to facilitate the absorbed fraction calculation, requiring only the tumor size and particle energy. Furthermore, the data shows that absorbed fractions for moderate spheroids can be well approximated by spherical tumors of equal mass to within 8%, but in the extreme cases where the spheroid resembles more of a disk, the errors can be as high as 30%. Conclusion: This comprehensive data set is most valuable for nuclear medicine dosimetry because it incorporates particle type, particle energy, tumor size, and tumor composition. Although mono-energetic particles were modeled, absorbed fractions and S-values may be calculated for any radionuclide via linear interpolation, as long as the particle energies or spectra are known.

  14. A multiscale MDCT image-based breathing lung model with time-varying regional ventilation

    SciTech Connect (OSTI)

    Yin, Youbing, E-mail: youbing-yin@uiowa.edu [Department of Mechanical and Industrial Engineering, The University of Iowa, Iowa City, IA 52242 (United States) [Department of Mechanical and Industrial Engineering, The University of Iowa, Iowa City, IA 52242 (United States); IIHR-Hydroscience and Engineering, The University of Iowa, Iowa City, IA 52242 (United States); Department of Radiology, The University of Iowa, Iowa City, IA 52242 (United States); Choi, Jiwoong, E-mail: jiwoong-choi@uiowa.edu [Department of Mechanical and Industrial Engineering, The University of Iowa, Iowa City, IA 52242 (United States) [Department of Mechanical and Industrial Engineering, The University of Iowa, Iowa City, IA 52242 (United States); IIHR-Hydroscience and Engineering, The University of Iowa, Iowa City, IA 52242 (United States); Hoffman, Eric A., E-mail: eric-hoffman@uiowa.edu [Department of Radiology, The University of Iowa, Iowa City, IA 52242 (United States); Department of Biomedical Engineering, The University of Iowa, Iowa City, IA 52242 (United States); Department of Internal Medicine, The University of Iowa, Iowa City, IA 52242 (United States); Tawhai, Merryn H., E-mail: m.tawhai@auckland.ac.nz [Auckland Bioengineering Institute, The University of Auckland, Auckland (New Zealand); Lin, Ching-Long, E-mail: ching-long-lin@uiowa.edu [Department of Mechanical and Industrial Engineering, The University of Iowa, Iowa City, IA 52242 (United States) [Department of Mechanical and Industrial Engineering, The University of Iowa, Iowa City, IA 52242 (United States); IIHR-Hydroscience and Engineering, The University of Iowa, Iowa City, IA 52242 (United States)

    2013-07-01

    A novel algorithm is presented that links local structural variables (regional ventilation and deforming central airways) to global function (total lung volume) in the lung over three imaged lung volumes, to derive a breathing lung model for computational fluid dynamics simulation. The algorithm constitutes the core of an integrative, image-based computational framework for subject-specific simulation of the breathing lung. For the first time, the algorithm is applied to three multi-detector row computed tomography (MDCT) volumetric lung images of the same individual. A key technique in linking global and local variables over multiple images is an in-house mass-preserving image registration method. Throughout breathing cycles, cubic interpolation is employed to ensure C{sub 1} continuity in constructing time-varying regional ventilation at the whole lung level, flow rate fractions exiting the terminal airways, and airway deformation. The imaged exit airway flow rate fractions are derived from regional ventilation with the aid of a three-dimensional (3D) and one-dimensional (1D) coupled airway tree that connects the airways to the alveolar tissue. An in-house parallel large-eddy simulation (LES) technique is adopted to capture turbulent-transitional-laminar flows in both normal and deep breathing conditions. The results obtained by the proposed algorithm when using three lung volume images are compared with those using only one or two volume images. The three-volume-based lung model produces physiologically-consistent time-varying pressure and ventilation distribution. The one-volume-based lung model under-predicts pressure drop and yields un-physiological lobar ventilation. The two-volume-based model can account for airway deformation and non-uniform regional ventilation to some extent, but does not capture the non-linear features of the lung.

  15. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  16. Mechanical Engineering BEng / BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Mechanical engineers play key roles in all industrial sectors, from aerospace and oil and gas, through food for Mechanical Engineering graduates in many sectors, including power production, oil and petrochemicals, manufacturing, power plant, medical engineering and many others l Whatever your final career path, developing

  17. Fashion Marketing & Retailing BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Fashion Marketing & Retailing BA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (BA Hons) Delivery type: Day Intake date: September Fees: 54000 AED per year Overview Our Fashion Marketing and Retailing programme confidently prepares students for a career within the marketing and retailing industry

  18. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Duren, Mike

    2012-01-01

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  19. Organisational Change -Key Steps LocalCollege/

    E-Print Network [OSTI]

    Botea, Adi

    Resources Division START Version 1.0 X:\\Employment Strategies\\Workplace Change & Innovation\\Change Management Frameworks\\Change Management - Key Steps 021111.vsd FINISH NOTES: * For information on formal vs informal change refer to the managing change clause in the ANU Enterprise Agreement and the managing change policy

  20. Chemical Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Chemical Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng Hons) Delivery type: Day Intake date: September Fees: 58000 AED per year Overview Chemical engineering successful and thriving types of business in the world. Chemical engineers play a vital role in achieving

  1. Management strategies for endangered Florida Key deer 

    E-Print Network [OSTI]

    Peterson, Markus Nils

    2004-09-30

    species. These data were used to address my study objectives. I found the most commonly cited FSR (2.67:1, male:female) for Florida Key deer to be inaccurate. A male biased FSR of 1.45:1 was more probable. Modified drop and drive nets were appropriate...

  2. Psychology with Management BSc (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Psychology with Management BSc (Hons) Key details Duration: Full-time: 4 years Delivery type: Day% Psychology with 25% Business and Management modules. Psychology modules cover a range of core approaches to psychology as well as research design and analysis and applied specialist topics. The curriculum is based

  3. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  4. Business Management BA / MA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Business Management BA / MA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (MSc Management degree programme follows a number of guiding principles that mirror the values of managers of leading organisations and reflect current business management thinking. In the first two years of all

  5. Vermont's Changing Forests Key Findings on the

    E-Print Network [OSTI]

    Keeton, William S.

    1 Vermont's Changing Forests Key Findings on the Health of Forested Ecosystems from the Vermont Members Anne Archie, USDA Forest Service Douglas Lantagne, University of Vermont Ed O'Leary, Vermont, USDA Farm Service Agency Charles Scott, USDA Forest Service Steven Sinclair, Vermont Agency of Natural

  6. Automotive Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Automotive Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng programme, but allows students in the later years to specialise in subjects relating to automotive technology. Automotive engineering continues to be a major employer of professional engineers, owing

  7. CAREER RESOURCES Canadian Key Business Directory

    E-Print Network [OSTI]

    Thompson, Michael

    CAREER RESOURCES BOOKS Canadian Key Business Directory - Includes the largest companies in Canada companies - Search by name, geography, SIC code and more! - Online version available through library: http://www.jobsetc.gc.ca/eng/ - Training, career and worker information - Career Exploration resources

  8. NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues

    E-Print Network [OSTI]

    NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues Cem Kaner, J.D., Ph.D., ASQ-CQE November 1999 Contact Information: kaner@kaner.com www.kaner.com (testing November 1999 Cem Kaner Page 2 UCITA? Huh?UCITA? Huh? · Uniform Computer Information Transactions Act

  9. Large Engineering Systems Conference on Power Engineering, July 2004, Halifax Canada. IEEE 2004 1 Abstract--One important assumption in a model of an

    E-Print Network [OSTI]

    the impacts of bid format and profit calculation on market outcomes in different scenarios. Index Terms-- Power system economics, Pricing, Market design I. INTRODUCTION ne of the first assumptions in a model Abstract--One important assumption in a model of an electricity market is the format of bids and costs

  10. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

  11. Identification of Key Barriers in Workforce Development

    SciTech Connect (OSTI)

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  12. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  13. Rapid Compression Machine ? A Key Experimental Device to Effectively...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compression Machine A Key Experimental Device to Effectively Collaborate with Basic Energy Sciences Rapid Compression Machine A Key Experimental Device to Effectively...

  14. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  15. Single, Key Gene Discovery Could Streamline Production of Biofuels...

    Energy Savers [EERE]

    Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

  16. Building America Expert Meeting: Key Innovations for Adding Energy...

    Energy Savers [EERE]

    Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance...

  17. Thailand-Key Results and Policy Recommendations for Future Bioenergy...

    Open Energy Info (EERE)

    Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future...

  18. Technology Key to Harnessing Natural Gas Potential | Department...

    Office of Environmental Management (EM)

    Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa...

  19. Key Energy-Saving Projects for Smaller Facilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Energy-Saving Projects for Smaller Facilities Key Energy-Saving Projects for Smaller Facilities This presentation discusses how smaller industrial facilities can save energy...

  20. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  1. Another key Y-12 General Foreman remembered

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TAPropaneandAn319Another key Y-12 General Foreman

  2. Keyes, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLCKeyes,

  3. NERSC.COE.key.actions-4.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on77 PAGEMissionStressMoveMuncriefB ONERSCNERSC8 CoE Key Actions

  4. Composite keys? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlusComposite keys? Home >

  5. Fermilab | Science | Particle Physics | Key Discoveries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find whatGasEnergyfeature photo featureParticleDark matterKey

  6. Key Agency Targets Summary _FY 2012_.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5 B

  7. Key Actions for Optimizing for KNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin Morris Title:AnaKey

  8. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power, IncBio Centers Announcement at theproduceƈ GOAL:Key

  9. Fair Encryption of RSA Keys Guillaume Poupard and Jacques Stern

    E-Print Network [OSTI]

    Stern, Jacques

    based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs

  10. The impacts of urbanization on endangered florida key deer 

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12

    of peninsular Florida. Key deer range is restricted to the Lower Florida Keys with approximately 60% residing on Big Pine Key and 15% residing on No Name Key which have undergone rapid human population growth and development over the past 30 years. Urban...

  11. Dynamic and Robust Capacitated Facility Location in Time Varying Demand Environments 

    E-Print Network [OSTI]

    Torres Soto, Joaquin

    2010-07-14

    This dissertation studies models for locating facilities in time varying demand environments. We describe the characteristics of the time varying demand that motivate the analysis of our location models in terms of total demand and the change...

  12. Semi-parametric Methods for Estimating Time-varying Graph Structure

    E-Print Network [OSTI]

    Murphy, Robert F.

    for estimating time-varying networks, which both build on a temporally smoothed l1-regularized logistic-varying networks. For real datasets, we reverse engi- neer the latent sequence of temporally rewiring political

  13. A New Methodology for Frequency Domain Analysis of Wave Energy Converters with Periodically Varying Physical Parameters

    E-Print Network [OSTI]

    Victoria, University of

    A New Methodology for Frequency Domain Analysis of Wave Energy Converters with Periodically Varying Methodology for Frequency Domain Analysis of Wave Energy Converters with Periodically Varying Physical of Mechanical Engineering) ABSTRACT Within a wave energy converter's operational bandwidth, device operation

  14. Sensitivity of Utility-Scale Solar Deployment Projections in the SunShot Vision Study to Market and Performance Assumptions

    SciTech Connect (OSTI)

    Eurek, K.; Denholm, P.; Margolis, R.; Mowers, M.

    2013-04-01

    The SunShot Vision Study explored the potential growth of solar markets if solar prices decreased by about 75% from 2010 to 2020. The ReEDS model was used to simulate utility PV and CSP deployment for this present study, based on several market and performance assumptions - electricity demand, natural gas prices, coal retirements, cost and performance of non-solar renewable technologies, PV resource variability, distributed PV deployment, and solar market supply growth - in addition to the SunShot solar price projections. This study finds that utility-scale solar deployment is highly sensitive to solar prices. Other factors can have significant impacts, particularly electricity demand and natural gas prices.

  15. Complete Chaotic Mixing in an Electro-osmotic Flow by Destabilization of Key Periodic Pathlines

    E-Print Network [OSTI]

    R. Chabreyrie; C. Chandre; P. Singh; N. Aubry

    2011-02-07

    The ability to generate complete, or almost complete, chaotic mixing is of great interest in numerous applications, particularly for microfluidics. For this purpose, we propose a strategy that allows us to quickly target the parameter values at which complete mixing occurs. The technique is applied to a time periodic, two-dimensional electro-osmotic flow with spatially and temporally varying Helmoltz-Smoluchowski slip boundary conditions. The strategy consists of following the linear stability of some key periodic pathlines in parameter space (i.e., amplitude and frequency of the forcing), particularly through the bifurcation points at which such pathlines become unstable.

  16. Electricity and Development: Global Trends and Key Challenges

    E-Print Network [OSTI]

    ;3. Prospects for Electricity Development Electricity Access Projected Electrification Rates by Region globalElectricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12

  17. Energy Storage: The Key to a Reliable, Clean Electricity Supply...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy...

  18. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  19. SOW and Key Performance Parameters (KPP) Handbook Final Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 This handbook provides suggested...

  20. Could Solar Energy Storage be Key for Residential Solar? | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? October 26, 2010 - 4:52pm Addthis This is the silent power storage...

  1. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  2. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  3. Master Thesis Group Key Agreement for Ad Hoc Networks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Master Thesis Group Key Agreement for Ad Hoc Networks Lijun Liao Date: 06 July 2005 Supervisor: M their financial support. #12;Abstract Over the last 30 years the study of group key agreement has stimulated much present a Tree-based group key agreement Framework for Ad-hoc Networks (TFAN). TFAN is especially suitable

  4. Distributed Key Generation in the Wild Aniket Kate1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distributed Key Generation in the Wild Aniket Kate1 Yizhou Huang2 Ian Goldberg2 1 Max Planck of Waterloo, Canada aniket@mpi-sws.org, {y226huan, iang}@uwaterloo.ca Abstract Distributed key generation (DKG communication model. computational setting. distributed key generation. uniform randomness. implementation 1

  5. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  6. Leakage-Resilient Cryptography with Key Derived from Sensitive Data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Leakage-Resilient Cryptography with Key Derived from Sensitive Data Konrad Durnoga , Tomasz Kazana subject to adversarial leakage. We propose a method to derive keys for such protocols on-the-fly from the actual keys are derived from. That is, an adversary can hardly gain any knowledge about the private data

  7. Residential applliance data, assumptions and methodology for end-use forecasting with EPRI-REEPS 2.1

    SciTech Connect (OSTI)

    Hwang, R.J,; Johnson, F.X.; Brown, R.E.; Hanford, J.W.; Kommey, J.G.

    1994-05-01

    This report details the data, assumptions and methodology for end-use forecasting of appliance energy use in the US residential sector. Our analysis uses the modeling framework provided by the Appliance Model in the Residential End-Use Energy Planning System (REEPS), which was developed by the Electric Power Research Institute. In this modeling framework, appliances include essentially all residential end-uses other than space conditioning end-uses. We have defined a distinct appliance model for each end-use based on a common modeling framework provided in the REEPS software. This report details our development of the following appliance models: refrigerator, freezer, dryer, water heater, clothes washer, dishwasher, lighting, cooking and miscellaneous. Taken together, appliances account for approximately 70% of electricity consumption and 30% of natural gas consumption in the US residential sector. Appliances are thus important to those residential sector policies or programs aimed at improving the efficiency of electricity and natural gas consumption. This report is primarily methodological in nature, taking the reader through the entire process of developing the baseline for residential appliance end-uses. Analysis steps documented in this report include: gathering technology and market data for each appliance end-use and specific technologies within those end-uses, developing cost data for the various technologies, and specifying decision models to forecast future purchase decisions by households. Our implementation of the REEPS 2.1 modeling framework draws on the extensive technology, cost and market data assembled by LBL for the purpose of analyzing federal energy conservation standards. The resulting residential appliance forecasting model offers a flexible and accurate tool for analyzing the effect of policies at the national level.

  8. Cut-on, cut-off transition of sound in slowly varying flow ducts

    E-Print Network [OSTI]

    Rienstra, Sjoerd W.

    Cut-on, cut-off transition of sound in slowly varying flow ducts Sjoerd W. Rienstra 19-walled duct with irrotational isentropic mean flow is studied. The usual turning point behaviour was found. 1 Introduction The exact multiple scale solution for sound propagation in a slowly varying lined flow duct

  9. SOUND TRANSMISSION IN SLOWLY VARYING CIRCULAR AND ANNULAR LINED DUCTS WITH FLOW a

    E-Print Network [OSTI]

    Eindhoven, Technische Universiteit

    SOUND TRANSMISSION IN SLOWLY VARYING CIRCULAR AND ANNULAR LINED DUCTS WITH FLOW a S.W. Rienstra/CEAS Aeroacoustics Conference, June 2­4, 1998, Toulouse ABSTRACT Sound transmission through straight circular ducts by a modal expansion. A natural ex­ tension for ducts with axially slowly varying properties (diameter

  10. Storage of water on vegetation under simulated rainfall of varying intensity

    E-Print Network [OSTI]

    Keim, Richard

    Storage of water on vegetation under simulated rainfall of varying intensity R.F. Keim a,*, A Little is understood about how storage of water on forest canopies varies during rainfall, even though storage changes intensity of throughfall and thus affects a variety of hydrological processes

  11. ON A MODEL FOR CONTINUOUS SEDIMENTATION IN VESSELS WITH DISCONTINUOUSLY VARYING CROSS-SECTIONAL AREA

    E-Print Network [OSTI]

    ON A MODEL FOR CONTINUOUS SEDIMENTATION IN VESSELS WITH DISCONTINUOUSLY VARYING CROSS]. However, we now consider that the cross-sectional area of the settling vessel is not constant in both for continuous sedimentation in a vessel with varying cross section. In the formulation of the #12;nal initial

  12. The Y-chromosome landscape of the Philippines: extensive heterogeneity and varying genetic affinities

    E-Print Network [OSTI]

    Xu, Shuhua

    ARTICLE The Y-chromosome landscape of the Philippines: extensive heterogeneity and varying genetic, Mark Stoneking2 and Maria Corazon A De Ungria*,1 The Philippines exhibits a rich diversity of people history for Filipino groups, with varying roles for migrations from outside the Philippines, genetic drift

  13. An Adaptive Framework for Visualizing Unstructured Grids with Time-Varying Scalar

    E-Print Network [OSTI]

    Callahan, Steven

    . A number of successful techniques for time-varying regular grids have used compression to mitigate simulations. This is a challenging problem since this data is often large, can be organized in different) and variable domain fields. It is common to consider subsets of this problem, such as time-varying scalar

  14. Action Potential Energy Efficiency Varies Among Neuron Types in Vertebrates and Invertebrates

    E-Print Network [OSTI]

    Action Potential Energy Efficiency Varies Among Neuron Types in Vertebrates and Invertebrates Biswa) Action Potential Energy Efficiency Varies Among Neuron Types in Vertebrates and Invertebrates. PLo gradients, thus consuming more energy. Here, we ask whether the ionic currents underlying the AP can

  15. Lyapunov Function Constructions for Slowly Time-Varying Systems Frederic Mazenc and Michael Malisoff

    E-Print Network [OSTI]

    Sontag, Eduardo

    Lyapunov Function Constructions for Slowly Time-Varying Systems Fr´ed´eric Mazenc and Michael Malisoff Abstract-- We provide general methods for explicitly con- structing strict Lyapunov functions previous Lyapunov function constructions for rapidly time-varying dynamics. We also explicitly construct

  16. On Control-Lyapunov Functions for Hybrid Time-Varying Systems Michael Malisoff and Frederic Mazenc

    E-Print Network [OSTI]

    Sontag, Eduardo

    On Control-Lyapunov Functions for Hybrid Time-Varying Systems Michael Malisoff and Fr´ed´eric Mazenc Abstract-- We explicitly construct strict input-to-state stable Lyapunov functions for time varying hybrid systems, in terms of given nonstrict Lyapunov functions and persistency of excitation

  17. Capacity-Optimal Training for Space-Time Modulation over a Time-Varying Channel

    E-Print Network [OSTI]

    Swindlehurst, A. Lee

    Capacity-Optimal Training for Space-Time Modulation over a Time-Varying Channel Christian B. Peel-autocorrelation function for time-varying MIMO channels, we find a lower bound on capacity for trained modulation, and find for differential unitary space-time modulation is discussed and compared with that for trained modulation. We

  18. 4.1.1.6 Quiet and slowly varying radio emissions Arnold O. Benz

    E-Print Network [OSTI]

    4.1.1.6 Quiet and slowly varying radio emissions of the sun Arnold O. Benz The solar atmosphere emits radio emission at all wavelengths and at all times. Its total flux density varies with magnetic. It is reached when the sun has been free of spots for some weeks. This is called the quiet radio emission

  19. Updated distribution and reintroduction of the Lower Keys marsh rabbit 

    E-Print Network [OSTI]

    Faulhaber, Craig Alan

    2005-02-17

    , for their advice and interest in the project. Kim Rohrs of the Monroe County Department of Planning and Environmental Resources provided valuable spatial and tabular data on land ownership and land-use planning in the Keys. My interns, Josh Harris, Kyle........................ 29 3.1 The number of individual Lower Keys marsh rabbits captured in 13 occupied populations on 4 keys from October 2001?August 2002. Data are arranged according to sex and age class...

  20. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  1. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  2. Deputy Secretary Sherwood-Randall Meets Key Government Officials...

    Broader source: Energy.gov (indexed) [DOE]

    Pritzker and Deputy Secretary Sherwood-Randall had the opportunity to engage with key Chinese government officials while in Beijing. Both met with Premier Li Keqiang and Vice...

  3. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Climate Action Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment...

  4. California Energy Incentive Programs An Annual Update on Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Issues and Financial Opportunities for Federal Sites in California California Energy Incentive Programs An Annual Update on Key Energy Issues and Financial Opportunities...

  5. Intercropped silviculture systems, a key to achieving soil fungal...

    Office of Scientific and Technical Information (OSTI)

    Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations Citation Details In-Document Search Title: Intercropped...

  6. Strategic Energy Management.  Keys to Behavioral and Operational Change.

    E-Print Network [OSTI]

    Kroll, Ryan M; Willems, Phil; Rubado, Dan; Belkhayat, Kathleen

    2015-01-01

    Strategic Energy Management Keys to Behavioral andof Oregon’s Strategic Energy Management (SEM) initiative.Introduction Strategic energy management (SEM) is defined

  7. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  8. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  9. Finite volume evolution Galerkin method for hyperbolic conservation laws with spatially varying

    E-Print Network [OSTI]

    Galerkin scheme, finite volume methods, bicharacteristics, wave equation, heterogeneous media, acoustic equation system with spatially varying wave speeds and simulate the propagation of acoustic waves for wave propagation problems in a heterogeneous media. We illustrate our methodology for acoustic waves

  10. Testing of a loop heat pipe experimental apparatus under varied acceleration 

    E-Print Network [OSTI]

    Kurwitz, Richard Cable

    1997-01-01

    An experimental apparatus was designed and fabricated to test a Loop Heat Pipe under varied acceleration. The experiment consisted of both flight and ground testing as well as comparisons to a model developed from models ...

  11. Dynamic power allocation and routing for satellite and wireless networks with time varying channels

    E-Print Network [OSTI]

    Neely, Michael J. (Michael James), 1975-

    2004-01-01

    Satellite and wireless networks operate over time varying channels that depend on attenuation conditions, power allocation decisions, and inter-channel interference. In order to reliably integrate these systems into a high ...

  12. A time-varying subsidence parameterization for the atmospheric boundary layer

    E-Print Network [OSTI]

    Flagg, David D. (David Douglas)

    2005-01-01

    This study examines the effect of a time-varying parameterization for subsidence in the atmospheric boundary layer (ABL) on a one-dimensional coupled land-atmosphere model. Measurements of large-scale divergence in the ABL ...

  13. Cell Adhesion on Polyelectrolyte Multilayer Coated Polydimethylsiloxane Surfaces with Varying Topographies

    E-Print Network [OSTI]

    Lee, Ilsoon

    Cell Adhesion on Polyelectrolyte Multilayer Coated Polydimethylsiloxane Surfaces with Varying to the pattern size and pitch influences cell adhesion and proliferation. Extensive research has shown substrate for cell ad- hesion. To improve adhesion, we built polyelectrolyte multilayers (PEMs) on PDMS

  14. Shifting Preferences and Time-Varying Parameters in Demand Analysis: A Monte Carlo Study

    E-Print Network [OSTI]

    Kanyama, Isaac Kalonda

    2011-05-31

    Using Monte Carlo experiments, I address two issues in demand analysis. The first relates to the performance of local flexible functional forms in recovering the time-varying elasticities of a true model, and in correctly identifying goods...

  15. Throughput Optimal Scheduling Over Time-Varying Channels in the Presence of Heavy-Tailed Traffic

    E-Print Network [OSTI]

    Jagannathan, Krishna Prasanna

    We study the problem of scheduling over time varying links in a network that serves both heavy-tailed and light tailed traffic. We consider a system consisting of two parallel queues, served by a single server. One of the ...

  16. Recovering time-varying networks of dependencies in social and biological studies

    E-Print Network [OSTI]

    Xing, Eric P.

    -regularized logistic regression formalism that can be cast as a standard convex-optimization problem on recovering simulated time- varying networks and on reverse engineering the latent sequence of temporally

  17. AES Flow Interception : Key Snooping Method on Virtual Machine.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES for snooping AES en- cryption key on Virtual Machine Monitor (VMM), and we present coun- termeasures against. In general, the virtualization technology composes two software parts: one is vir- tual machine (VM

  18. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  19. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  20. A Distributed Public Key Caching Scheme in Large Wireless Networks

    E-Print Network [OSTI]

    Deng, Jing

    -constrained, in terms of computational power, battery energy, and on-board memory space. For example, the prototypeA Distributed Public Key Caching Scheme in Large Wireless Networks Yuan Kong Jing Deng Stephen R in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate

  1. Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme P. Scholl and N.P. Smart scheme was the slow key generation process. Gentry and Halevi provided a fast technique for 2-power cyclo. In particular they focused on the field generated by the polynomial F(X) = X2n + 1, but they noted

  2. Zero-one laws for connectivity in random key graphs

    E-Print Network [OSTI]

    Yagan, Osman

    with the random key predistribution scheme of Eschenauer and Gligor for wireless sensor networks. For this class which are more realistic for applications to wireless sensor networks. Keywords: Wireless sensor- dom key predistribution for wireless sensor networks (WSNs) [6], [7], [9]. For the sake

  3. Baton: Key Agility for Android without a Centralized Certificate Infrastructure

    E-Print Network [OSTI]

    Van Oorschot, Paul

    Baton: Key Agility for Android without a Centralized Certificate Infrastructure David Barrera,dmccarney}@ccsl.carleton.ca {clark,paulv}@scs.carleton.ca ABSTRACT Android's trust-on-first-use application signing model asso transfer signing au- thority to a new signing key. Our proposal, Baton, modifies Android's app installation

  4. Comparative Analysis of Software Libraries for Public Key Cryptography

    E-Print Network [OSTI]

    Gaj, Krzysztof

    Comparative Analysis of Software Libraries for Public Key Cryptography Ashraf Abusharekh1 and Kris libraries implementing such operations exist both commercially and in the public domain, in this paper, we, using performance and support of public key primitive operations. The performance of all libraries

  5. k-Connectivity in Random Key Graphs with Unreliable Links

    E-Print Network [OSTI]

    Yagan, Osman

    of Eschenauer and Gligor for securing wireless sensor network (WSN) communications. Random key graphs have real-world networks; e.g., with secure WSN application in mind, link unreliability can be attributed for securing WSN communications is the random predistribution of cryptographic keys to sensor nodes

  6. Wireless sensor networks under the random pairwise key predistribution scheme

    E-Print Network [OSTI]

    Yagan, Osman

    Wireless sensor networks under the random pairwise key predistribution scheme: Can resiliency, College Park, MD 20742. Email: armand@isr.umd.edu Abstract--We investigate the resiliency of wireless the classical key predistribution scheme of Eschenauer and Gligor. Keywords: Wireless sensor networks, Security

  7. Charge non-conservation, dequantisation, and induced electric dipole moments in varying-alpha theories

    E-Print Network [OSTI]

    Douglas J. Shaw

    2005-09-13

    We note that in extensions of the Standard Model that allow for a varying fine structure constant, alpha, all matter species, apart from right-handed neutrinos, will gain an intrinsic electric dipole moment (EDM). In a large subset of varying-alpha theories, all such particle species will also gain an effective electric charge. This charge will in general not be quantised and can result in macroscopic non-conservation of electric charge.

  8. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  9. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  10. 7-117 The claim of a heat pump designer regarding the COP of the heat pump is to be evaluated. Assumptions The heat pump operates steadily.

    E-Print Network [OSTI]

    Bahrami, Majid

    7-47 7-117 The claim of a heat pump designer regarding the COP of the heat pump is to be evaluated. Assumptions The heat pump operates steadily. HP Wnet,in QH QL TL TH Analysis The maximum heat pump coefficient of performance would occur if the heat pump were completely reversible, 5.7 K026K300 K300 COP maxHP, LH H TT

  11. Key Facts about Argonne National Laboratory | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKeyKey

  12. Stochastic Modeling and Power Control of Time-Varying Wireless Communication Networks

    SciTech Connect (OSTI)

    Olama, Mohammed M [ORNL; Djouadi, Seddik M [ORNL; Charalambous, Prof. Charalambos [University of Cyprus

    2014-01-01

    Wireless networks are characterized by nodes mobility, which makes the propagation environment time-varying and subject to fading. As a consequence, the statistical characteristics of the received signal vary continuously, giving rise to a Doppler power spectral density (DPSD) that varies from one observation instant to the next. This paper is concerned with dynamical modeling of time-varying wireless fading channels, their estimation and parameter identification, and optimal power control from received signal measurement data. The wireless channel is characterized using a stochastic state-space form and derived by approximating the time-varying DPSD of the channel. The expected maximization and Kalman filter are employed to recursively identify and estimate the channel parameters and states, respectively, from online received signal strength measured data. Moreover, we investigate a centralized optimal power control algorithm based on predictable strategies and employing the estimated channel parameters and states. The proposed models together with the estimation and power control algorithms are tested using experimental measurement data and the results are presented.

  13. OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts!

    E-Print Network [OSTI]

    OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts! Eyestalk mouth antenna cheliped CURRICULUM Name: _____________________ Fun Crab Facts! Eyestalk Mouth Antenna Cheliped Carapace Walking metamorphosis motorcycle exoskeleton omnivores butterfly pea #12;OIMB GK12 CURRICULUM Masked crab Fiddler crab

  14. EnergySmart Schools National Financing Roundtable - Key Outcomes

    SciTech Connect (OSTI)

    2009-04-01

    This document presents key outcomes from the EnergySmart Schools National Financing Roundtable as a follow-up to the release of its Guide to FInancing EnergySmart Schools

  15. LANL breaks ground on key sediment control project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and made of rocks...

  16. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all about turbulence....

  17. Refine the Concept of Public Key Encryption with Delegated Search

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    with the public key of Bob, but unfortunately, her computer is infected by some virus which embeds a malware contents. However, in this way, Bob's computer will be under the risk of infection by the malware

  18. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

  19. A Key Review On Exergetic Analysis And Assessment Of Renewable...

    Open Energy Info (EERE)

    A Key Review On Exergetic Analysis And Assessment Of Renewable Energy Resources For A Sustainable Future Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal...

  20. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren students may want to (quietly) opt out of their friends' illicit file trading activities, but academics

  1. Practical Non-Interactive Key Distribution Based on Pairings

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , the Private Key Generator (PKG), who possesses additional privileged information in the form of a master in a non- interactive system is that the synchronous communication between Alice and Bob is replaced

  2. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  3. Reflective cracking of shear keys in multi-beam bridges 

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02

    strength to resist cracking from vehicular loads, but uneven temperature changes and shrinkage strains cause high tensile stresses in the shear key regions and lead to reflective cracking. The analyses showed the highest stresses were often times near...

  4. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  5. Darcy Q. Hou State Key Laboratory of Hydraulic

    E-Print Network [OSTI]

    Tijsseling, A.S.

    Darcy Q. Hou State Key Laboratory of Hydraulic Engineering Simulation and Safety, and School to severe dam- ages. Over 50 incidents have been attributed to this mechanism and an accident was reported

  6. Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the observed set of round subkeys in memory (computed via the cipher's key schedule operation), which were, for transparent en- cryption and decryption of data. One could apply the method from [9] to obtain the computer

  7. Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01

    "Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

  8. Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01

    Grid parity--or break-even cost--for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that local incentives rather than ?technical? parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  9. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  10. Some Consequences of Dark Energy Density varying Exponentially with Scale Factor

    E-Print Network [OSTI]

    Sanil Unnikrishnan; T. R. Seshadri

    2005-11-10

    In this paper we have explored the consequences of a model of dark energy with its energy density varying exponentially with the scale factor. We first consider the model with $ \\rho_{\\phi} \\propto e^{\\kappa a} $, where $\\kappa $ is a constant. This is a kind of generalisation of the cosmological constant model with $\\kappa = 0$. We show that such an exponentially varying dark energy density with the scale factor naturally leads to an equivalent phantom field. We also consider a model with $ \\rho_{\\phi} \\propto e^{\\kappa /a} $ and we show that this also naturally leads to an equivalent phantom field.

  11. Redshifting of cosmological black bodies in BSBM varying-alpha theories

    E-Print Network [OSTI]

    Barrow, John D.; Magueijo, João

    2014-12-04

    the energy of a wave packet does not change because of a varying e (or ?). Combining this with the absence of dispersion we can conclude that there is no photon production, since the density of photons with frequency ? is N = ?/(~?). The Stefan-Boltzmann law... for a decoupled black body is therefore also preserved, with the temperature receiving no new effects due to a varying ? (other than those due to the gravitational effect of ? in the Friedman equation, which, as we stated, are negligible). We note...

  12. Journal of Mammalogy, 84(2):354368, 2003 MAMMALIAN RESPONSE TO GLOBAL WARMING ON VARIED

    E-Print Network [OSTI]

    California at Berkeley, University of

    354 Journal of Mammalogy, 84(2):354­368, 2003 MAMMALIAN RESPONSE TO GLOBAL WARMING ON VARIED how Rocky Mountain mam- malian communities changed during past global warming events characterized not) in different ways. Nevertheless, examination of past global warming episodes suggested

  13. Predictive Motion Planning for AUVs subject to strong time-varying currents and forecasting uncertainties

    E-Print Network [OSTI]

    Smith, Ryan N.

    represented as spatial and temporally varying ocean currents with a bounded uncertainty in their predictions-series predictive ocean current model. Results show the combined NRMPC and A* approach is capable of generating on exploiting variations in ocean currents [4]­[6], with energy savings of over 32% demonstrated in strongly

  14. Varying-Coefficient Functional Linear Yichao Wu , Jianqing Fan and Hans-Georg Muller

    E-Print Network [OSTI]

    Müller, Hans-Georg

    Varying-Coefficient Functional Linear Regression Yichao Wu , Jianqing Fan and Hans-Georg M¨uller NCSU, Princeton University, and UC-Davis Abstract: Functional linear regression analysis aims to model arguments of the regression parameter function. This extension of the functional linear regression model

  15. Aalborg Universitet Time-Varying FOPDT Modeling and On-line Parameter Identification

    E-Print Network [OSTI]

    Yang, Zhenyu

    Zhen Sun Department of Energy Technology, Aalborg University, Esbjerg Campus, Niels Bohrs Vej 8, DK; Sun, Zhen Published in: 3th IFAC Symposium on Large Scale Complex Systems: Theory and Applications for published version (APA): Yang, Z., & Sun, Z. (2013). Time-Varying FOPDT Modeling and On-line Parameter

  16. Experiments for Online Estimation of Heavy Vehicle's Mass and Time-Varying Road Grade

    E-Print Network [OSTI]

    Stefanopoulou, Anna

    for online estimation of Heavy Duty Vehicle mass and road grade. The test data is obtained from high- wayExperiments for Online Estimation of Heavy Vehicle's Mass and Time-Varying Road Grade Ardalan Vahidi 1 Anna Stefanopoulou Huei Peng Mechanical Engineering Dept., University of Michigan, Ann Arbor

  17. Tracking of Time-varying Mobile Radio Channels Part I: The Wiener LMS Algorithm

    E-Print Network [OSTI]

    Tracking of Time-varying Mobile Radio Channels Part I: The Wiener LMS Algorithm Lars Lindbom #12;l- ters, called Learning Filters, or as \\LMS/Newton" updates complemented by #12;lters that provide pre- dictions or smoothing estimates. The simplest algorithm, named Wiener LMS, is presented here

  18. Continuous time-varying biasing approach for spectrally tunable infrared detectors

    E-Print Network [OSTI]

    Hayat, Majeed M.

    and Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87106, USA this capability, an algorithm is developed for designing the time- varying bias for an arbitrary spectral-sensing window of interest. Since continuous-time biasing can be implemented within the readout circuit

  19. Response of ectomycorrhizal fungus sporocarp production to varying levels and patterns of green-tree retention

    E-Print Network [OSTI]

    Response of ectomycorrhizal fungus sporocarp production to varying levels and patterns of green is the first study complete with pre-treatment data that examines the effects of silvicultural manipulations of two patterns (aggregated [A], dispersed [D]) and four levels (100, 75, 40, and 15%) of green

  20. Asymptotic reconstruction of the Fourier expansion of inputs of linear time-varying

    E-Print Network [OSTI]

    along with several examples from the automotive engine industry, and with an oscillating water column retrieving wave energy. Keywords: Observers, Linear Time-Varying systems, Periodic input signals, Automotive automotive engine applications. In this domain of engineering, this periodicity stems from a fundamental

  1. Optimal Multi-scale Capacity Planning under Hourly Varying Electricity Prices

    E-Print Network [OSTI]

    Grossmann, Ignacio E.

    inputs: electricity prices, demand data, configuration slates · Each representative week is repeated1 Optimal Multi-scale Capacity Planning under Hourly Varying Electricity Prices Sumit Mitra Ignacio;2 Motivation of this work · Deregulation of the electricity markets caused electricity prices to be highly

  2. Time-varying Predictability in Crude Oil Markets: The Case of GCC Countries

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Time-varying Predictability in Crude Oil Markets: The Case of GCC Countries Mohamed El Hedi Arouri the dynamic behavior of crude-oil prices for the period 1997-2008. Using data from four countries of the Gulf concerning any disruptions in global oil supply. Understanding crude-oil price dynamics is thus of great

  3. Supplemental Figures Seismic imaging of the laterally varying D" region beneath the Cocos Plate

    E-Print Network [OSTI]

    Garnero, Ed

    Supplemental Figures Seismic imaging of the laterally varying D" region beneath the Cocos Plate-474-1882 Fax: 907-474-5618 Email: mthorne@gi.alaska.edu #12;Supplement A. Transverse component velocity.9982 at 80º. #12;Supplement B. Transverse component displacement synthetics are shown. Synthetics for PREM

  4. Oxygen isotope records of goethite from ferricrete deposits indicate regionally varying Holocene climate change in

    E-Print Network [OSTI]

    Hren, Michael

    Oxygen isotope records of goethite from ferricrete deposits indicate regionally varying Holocene isotopes of goethite from ferricrete deposits were measured from both northern and southern Rocky Mountain in oxygen isotope values of 14 C-dated goethites in the northern Rocky Mountains suggests a regional

  5. Response of a Vertical Axis Wind Turbine to Time Varying Wind Conditions found within the Urban

    E-Print Network [OSTI]

    Tullis, Stephen

    Response of a Vertical Axis Wind Turbine to Time Varying Wind Conditions found within the Urban, 2010 PP 389­401 389 ABSTRACT Experimental testing of a vertical axis wind turbine within the urban of the turbine. Temporal variation of the wind with respect to the direction and velocity fluctuations

  6. Integrated storage and querying of spatially varying data quality information in a relational spatial database

    E-Print Network [OSTI]

    Duckham, Matt

    spatial database M.G.S.M Zaffar Sadiq and Matt Duckham Department of Geomatics, University of Melbourne Variation in Quality Keywords Spatial data quality; spatial database; relational database management system for storing and retrieving spatially varying data quality information in a relational spatial database. Rather

  7. Learning Curve: Analysis of an Agent Pricing Strategy Under Varying Conditions

    E-Print Network [OSTI]

    Greenwald, Amy

    . This paper addresses these issues by presenting a market simulator designed for analyzing agent pricing the Learning Curve Simulator, is designed for testing agent pricing strategies under varied market conditions], we analyzed the effectiveness of two different pricing strategies within a specific market scenario

  8. The Effects of Varied Imidization Conditions on Rubbed Polyimide Film Surface Morphology

    E-Print Network [OSTI]

    Chiang, Shirley

    The Effects of Varied Imidization Conditions on Rubbed Polyimide Film Surface Morphology C. L. H InterScience (www.interscience.wiley.com). ABSTRACT: The thermal histories of polyimide films were films; rubbing; polyimide INTRODUCTION In recent years, there has been much attention placed on rubbed

  9. Transient effective hydraulic conductivities under slowly and rapidly varying mean gradients in bounded three-

    E-Print Network [OSTI]

    Tartakovsky, Daniel M.

    Transient effective hydraulic conductivities under slowly and rapidly varying mean gradients it Darcian in real or transformed domains. Each such situation gives rise to an effective hydraulic-time. In this paper we develop first-order analytical expressions for effective hydraulic conductivity under three

  10. Effects of Knots on Ring Polymers in Solvents of Varying Quality Arturo Narros,*,

    E-Print Network [OSTI]

    Likos, Christos N.

    Effects of Knots on Ring Polymers in Solvents of Varying Quality Arturo Narros,*, Angel J. Moreno the conformations and the interactions of ring polymers under conditions of worsening solvent quality, in comparison with molecular weight and one based on the dependence of the effective interaction on solvent quality

  11. Coarse-graining and phase behavior of model star polymercolloid mixtures in solvents of varying quality

    E-Print Network [OSTI]

    Likos, Christos N.

    Coarse-graining and phase behavior of model star polymer­colloid mixtures in solvents of varying-grained models for mixtures of colloids and linear polymers under good-solvent conditions J. Chem. Phys. 141, 244905 (2014); 10.1063/1.4904392 Surface adsorption of colloidal brushes at good solvents conditions J

  12. PROCESS ANALYSIS AND SYNTHESIS OF LASER FORMING OF VARYING THICKNESS PLATE

    E-Print Network [OSTI]

    Yao, Y. Lawrence

    of LF varying thickness plate are conducted in this paper. In this paper, the bending mechanism. An analytical model was proposed to predict the bending deformation. A strategy of LF process synthesis-aging the in-plane strain and bending strain. A thickness-dependent da- tabase is established to determine

  13. Ris-R-1500(EN) Control design for a pitch-regulated, vari-

    E-Print Network [OSTI]

    Risø-R-1500(EN) Control design for a pitch-regulated, vari- able speed wind turbine Morten H speed wind tur- bine Department: Wind Energy Department Risø-R-1500(EN) January 2005 ISSN 0106-2840 ISBN wind speed, which can be almost removed by changing the parameters of the frequency converter

  14. kT/C noise: Covariance matrix calculation of instationary noise in time-varying systems

    E-Print Network [OSTI]

    Noé, Reinhold

    kT/C noise: Covariance matrix calculation of instationary noise in time-varying systems Reinhold kT/C noise is treated analytically, using explicit and implicit notations of differential equations to take into account high integrator bandwidth, slow switching and other methods to mediate kT/C noise

  15. Buoyant mixing of miscible fluids of varying viscosities in vertical tubes M. Debacq,a)

    E-Print Network [OSTI]

    Hinch, John

    engineering,10 fire propagation in vertical shafts,11 drilling and completion fluids in petroleum engiBuoyant mixing of miscible fluids of varying viscosities in vertical tubes M. Debacq,a) J-P. Hulin,b) and D. Salin Laboratoire Fluides Automatique et Syste`mes Thermiques, UMR 7608, CNRS, Universite´s P. et

  16. Global dynamics of a SEIR model with varying total population size

    E-Print Network [OSTI]

    Li, Michael

    State University, Mississippi State, MS 39762, USA b Department of Medical Informatics, Albert Szent fraction persists and a unique endemic equilibrium state is shown, under a mild restriction. Introduction Studies of epidemic models that incorporate disease caused death and varying total population have

  17. Lyapunov functions for time varying systems satisfying generalized conditions of Matrosov

    E-Print Network [OSTI]

    Nesic, Dragan

    Lyapunov functions for time varying systems satisfying generalized conditions of Matrosov theorem F a weak Lyapunov function (positive definite, decrescent, with negative semi- definite derivative along of the Lyapunov function is zero [M1]. Recently, sev- eral generalizations of the classical Matrosov theorem

  18. Shear band in sand with spatially varying density Ronaldo I. Borja a,n

    E-Print Network [OSTI]

    Borja, Ronaldo I.

    Shear band in sand with spatially varying density Ronaldo I. Borja a,n , Xiaoyu Song a , Amy L Keywords: Bifurcation Digital Image Correlation Heterogeneous sand Shear band Strain localization a b s t r for the selection of the persistent shear band in a symmetrically loaded localizing sand body. We combine

  19. ForPeerReview Time-varying autoregressive conditional duration model

    E-Print Network [OSTI]

    Morettin, Pedro A.

    -stationary processes without preliminary data transformations. The time-varying ACD model estimation was done Introduction As computation power and data storage capacity grows, it becomes possible to gather and analyze, in other words, longer times between transactions indicate less activity of the market. The behavior

  20. Tuning the plasmon energy of Palladium-Hydrogen systems by varying the Hydrogen concentration

    E-Print Network [OSTI]

    Muiño, Ricardo Díez

    to their importance in many applications such as hydrogen storage [16, 17, 18, 19, 20, 21]. The novel scheme [8Tuning the plasmon energy of Palladium-Hydrogen systems by varying the Hydrogen concentration V M of bulk PdHx. Hydrogen concentrations between x = 0 and x = 1 are considered. The calculated spectra

  1. Optimal Trained Space-Time Modulation over a Rician Time-Varying Channel

    E-Print Network [OSTI]

    Swindlehurst, A. Lee

    Optimal Trained Space-Time Modulation over a Rician Time-Varying Channel Christian B. Peel and A investigation of modulation techniques that can handle temporally selec- tive fading. Though trained modulation for trained modulation, for example, which assume that the channel is known by the receiver. In the case

  2. Reward value of food pictures / 1 Pictures of Food Have Reward Value that Varies

    E-Print Network [OSTI]

    Chabris, Christopher F.

    Reward value of food pictures / 1 Pictures of Food Have Reward Value that Varies According RUNNING HEAD: Reward value of food pictures #12;Reward value of food pictures / 2 Abstract A stimulus pictures of food can be rewards for human subjects, with reward value operationalized as the physical

  3. ORIGINAL PAPER Sex ratio varies with egg investment in the red-necked

    E-Print Network [OSTI]

    ORIGINAL PAPER Sex ratio varies with egg investment in the red-necked phalarope (Phalaropus lobatus Abstract Fisher's sex ratio theory predicts that on average parents should allocate resources equally of the sex with greater variation in fitness. We tested theoretical predictions in the red-necked phalarope

  4. One-Way Wave Propagation Through Smoothly Varying Media Controlling the Energy Production at Home

    E-Print Network [OSTI]

    Al Hanbali, Ahmad

    One-Way Wave Propagation Through Smoothly Varying Media Controlling the Energy Production at Home, Citadel T100 As part of the application called migration or reflection seismic imaging, we model wave propagation through the earth, governed by the acoustic wave equation. Downward continuation is a technique

  5. Control-Oriented Linear Parameter-Varying Modelling of a Turbocharged Diesel Engine

    E-Print Network [OSTI]

    Cambridge, University of

    Control-Oriented Linear Parameter-Varying Modelling of a Turbocharged Diesel Engine Merten Jung-- In this paper, a third order nonlinear model of the airpath of a turbocharged diesel engine is derived, which engines are typically equipped with variable geometry turbochargers (VGT) and exhaust gas recirculation

  6. Library hours vary by semester; Check lib.usf.edu After midnight, USF ID required

    E-Print Network [OSTI]

    Meyers, Steven D.

    Library hours vary by semester; Check lib.usf.edu After midnight, USF ID required lib.usf.edu (813? To learn how to: Integrate the library into Canvas, Invite a librarian to join your course's Canvas site, or Request a tailored research guide or library research assignment, Contact: Susan Silver | ssilver

  7. Learning Curve: Analysis of an Agent Pricing Strategy Under Varying Conditions

    E-Print Network [OSTI]

    in employing these real-time agents is understanding the costs and benefits to different agent pricingLearning Curve: Analysis of an Agent Pricing Strategy Under Varying Conditions Joan Morris, Pattie@cs.brown.edu Abstract - By employing dynamic pricing, the act of changing prices over time within a marketplace, sellers

  8. Modified Hubble law, the time-varying Hubble parameter and the problem of dark energy

    E-Print Network [OSTI]

    Jian-Miin Liu

    2005-11-14

    In the framework of the solvable model of cosmology constructed in the Earth-related coordinate system, we derive the modified Hubble law. This law carries the slowly time-varying Hubble parameter. The modified Hubble law eliminates the need for dark energy.

  9. Spatio-temporal precipitation modeling based on time-varying regressions Oleg Makhnin

    E-Print Network [OSTI]

    Borchers, Brian

    Spatio-temporal precipitation modeling based on time-varying regressions Oleg Makhnin Department on monthly precipitation data from gauge measurements. The model accounts for orographic effects in northern New Mexico. We assess spatio-temporal variability and also trace the dependence of precipitation

  10. Reduction of Cosmological Data for the Detection of Time-varying Dark Energy Density

    E-Print Network [OSTI]

    Jason Dick; Lloyd Knox; Mike Chu

    2006-07-10

    We present a method for reducing cosmological data to constraints on the amplitudes of modes of the dark energy density as a function of redshift. The modes are chosen so that (1) one of them has constant density and (2) the others are non-zero only if there is time-variation in the dark energy density and (3) the amplitude errors for the time-varying modes are uncorrelated with each other. We apply our method to various combinations of three-year WMAP data, baryon acoustic oscillation data, the 'Gold' supernova data set, and the Supernova Legacy Survey data set. We find no significant evidence for a time-varying dark energy density or for non-zero mean curvature. Although by some measure the limits on four of the time-varying mode amplitudes are quite tight, they are consistent with the expectation that the dark energy density does not vary on timescales shorter than a Hubble time. Since we do not expect detectable time variation in these modes, our results should be viewed as a systematic error test which the data have passed. We discuss a procedure to identify modes with maximal signal-to-noise ratio.

  11. Two-dimensional electron gas in a linearly varying magnetic field: Quantization of the electron and current density

    E-Print Network [OSTI]

    MacKinnon, Angus

    Two-dimensional electron gas in a linearly varying magnetic field: Quantization of the electron of electron and current densities. We investigate the case where the magnetic field varies linearly properties of a noninteracting electron gas in a linearly varying magnetic field, we consider the following

  12. Compiled 11/ 14/ 2011 by OPBA. These assumptions are for modeling purposes only. They are subject to change. Page 1 of 2

    E-Print Network [OSTI]

    Vonessen, Nikolaus

    .1 Electricity 2% 2% 231.7 3.7 Fuel Oil 9% 8% 240.8 3.9 Natural Gas -25% 0% 253.1 5.1 Lab Gas 0% 0% 260.3 2.8 Water 3% 3% 273.2 5.0 Sewer 6% 5% 279.3 2.2 Garbage 4% 4% 281.8 0.9 *FY13 based on projections dated 6.03% 18.46% 3.33% 5.54% Higher Education Price Index (HEPI)* Utility Assumptions Fiscal Year 2002 3,679 3

  13. Untappable key distribution system: a one-time-pad booster

    E-Print Network [OSTI]

    Geraldo A. Barbosa; Jeroen van de Graaf

    2015-07-08

    One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. This paper presents a solution for this problem providing a fast and unlimited renewal of secure keys: An untappable key distribution system is presented and detailed. This fast key distribution system utilizes two layers of confidentially protection: 1) Physical noise intrinsic to the optical channel that turn the coded signals into stealth signals and 2) Privacy amplification using a bit pool of refreshed entropy run after run, to eliminate any residual information. The resulting level of security is rigorously calculated and demonstrates that the level of information an eavesdropper could obtain is completely negligible. The random bit sequences, fast and securely distributed, can be used to encrypt text, data or voice.

  14. Continuous Variable Quantum Key Distribution with a Noisy Laser

    E-Print Network [OSTI]

    Christian S. Jacobsen; Tobias Gehring; Ulrik L. Andersen

    2015-07-06

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances large amounts of preparation noise can be tolerated in contrast to reverse reconciliation where the key rate quickly drops to zero. Our experiment thereby demonstrates that quantum key distribution with non-shot-noise limited laser diodes might be feasible.

  15. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  16. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  17. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  18. Robust Shot Noise Measurement for Continuous Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Sébastien Kunz-Jacques; Paul Jouguet

    2015-01-17

    We study a practical method to measure the shot noise in real time in Continuous Variable Quantum Key Distribution (CVQKD) systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e. noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  19. Feasibility of underwater free space quantum key distribution

    E-Print Network [OSTI]

    Peng Shi; Shi-Cheng Zhao; Wen-Dong Li; Yong-Jian Gu

    2014-04-04

    We investigate the optical absorption and scattering properties of underwater media pertinent to our underwater free space quantum key distribution (QKD) channel model. With the vector radiative transfer theory and Monte Carlo method, we obtain the attenuation of photons, the fidelity of the scattered photons, the quantum bit error rate and the sifted key generation rate of underwater quantum communication. It can be observed from our simulations that the most secure single photon underwater free space QKD is feasible in the clearest ocean water.

  20. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKey

  1. Control over multiscale systems with constraints. 3. Geometrodynamics of the evolution of systems with varying constraints

    E-Print Network [OSTI]

    S. Adamenko; V. Bolotov; V. Novikov

    2013-07-17

    With the use of the general variational principle of self-organization of systems with varying constraints, namely the principle of dynamical harmonization of systems presented in the first work of the cycle, we advance an approach to the control over the evolution of systems of many particles. The geometric nature of this principle is analyzed. On the basis of the de Broglie--Bohm representation of the Schr\\"odinger equation, we establish a connection of the nonlocality and the coherence of the systems of many particles with mass entropic forces. The defining role of a coherent acceleration and a space-time curvature in the control over the synthesis of new structures in systems with varying constraints is demonstrated. The basic criteria for electromagnetic fields to initiate the processes of self-organizing synthesis and for the quantum properties of a nonlocality on macroscopic scales, which are necessary for the self-organizing synthesis, are formulated.

  2. Statistics of random quasi 1D Hamiltonian with slowly varying parameters. Painlevé again.

    E-Print Network [OSTI]

    P. G. Silvestrov

    1995-03-15

    The statistics of random band--matrices with width and strength of the band slowly varying along the diagonal is considered. The Dyson equation for the averaged Green function close to the edge of spectrum is reduced to the Painlev\\'{e} I equation. The analytical properties of the Green function allow to fix the solution of this equation. The former appears to be the same as that arose within the random--matrix regularization of 2d-gravity.

  3. Quantization of systems with temporally varying discretization. I. Evolving Hilbert spaces

    SciTech Connect (OSTI)

    Höhn, Philipp A.

    2014-08-15

    A temporally varying discretization often features in discrete gravitational systems and appears in lattice field theory models subject to a coarse graining or refining dynamics. To better understand such discretization changing dynamics in the quantum theory, an according formalism for constrained variational discrete systems is constructed. While this paper focuses on global evolution moves and, for simplicity, restricts to flat configuration spaces R{sup N}, a Paper II [P. A. Höhn, “Quantization of systems with temporally varying discretization. II. Local evolution moves,” J. Math. Phys., e-print http://arxiv.org/abs/arXiv:1401.7731 [gr-qc].] discusses local evolution moves. In order to link the covariant and canonical picture, the dynamics of the quantum states is generated by propagators which satisfy the canonical constraints and are constructed using the action and group averaging projectors. This projector formalism offers a systematic method for tracing and regularizing divergences in the resulting state sums. Non-trivial coarse graining evolution moves lead to non-unitary, and thus irreversible, projections of physical Hilbert spaces and Dirac observables such that these concepts become evolution move dependent on temporally varying discretizations. The formalism is illustrated in a toy model mimicking a “creation from nothing.” Subtleties arising when applying such a formalism to quantum gravity models are discussed.

  4. Morphology of rain water channelization in systematically varied model sandy soils

    E-Print Network [OSTI]

    Y. Wei; C. M. Cejas; R. Barrois; R. Dreyfus; D. J. Durian

    2014-03-13

    We visualize the formation of fingered flow in dry model sandy soils under different raining conditions using a quasi-2d experimental set-up, and systematically determine the impact of soil grain diameter and surface wetting property on water channelization phenomenon. The model sandy soils we use are random closely-packed glass beads with varied diameters and surface treatments. For hydrophilic sandy soils, our experiments show that rain water infiltrates into a shallow top layer of soil and creates a horizontal water wetting front that grows downward homogeneously until instabilities occur to form fingered flows. For hydrophobic sandy soils, in contrast, we observe that rain water ponds on the top of soil surface until the hydraulic pressure is strong enough to overcome the capillary repellency of soil and create narrow water channels that penetrate the soil packing. Varying the raindrop impinging speed has little influence on water channel formation. However, varying the rain rate causes significant changes in water infiltration depth, water channel width, and water channel separation. At a fixed raining condition, we combine the effects of grain diameter and surface hydrophobicity into a single parameter and determine its influence on water infiltration depth, water channel width, and water channel separation. We also demonstrate the efficiency of several soil water improvement methods that relate to rain water channelization phenomenon, including pre-wetting sandy soils at different level before rainfall, modifying soil surface flatness, and applying superabsorbent hydrogel particles as soil modifiers.

  5. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  6. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  7. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  8. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  9. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  10. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  11. Preparing Turkey Safely Turkey provides protein along with other key

    E-Print Network [OSTI]

    Preparing Turkey Safely Nutrition Turkey provides protein along with other key nutrients. A serving is 3 ounces cooked poultry (about the size of a deck of cards). One serving of roasted, skinless turkey protein; iron--8% daily value Right Size Turkey Use this chart as a helpful guide: Whole bird ­ 1 pound

  12. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  13. GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald

    E-Print Network [OSTI]

    Ma, Lena

    GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald Contact: Soil and Water information systems (GIS), geostatistical and statistical methods, space-time landscape modeling, remote laboratory. Available software include: MS Office Suite; MS SQL database; ArcGIS Suite (ESRI) including

  14. November 2012 Key Performance Indicator (KPI): Carbon Management

    E-Print Network [OSTI]

    Evans, Paul

    November 2012 Key Performance Indicator (KPI): Carbon Management NTU report our carbon footprint provided. The carbon emissions are calculated using Carbon Trust conversion factors, as used in NTU's EMS.64 2011/2012 18,130 4.20 The recorded changes in emissions are a result of carbon management projects

  15. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  16. The Seven Keys to Success in Energy Management and Conservation 

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  17. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE­HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN­order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  18. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  19. Appendix 30 Fire Effects on Key Ecological Processes in Forested

    E-Print Network [OSTI]

    Appendix 30 Fire Effects on Key Ecological Processes in Forested Ecosystems The following paragraphs on fire effects on forest succession are from Stickney (1982) Forest Succession ...the severity of the pre-disturbance forest herb species also demonstrated the ability to survive fire, particularly those

  20. Outline Overview Design Principles Key Points Design Principles

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 12 #12-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least Common Mechanism Psychological Acceptability 3 Key Points Ahmad Almulhem - Network Security Engineering - 2008 2 / 12 #12;Outline

  1. Annual Report 2004 1 Key events during 2004

    E-Print Network [OSTI]

    Svenningsson, Josef

    Johansson studying the separation of carbon dioxide in a reactor system for two-stage combustion. #12;1 Key for innovation systems and entrepreneurship A year of anniversaries ­ the University, the Foundation, Chalmers are among those hardest struck,but many holidaying Swedes,especially in Thailand,fall victim to the tsunami

  2. MOLECULAR ENTOMOLOGY Molecular Identification Key for Pest Species of Scirtothrips

    E-Print Network [OSTI]

    Hoddle, Mark S.

    primers and determining the size of the products by using standard agarose gel electrophoresis, followed, Neohydatothrips, molecular identiÞcation key, exotic pests, nondestruc- tive DNA extraction The genus Scirtothrips, several species of Scirtothrips have (or have the potential to) spread from their natural habitats

  3. Introduction Adhesion complexes play key roles in many events, including

    E-Print Network [OSTI]

    Hardin, Jeff

    Introduction Adhesion complexes play key roles in many events, including cell migration cell adhesion are remarkably similar in Caenorhabditis elegans, Drosophila and humans (Hynes and Zhao to reveal much about the basic, conserved molecular mechanisms that mediate and regulate cell adhesion

  4. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  5. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  6. news and views A key issue for hydrogen storage materi-

    E-Print Network [OSTI]

    Palumbi, Stephen

    news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

  7. Key Title Marine Ecology www.wiley.com

    E-Print Network [OSTI]

    Wall, Diana

    Key Title Marine Ecology www.wiley.com Antarctic Ecosystems: An Extreme Environment in a Changing their genomes. Chapters address both Antarctic terrestrial and marine ecosystems, and the scientific and evolution Part II: Marine habitats and regions Chapter 4. The impact of regional climate change

  8. Key Facts About Hurricane Readiness Preparing for a Hurricane

    E-Print Network [OSTI]

    HURRICANES Key Facts About Hurricane Readiness Preparing for a Hurricane If you are under a hurricane watch or warning, here are some basic steps to take to prepare for the storm: · Learn about your. · Identify potential home hazards and know how to secure or protect them before the hurricane strikes

  9. Notes on the CRTDH Group Key Agreement Protocol Spyros Magliveras and Wandi Wei

    E-Print Network [OSTI]

    Magliveras, Spyros

    , the distributed schemes help in the uniform distribution of the work-load for key management and eliminate: xkzou@cs.iupui.edu Abstract Group key management (GKM) is one of the primary is- sues for secure group Key Management (GKM), Contributory Group Key Agreement, Chinese Remainder Theorem, Diffie-Hellman Key

  10. Preliminary Assumptions for Wind Technologies

    E-Print Network [OSTI]

    and incentives for renewable resources Federal Production Tax Credit (PTC) 2.3 cents/kWh over first 10 years of operation Investment Tax Credit (ITC) alternative 30% towards developer's income tax for qualifying solar, fuel cell and small wind (geothermal, CHP BETC ­ just Oregon (now expired) 5 #12

  11. Section 25: Future State Assumptions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r e D m .8)&JD(N,8)Future

  12. Assumptions and Criteria for Performing a Feasability Study of the Conversion of the High Flux Isotope Reactor Core to Use Low-Enriched Uranium Fuel

    SciTech Connect (OSTI)

    Primm, R.T., III; Ellis, R.J.; Gehin, J.C.; Moses, D.L.; Binder, J.L.; Xoubi, N. (U. of Cincinnati)

    2006-02-01

    A computational study will be initiated during fiscal year 2006 to examine the feasibility of converting the High Flux Isotope Reactor from highly enriched uranium fuel to low-enriched uranium. The study will be limited to steady-state, nominal operation, reactor physics and thermal-hydraulic analyses of a uranium-molybdenum alloy that would be substituted for the current fuel powder--U{sub 3}O{sub 8} mixed with aluminum. The purposes of this document are to (1) define the scope of studies to be conducted, (2) define the methodologies to be used to conduct the studies, (3) define the assumptions that serve as input to the methodologies, (4) provide an efficient means for communication with the Department of Energy and American research reactor operators, and (5) expedite review and commentary by those parties.

  13. Distribution and abundance of endangered Florida Key deer on outer islands 

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25

    -based survey data. All outer islands exhibited estimated abundances considerably below carrying capacities, with larger populations occurring closer to Big Pine Key. Results indicated that other islands and complexes such as Ramrod Key, Water Key...

  14. Per-plant eco-physiological responses of maize to varied nitrogen availability at low and high plant densities

    E-Print Network [OSTI]

    Boomsma, Christopher R; Vyn, Tony J

    2009-01-01

    and low nitrogen availability. Agron. J. 2009; forthcoming.the impacts of nitrogen (N) availability on intra-specificgenotypes to varied N availability at both low and high

  15. The Effect of Varying Degrees of Difficulty of Retrieval Practice on Long Term Memory Retention 

    E-Print Network [OSTI]

    Crommett, Alexandra

    2013-02-12

    . The constant context condition showed the 20 faces, in random order, over the same background image they were paired with in the initial encoding for each of 5 retrieval practices. For example, if a face with the name ‘Andrew’ was first shown superimposed..., the varied context condition, showed the 20 faces, in random order, over different background images from the encoding background image. The backgrounds were different for each retrieval practice (of 5 RPs), for each face. For example, if Andrew’s name...

  16. Fermion Pair Production From an Electric Field Varying in Two Dimensions

    E-Print Network [OSTI]

    J. E. Seger; A. B. Balantekin

    1995-06-26

    The Hamiltonian describing fermion pair production from an arbitrarily time-varying electric field in two dimensions is studied using a group-theoretic approach. We show that this Hamiltonian can be encompassed by two, commuting SU(2) algebras, and that the two-dimensional problem can therefore be reduced to two one-dimensional problems. We compare the group structure for the two-dimensional problem with that previously derived for the one-dimensional problem, and verify that the Schwinger result is obtained under the appropriate conditions.

  17. CRC program for quantifying performance of knock-sensor-equipped vehicles with varying octane level

    SciTech Connect (OSTI)

    Not Available

    1990-08-01

    A pilot study was conducted under the auspices of the Coordinating Research Council, Inc. (CRC) to assess the potential effects of gasoline octane quality on acceleration performance, fuel economy and driveability in vehicles equipped with electronic spark control systems (knock sensors). Fourteen vehicles were tested by five participating laboratories on CRC unleaded reference fuels of varying octane quality (78 to 104 RON). The test vehicles included nine naturally-aspirated and five turbocharged models. The results showed that acceleration performance was the parameter most sensitive to octane quality changes, particularly in the turbocharged models.

  18. Simple rate-adaptive LDPC coding for quantum key distribution

    E-Print Network [OSTI]

    Mo Li; Chun-Mei Zhang; Zhen-Qiang Yin; Wei Chen; Chuan Wang; Zheng-Fu Han

    2015-05-24

    Although quantum key distribution (QKD) comes from the development of quantum theory, the implementation of a practical QKD system does involve a lot of classical process, such as key reconciliation and privacy amplification, which is called post-processing. Post-processing has been a crucial element to high speed QKD systems, even the bottleneck of it because of its relatively high time consumption. Low density parity check (LDPC) is now becoming a promising approach of overcoming the bottleneck due to its good performance in processing throughput. In this article we propose and simulate an easily implemented but efficiently rate-adaptive LDPC coding approach of reconciliation, different from the previously proposed puncturing- and shortening-based approach. We also give a measure for choosing the optimal LDPC parameter for our rate-adaptive approach according to error rates.

  19. No-signaling Quantum Key Distribution: Solution by Linear Programming

    E-Print Network [OSTI]

    Won-Young Hwang; Joonwoo Bae; Nathan Killoran

    2013-01-15

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csisz\\'ar-K\\"orner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  20. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  1. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  2. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  3. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIALU.S. DepartmentJeanKey Meeting Takeaways from 2014 Meeting

  4. Key Activities in Energy Efficiency | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore: ENERGYKevinKey

  5. Key Concepts in Project Development and Financing in Alaska

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: Project

  6. Vehicle Technologies Office: Key Activities in Vehicles | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-ScaleTechnology|Energy Key

  7. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  8. Mapping and simulating systematics due to spatially-varying observing conditions in DES Science Verification data

    E-Print Network [OSTI]

    Leistedt, B; Elsner, F; Benoit-Lévy, A; Amara, A; Bauer, A H; Becker, M R; Bonnett, C; Bruderer, C; Busha, M T; Kind, M Carrasco; Chang, C; Crocce, M; da Costa, L N; Gaztanaga, E; Huff, E M; Lahav, O; Palmese, A; Percival, W J; Refregier, A; Ross, A J; Rozo, E; Rykoff, E S; Sánchez, C; Sadeh, I; Sevilla-Noarbe, I; Sobreira, F; Suchyta, E; Swanson, M E C; Wechsler, R H; Abdalla, F B; Allam, S; Banerji, M; Bernstein, G M; Bernstein, R A; Bertin, E; Bridle, S L; Brooks, D; Buckley-Geer, E; Burke, D L; Capozzi, D; Rosell, A Carnero; Carretero, J; Cunha, C E; D'Andrea, C B; DePoy, D L; Desai, S; Diehl, H T; Doel, P; Eifler, T F; Evrard, A E; Neto, A Fausti; Flaugher, B; Fosalba, P; Frieman, J; Gerdes, D W; Gruen, D; Gruendl, R A; Gutierrez, G; Honscheid, K; James, D J; Jarvis, M; Kent, S; Kuehn, K; Kuropatkin, N; Li, T S; Lima, M; Maia, M A G; March, M; Marshall, J L; Martini, P; Melchior, P; Miller, C J; Miquel, R; Nichol, R C; Nord, B; Ogando, R; Plazas, A A; Reil, K; Romer, A K; Roodman, A; Sanchez, E; Santiago, B; Scarpine, V; Schubnell, M; Smith, R C; Soares-Santos, M; Tarle, G; Thaler, J; Thomas, D; Vikram, V; Walker, A R; Wester, W; Zhang, Y; Zuntz, J

    2015-01-01

    Spatially-varying depth and characteristics of observing conditions, such as seeing, airmass, or sky background, are major sources of systematic uncertainties in modern galaxy survey analyses, in particular in deep multi-epoch surveys. We present a framework to extract and project these sources of systematics onto the sky, and apply it to the Dark Energy Survey (DES) to map the observing conditions of the Science Verification (SV) data. The resulting distributions and maps of sources of systematics are used in several analyses of DES SV to perform detailed null tests with the data, and also to incorporate systematics in survey simulations. We illustrate the complementarity of these two approaches by comparing the SV data with the BCC-UFig, a synthetic sky catalogue generated by forward-modelling of the DES SV images. We analyse the BCC-UFig simulation to construct galaxy samples mimicking those used in SV galaxy clustering studies. We show that the spatially-varying survey depth imprinted in the observed gala...

  9. Mass varying neutrinos, quintessence, and the accelerating expansion of the Universe

    SciTech Connect (OSTI)

    Chitov, Gennady Y.; August, Tyler [Department of Physics, Laurentian University, Ramsey Lake Road, Sudbury, ON, P3E 2C6 (Canada); Natarajan, Aravind [McWilliams Center for Cosmology and Department of Physics, Carnegie Mellon University, 5000 Forbes Ave, Pittsburgh, Pennsylvania 15213 (United States); Kahniashvili, Tina [McWilliams Center for Cosmology and Department of Physics, Carnegie Mellon University, 5000 Forbes Ave, Pittsburgh, Pennsylvania 15213 (United States); Department of Physics, Laurentian University, Ramsey Lake Road, Sudbury, ON, P3E 2C6 (Canada); National Abastumani Astrophysical Observatory, Ilia Chavchavadze State University, 2A Kazbegi Ave, Tbilisi, GE-0160 (Georgia)

    2011-02-15

    We analyze the mass varying neutrino scenario. We consider a minimal model of massless Dirac fermions coupled to a scalar field, mainly in the framework of finite-temperature quantum field theory. We demonstrate that the mass equation we find has nontrivial solutions only for special classes of potentials, and only within certain temperature intervals. We give most of our results for the Ratra-Peebles dark energy (DE) potential. The thermal (temporal) evolution of the model is analyzed. Following the time arrow, the stable, metastable, and unstable phases are predicted. The model predicts that the present Universe is below its critical temperature and accelerates. At the critical point, the Universe undergoes a first-order phase transition from the (meta)stable oscillatory regime to the unstable rolling regime of the DE field. This conclusion agrees with the original idea of quintessence as a force making the Universe roll towards its true vacuum with a zero {Lambda} term. The present mass varying neutrino scenario is free from the coincidence problem, since both the DE density and the neutrino mass are determined by the scale M of the potential. Choosing M{approx}10{sup -3} eV to match the present DE density, we can obtain the present neutrino mass in the range m{approx}10{sup -2}-1 eV and consistent estimates for other parameters of the Universe.

  10. Characterization of Cu(In,Ga)Se2 (CIGS) films with varying gallium ratios

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Claypoole, Jesse; Peace, Bernadette; Sun, Neville; Dwyer, Dan; Eisaman, Matthew D.; Haldar, Pradeep; Efstathiadis, Harry

    2015-09-05

    Cu(In1-x,Gax)Se2 (CIGS) absorber layers were deposited on molybdenum (Mo) coated soda-lime glass substrates with varying Ga content (described as Ga/(In+Ga) ratios) with respect to depth. As the responsible mechanisms for the limitation of the performance of the CIGS solar cells with high Ga contents are not well understood, the goal of this work was to investigate different properties of CIGS absorber films with Ga/(In+Ga) ratios varied between 0.29 and 0.41 (as determined by X-ray florescence spectroscopy (XRF)) in order to better understand the role that the Ga content has on film quality. The Ga grading in the CIGS layer hasmore »the effect causing a higher bandgap toward the surface and Mo contact while the band gap in the middle of the CIGS layer is lower. Also, a wider and larger Ga/(In+Ga) grading dip located deeper in the CIGS absorber layers tend to produce larger grains in the regions of the films that have lower Ga/(In+Ga) ratios. It was found that surface roughness decreases from 51.2 nm to 41.0 nm with increasing Ga/(In+Ga) ratios. However, the surface roughness generally decreases if the Ga grading occurs deeper in the absorber layer.« less

  11. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  12. Robust and fault-tolerant linear parameter-varying control of wind turbines Christoffer Sloth a,,1

    E-Print Network [OSTI]

    Hansen, René Rydhof

    Robust and fault-tolerant linear parameter-varying control of wind turbines Christoffer Sloth a,,1 Keywords: Wind turbine control Linear parameter-varying (LPV) control Fault-tolerant control Robust control a b s t r a c t High performance and reliability are required for wind turbines to be competitive

  13. DATA NORMALIZATION : A KEY FOR STRUCTURAL HEALTH MONITORING

    SciTech Connect (OSTI)

    Farrar, C. R. (Charles R.); Sohn, H. (Hoon); Worden, K.

    2001-01-01

    Structural health monitoring (SHM) is the implementation of a damage detection strategy for aerospace, civil and mechanical engineering infrastructure. Typical damage experienced by this infrastructure might be the development of fatigue cracks, degradation of structural connections, or bearing wear in rotating machinery. For SHM strategies that rely on vibration response measurements, the ability to normalize the measured data with respect to varying operational and environmental conditions is essential if one is to avoid false-positive indications of damage. Examples of common normalization procedure include normalizing the response measurements by the measured inputs as is commonly done when extracting modal parameters. When environmental cycles influence the measured data, a temporal normalization scheme may be employed. This paper will summarize various strategies for performing this data normalization task. These strategies fall into two general classes: (1) Those employed when measures of the varying environmental and operational parameters are available; (2) Those employed when such measures are not available. Whenever data normalization is performed, one runs the risk that the damage sensitive features to be extracted from the data will be obscured by the data normalization procedure. This paper will summarize several normalization procedures that have been employed by the authors and issues that have arose when trying to implement them on experimental and numerical data.

  14. Redshifting of cosmological black bodies in BSBM varying-alpha theories

    E-Print Network [OSTI]

    John D. Barrow; Joao Magueijo

    2014-11-03

    We analyse the behaviour of black-body radiation in theories of electromagnetism which allow the electron charge and the fine structure constant to vary in space and time. We show that such theories can be expressed as relativistic generalizations of a conventional dielectric. By making the appropriate definition of the vector potential and associated gauge transformations, we can identify the equivalent of the electric and displacement fields, $\\mathbf{E}$ and $\\mathbf{D}$, as well as the magnetic $ \\mathbf{B}$ and $\\mathbf{H}$ fields. We study the impact of such dielectrics on the propagation of light in the so-called BSBM theory and conclude that no changes are created to the standard cosmological evolution of the temperature and energy-density of black-body radiation.

  15. Quantization of systems with temporally varying discretization. II. Local evolution moves

    SciTech Connect (OSTI)

    Höhn, Philipp A.

    2014-10-15

    Several quantum gravity approaches and field theory on an evolving lattice involve a discretization changing dynamics generated by evolution moves. Local evolution moves in variational discrete systems (1) are a generalization of the Pachner evolution moves of simplicial gravity models, (2) update only a small subset of the dynamical data, (3) change the number of kinematical and physical degrees of freedom, and (4) generate a dynamical (or canonical) coarse graining or refining of the underlying discretization. To systematically explore such local moves and their implications in the quantum theory, this article suitably expands the quantum formalism for global evolution moves, constructed in Paper I [P. A. Höhn, “Quantization of systems with temporally varying discretization. I. Evolving Hilbert spaces,” J. Math. Phys. 55, 083508 (2014); e-print http://arxiv.org/abs/arXiv:1401.6062 [gr-qc

  16. Linear Parameter Varying Model Identification for Control of Rotorcraft-based UAV

    E-Print Network [OSTI]

    Budiyono, Agus

    2008-01-01

    A rotorcraft-based unmanned aerial vehicle exhibits more complex properties compared to its full-size counterparts due to its increased sensitivity to control inputs and disturbances and higher bandwidth of its dynamics. As an aerial vehicle with vertical take-off and landing capability, the helicopter specifically poses a difficult problem of transition between forward flight and unstable hover and vice versa. The LPV control technique explicitly takes into account the change in performance due to the real-time parameter variations. The technique therefore theoretically guarantees the performance and robustness over the entire operating envelope. In this study, we investigate a new approach implementing model identification for use in the LPV control framework. The identification scheme employs recursive least square technique implemented on the LPV system represented by dynamics of helicopter during a transition. The airspeed as the scheduling of parameter trajectory is not assumed to vary slowly. The exclu...

  17. An asymptotic formula for polynomials orthonormal with respect to a varying weight. II

    SciTech Connect (OSTI)

    Komlov, A V; Suetin, S P

    2014-09-30

    This paper gives a proof of the theorem announced by the authors in the preceding paper with the same title. The theorem states that asymptotically the behaviour of the polynomials which are orthonormal with respect to the varying weight e{sup ?2nQ(x)}p{sub g}(x)/?(?{sub j=1}{sup 2p}(x?e{sub j})) coincides with the asymptotic behaviour of the Nuttall psi-function, which solves a special boundary-value problem on the relevant hyperelliptic Riemann surface of genus g=p?1. Here e{sub 1}

  18. Adaptive Selective Harmonic Minimization Based on ANNs for Cascade Multilevel Inverters With Varying DC Sources

    SciTech Connect (OSTI)

    Filho, Faete [ORNL; Maia, Helder Z [UFMS, Department of Electrical Engineering; Mateus, Tiago Henrique D [ORNL; Ozpineci, Burak [ORNL; Tolbert, Leon M [ORNL; Pinto, Joao Onofre P [ORNL

    2013-01-01

    A new approach for modulation of an 11-level cascade multilevel inverter using selective harmonic elimination is presented in this paper. The dc sources feeding the multilevel inverter are considered to be varying in time, and the switching angles are adapted to the dc source variation. This method uses genetic algorithms to obtain switching angles offline for different dc source values. Then, artificial neural networks are used to determine the switching angles that correspond to the real-time values of the dc sources for each phase. This implies that each one of the dc sources of this topology can have different values at any time, but the output fundamental voltage will stay constant and the harmonic content will still meet the specifications. The modulating switching angles are updated at each cycle of the output fundamental voltage. This paper gives details on the method in addition to simulation and experimental results.

  19. Wet-spinnability and crosslinked fibre properties of two collagen polypeptides with varied molecular weight

    E-Print Network [OSTI]

    Tronci, Giuseppe; Arafat, M Tarik; Yin, Jie; Wood, David J; Russell, Stephen J

    2015-01-01

    The formation of naturally-derived materials with wet stable fibrous architectures is paramount in order to mimic the features of tissues at the molecular and microscopic scale. Here, we investigated the formation of wet-spun fibres based on collagen-derived polypeptides with comparable chemical composition and varied molecular weight. Gelatin and hydrolysed fish collagen (HFC) were selected as widely-available linear amino-acidic chains of high and low molecular weight, respectively, and functionalised in the wet-spun fibre state in order to preserve the material geometry in physiological conditions. Wet-spun fibre diameter and morphology were dramatically affected depending on the polypeptide molecular weight, wet-spinning solvent (i.e. 2,2,2-Trifluoroethanol and dimethyl sulfoxide) and coagulating medium (i.e. acetone and ethanol), resulting in either bulky or porous internal geometry. Dry-state tensile moduli were significantly enhanced in gelatin and HFC samples following covalent crosslinking with activ...

  20. Peristaltic Pumping of Blood Through Small Vessels of Varying Cross-section

    E-Print Network [OSTI]

    J. C. Misra; S. Maiti

    2012-01-30

    The paper is devoted to a study of the peristaltic motion of blood in the micro-circulatory system. The vessel is considered to be of varying cross-section. The progressive peristaltic waves are taken to be of sinusoidal nature. Blood is considered to be a Herschel-Bulkley fluid. Of particular concern here is to investigate the effects of amplitude ratio, mean pressure gradient, yield stress and the power law index on the velocity distribution, streamline pattern and wall shear stress. On the basis of the derived analytical expression, extensive numerical calculations have been made. The study reveals that velocity of blood and wall shear stress are appreciably affected due to the non-uniform geometry of blood vessels. They are also highly sensitive to the magnitude of the amplitude ratio and the value of the fluid index.

  1. Varying properties of in situ heat treatment of a tar sands formation based on assessed viscosities

    DOE Patents [OSTI]

    Karanikas, John Michael; Vinegar, Harold J

    2014-03-04

    A method for treating a tar sands formation includes providing heat to at least part of a hydrocarbon layer in the formation from a plurality of heaters located in the formation. The heat is allowed to transfer from the heaters to at least a portion of the formation. A viscosity of one or more zones of the hydrocarbon layer is assessed. The heating rates in the zones are varied based on the assessed viscosities. The heating rate in a first zone of the formation is greater than the heating rate in a second zone of the formation if the viscosity in the first zone is greater than the viscosity in the second zone. Fluids are produced from the formation through the production wells.

  2. Spatially varying embedded stochastic galerkin methods for steady-state PDEs.

    SciTech Connect (OSTI)

    Cyr, Eric Christopher

    2013-07-01

    Existing discretizations for stochastic PDEs, based on a tensor product between the deterministic basis and the stochastic basis, treat the required resolution of uncertainty as uniform across the physical domain. However, solutions to many PDEs of interest exhibit spatially localized features that may result in uncertainty being severely over or under-resolved by existing discretizations. In this report, we explore the mechanics and accuracy of using a spatially varying stochastic expansion. This is achieved through an adaptive refinement algorithm where simple error estimates are used to independently drive refinement of the stochastic basis at each point in the physical domain. Results are presented comparing the accuracy of the adaptive techinque to the accuracy achieved using uniform refinement.

  3. Higher order corrections of the extended Chaplygin gas cosmology with varying $G$ and $?$

    E-Print Network [OSTI]

    E. O. Kahya; M. Khurshudyan; B. Pourhassan; R. Myrzakulov; A. Pasqua

    2014-12-11

    In this paper, we study two different models of dark energy based on Chaplygin gas equation of state. The first model is the variable modified Chaplygin gas while the second one is the extended Chaplygin gas. Both models are considered in the framework of higher order $f(R)$ modified gravity. We also consider the case of time varying gravitational constant $G$ and $\\Lambda$ for both models. We investigate some cosmological parameters such as the Hubble, the deceleration and the equation of state parameters. Then we showed that the model that we considered, extended Chaplygin gas with time-dependent $G$ and $\\Lambda$, is consistent with the observational data. Finally we conclude with the discussion of cosmological perturbations of our model.

  4. Influence of spatially varying pseudo-magnetic field on a 2D electron gas in graphene

    E-Print Network [OSTI]

    L. G. da Silva Leite; D. Cogollo; C. Filgueiras; Edilberto O. Silva

    2015-01-28

    The effect of a varying pseudo-magnetic field, which falls as $1/x^2$, on a two dimensional electron gas in graphene is investigated. By considering the second order Dirac equation, we show that its correct general solution is that which might present singular wavefunctions since such field induced by elastic deformations diverges as $x\\rightarrow0$. We show that only this consideration yields the known relativistic Landau levels when we remove such elastic field. We have observed that the zero Landau level fails to develop for certain values of it. We then speculate about the consequences of these facts to the quantum Hall effect on graphene. We also analyze the changes in the relativistic cyclotron frequency. We hope our work being probed in these contexts, since graphene has great potential for electronic applications.

  5. Ultrasonic liquid-level detector for varying temperature and pressure environments

    DOE Patents [OSTI]

    Anderson, R.L.; Miller, G.N.

    1981-10-26

    An ultrasonic liquid level detector for use in varying temperature and pressure environments, such as a pressurized water nuclear reactor vessel, is provided. The detector employs ultrasonic extensional and torsional waves launched in a multiplexed alternating sequence into a common sensor. The sensor is a rectangular cross section stainless steel rod which extends into the liquid medium whose level is to be detected. The sensor temperature derived from the extensional wave velocity measurements is used to compensate for the temperature dependence of the torsional wave velocity measurements which are also level dependent. The torsional wave velocity measurements of a multiple reflection sensor then provide a measurement of liquid level over a range of several meters with a small uncertainty over a temperature range of 20 to 250/sup 0/C and pressures up to 15 MPa.

  6. Two part condenser for varying the rate of condensing and related method

    DOE Patents [OSTI]

    Dobos, James G. (North Augusta, SC)

    2007-12-11

    A heat transfer apparatus, such as a condenser, is provided. The apparatus includes a first component with a first heat transfer element that has first component inlet and outlet ports through which a first fluid may pass. A second component is also included and likewise has a second heat transfer element with second component inlet and outlet ports to pass a second fluid. The first component has a body that can receive a third fluid for heat transfer with the first heat transfer element. The first and second components are releasably attachable with one another so that when attached both the first and second heat transfer elements effect heat transfer with the third fluid. Attachment and removal of the first and second components allows for the heat transfer rate of the apparatus to be varied. An associated method is also provided.

  7. Analysis of the Effects of Compositional and Configurational Assumptions on Product Costs for the Thermochemical Conversion of Lignocellulosic Biomass to Mixed Alcohols – FY 2007 Progress Report

    SciTech Connect (OSTI)

    Zhu, Yunhua; Gerber, Mark A.; Jones, Susanne B.; Stevens, Don J.

    2009-02-01

    The purpose of this study was to examine alternative biomass-to-ethanol conversion process assumptions and configuration options to determine their relative effects on overall process economics. A process-flow-sheet computer model was used to determine the heat and material balance for each configuration that was studied. The heat and material balance was then fed to a costing spreadsheet to determine the impact on the ethanol selling price. By examining a number of operational and configuration alternatives and comparing the results to the base flow sheet, alternatives having the greatest impact the performance and cost of the overall system were identified and used to make decisions on research priorities. This report, which was originally published in December 2008, has been revised primarily to correct information presented in Appendix B -- Base Case Flow Sheets and Model Results. The corrections to Appendix B include replacement of several pages in Table B.1 that duplicated previous pages of the table. Other changes were made in Appendix B to correct inconsistencies between stream labels presented in the tables and the stream labels in the figures.

  8. 2014 CATEE: Collaboration is the Key- Public/Private Partnerships 

    E-Print Network [OSTI]

    Lin, L.

    2014-01-01

    stream_source_info ESL-KT-14-11-24.pdf.txt stream_content_type text/plain stream_size 9508 Content-Encoding UTF-8 stream_name ESL-KT-14-11-24.pdf.txt Content-Type text/plain; charset=UTF-8 2014 CATEE Collaboration... is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston Energy Efficiency Programs 2000...

  9. Upconversion based receivers for quantum hacking resistant quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Gregory S. Kanter

    2015-09-21

    We propose a novel upconversion (sum frequency generation) based quantum-optical setup that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  10. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLC Jump

  11. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to the

  12. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theA

  13. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theAA

  14. Florida Keys El Coop Assn, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpAFlex Fuels Energy Jump to:Flora HomeKeys El Coop

  15. SimTable key tool for preparing, responding to wildfire

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effect Photovoltaics -7541 UnlimitedShift EndShutdownSolar PhotovoltaicSimTable key

  16. Sandia Energy - The Brain: Key To a Better Computer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities General overview of theBrain: Key To a

  17. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecoveryplanning Career Planning for theFebruary 26, 2014andKEY

  18. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclear Physics (NP)aboutRio de Janeiro,theIs Key

  19. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5

  20. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey Dates

  1. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey

  2. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenryInhibitingInteractivePGAS andUniversity IonIron is the Key to

  3. Key Publications - Natural Gas Regulation | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKey

  4. Robotics Key to Subsea Exploration | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The Energy Materials CenterRobotics Key to Subsea

  5. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  6. A look at the PGP ecosystem through the key server data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    to be challenging. GnuPG does not provide library access to low level functions that would allow parsing the data-based encryption systems use a network of key servers to share public keys. These key server operate on an add only basis, thus the data gives us access to PGP public keys from over 20 years of PGP usage. Analyzing

  7. Sensitivity of modeled Cretaceous climate to insolation forcing created by varying Earth-Sun orbital relationships

    SciTech Connect (OSTI)

    Glancy, T.J. Jr.

    1992-01-01

    Rhythmic sedimentation patterns observed within the Cretaceous Western Interior Seaway, such as those in the Bridge Creek Limestone Member of the Greenhorn Limestone Formation exposed near Pueblo, Colorado, appear to be a response to episodic climate change. These climatic variations could, in turn, be forced by the periodic insolation change over the North American continent created by Milankovitch-scale Earth-Sun orbital relationships - eccentricity (100 kiloyears), obliquity (41 kiloyears) and precession of the equinox (23 kiloyears). To test the sensitivity of Cretaceous climate to changes in Milankovitch-scale insolation forcing, a set of seasonal simulations using maximum difference insolation forcing conditions was conducted with the National Center for Atmospheric Research's Community Climate Model using 100 MA Cretaceous paleogeography and paleotopography. Analysis showed statistically significant differences in surface temperature, precipitation, surface wind, storm track location, and upwelling occurred over many regions of the Cretaceous Earth, particularly in the summer and winter monsoon system. During Northern Hemisphere winter, differences in the position of storm passage over Cretaceous western North America under maximum difference insolation forcing conditions varies the precipitation received over the southern Western Interior Seaway at the location where the Bridge Creek Limestone Member rhythmic sedimentation was produced. Northern Hemisphere winter simulations removing all sea ice from the model showed little difference in the climatic effects observed over southwestern North America from the case with sea ice present. Additional simulations varying only the obliquity within the model suggest that the observed Bridge Creek Limestone Member rhythmic sedimentation patterns are controlled by climatic change produced by cyclic variation in the precession of the equinox and eccentricity insolation forcing.

  8. Implementing Performance-Based Sustainability Requirements for the Low Carbon Fuel Standard – Key Design Elements and Policy Considerations

    E-Print Network [OSTI]

    Yeh, Sonia; Sumner, Daniel A.; Kaffka, Stephen R.; Ogden, J; Jenkins, Bryan M.

    2009-01-01

    Standard – Key Design Elements and Policy ConsiderationsStandard ? Key Design Elements and Policy Considerations:Standard ? Key Design Elements and Policy Considerations:

  9. A passive transmitter for quantum key distribution with coherent light

    E-Print Network [OSTI]

    Marcos Curty; Marc Jofre; Valerio Pruneri; Morgan W. Mitchell

    2011-08-03

    Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, since no externally driven element is required. Typical passive transmitters involve parametric down-conversion. More recently, it has been shown that phase-randomized coherent pulses also allow passive generation of decoy states and Bennett-Brassard 1984 (BB84) polarization signals, though the combination of both setups in a single passive source is cumbersome. In this paper, we present a complete passive transmitter that prepares decoy-state BB84 signals using coherent light. Our method employs sum-frequency generation together with linear optical components and classical photodetectors. In the asymptotic limit of an infinite long experiment, the resulting secret key rate (per pulse) is comparable to the one delivered by an active decoy-state BB84 setup with an infinite number of decoy settings.

  10. The role of naturally occurring waterholes in determining the distribution of Florida Key Deer 

    E-Print Network [OSTI]

    Kim, Ji Yeon

    2009-05-15

    (Big Pine Key Inn Station, 1953) Data on Big Pine Key and the Volume of Daily Fresh Water Shortage on Big Pine Key (From the Result of 1-Year Base Line Simulation)................................................................................ 26...). I used two precipitation data sets to parameterize dv1, one consisting of daily precipitation (inches) from January 1 to December 31, 1953 from the Big Pine Key Inn weather station and one from January 1 to December 31, 2001 from the Key West...

  11. Target Selection for the LBTI Exozodi Key Science Program

    E-Print Network [OSTI]

    Weinberger, Alycia J; Kennedy, Grant M; Roberge, Aki; Defrère, Denis; Hinz, Philip M; Millan-Gabet, Rafael; Rieke, George; Bailey, Vanessa P; Danchi, William C; Haniff, Chris; Mennesson, Bertrand; Serabyn, Eugene; Skemer, Andrew J; Stapelfeldt, Karl R; Wyatt, Mark C

    2015-01-01

    The Hunt for Observable Signatures of Terrestrial planetary Systems (HOSTS) on the Large Binocular Telescope Interferometer will survey nearby stars for faint emission arising from ~300 K dust (exozodiacal dust), and aims to determine the exozodiacal dust luminosity function. HOSTS results will enable planning for future space telescopes aimed at direct spectroscopy of habitable zone terrestrial planets, as well as greater understanding of the evolution of exozodiacal disks and planetary systems. We lay out here the considerations that lead to the final HOSTS target list. Our target selection strategy maximizes the ability of the survey to constrain the exozodi luminosity function by selecting a combination of stars selected for suitability as targets of future missions and as sensitive exozodi probes. With a survey of approximately 50 stars, we show that HOSTS can enable an understanding of the statistical distribution of warm dust around various types of stars and is robust to the effects of varying levels ...

  12. Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices

    SciTech Connect (OSTI)

    Sharon Kramer; Mirko Previsic; Peter Nelson; Sheri Woo

    2010-06-17

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: ? 4 wave energy generation technologies ? 3 tidal energy generation technologies ? 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal) ? 3 project sizes: pilot, small commercial, and large commercial The possible combinations total 24 wave technology scenarios and 9 tidal technology scenarios. We evaluated 3 of the 33 scenarios in detail: 1. A small commercial OPT Power Buoy project off the Humboldt County, California coast 2. A small commercial Pelamis Wave Power P-2 project off Makapu’u Point, Oahu, Hawaii 3. A pilot MCT SeaGen tidal project, sited in the Tacoma Narrows, Washington This framework document used information available from permitting documents that were written to support actual wave or tidal energy projects, but the results obtained here should not be confused with those of the permitting documents1. The main difference between this framework document and permitting documents of currently proposed pilot projects is that this framework identifies key environmental concerns and describes the next steps in addressing those concerns; permitting documents must identify effects, find or declare thresholds of significance, evaluate the effects against the thresholds, and find mitigation measures that will minimize or avoid the effects so they can be considered less-than-significant. Two methodologies, 1) an environmental effects analysis and 2) Raptools, were developed and tested to identify potential environmental effects associated with wave or tidal energy conversion projects. For the environmental effects analysis, we developed a framework based on standard risk assessment techniques. The framework was applied to the three scenarios listed above. The environmental effects analysis addressed questions such as: ? What is the temporal and spatial exposure of a species at a site? ? What are the specific potential project effects on that species? ? What measures could minimize, mitigate, or eliminate negative effects? ? Are there potential effects of the project, or species’ response to the effect, that are highly uncertain and warrant additional study? The second methodology, Raptools, is a collaborative approach useful for evaluating multiple characteristi

  13. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  14. Relation between three classes of structural models for the effect of a time-varying exposure on survival

    E-Print Network [OSTI]

    Young, Jessica G.

    Standard methods for estimating the effect of a time-varying exposure on survival may be biased in the presence of time-dependent confounders themselves affected by prior exposure. This problem can be overcome by inverse ...

  15. Elastic Incoherent Neutron Scattering, operating by varying instrumental energy resolution, Principles, Simulations and Experiments of the Resolution Elastic Neutron

    E-Print Network [OSTI]

    Doster, Wolfgang

    Elastic Incoherent Neutron Scattering, operating by varying instrumental energy resolution, Principles, Simulations and Experiments of the Resolution Elastic Neutron Scattering (RENS) by Magazu a different name "RENS" (resolution dependent elastic neutron scattering) [1-5]. Our ERS papers, first

  16. Appendices to : Market-based emissions regulation when damages vary across sources: What are the gains from differentiation?

    E-Print Network [OSTI]

    Fowlie, Meredith

    Appendices to : Market-based emissions regulation when damages vary across sources: What. We transform this quadratic abatement function so that costs are expressed as a function of emissions

  17. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  18. Modern hydrocracking is the key to upgrading processes

    SciTech Connect (OSTI)

    Corbett, R.A.

    1989-06-26

    Hydrocracking technology is the key to Canada's heavy oil and bitumen upgrading facilities that have recently started or are due to start up during the next few years. The upgrader at Consumers' Cooperative Refineries Ltd. in Regina Sask.; the capacity addition program (CAP) at Syncrude Canada Ltd.'s Fort McMurray, Alta., plant; Husky Oil Operations Ltd.'s Bi-Provincial upgrader to be built near Lloydminster, Sask.; and the OSLO project to be built near Fort McMurray, all rely on this modern technology for primary upgrading. All of the projects are designed to upgrade heavy oil and bitumen extracted from oil sands to a high-quality synthetic crude oil (SCO) that is a blend of high-quality naphtha and gas oil.

  19. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  20. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  1. Effects of prescribed fire and varying stand basal area on nitrogen mineralization in a loblolly pine forest 

    E-Print Network [OSTI]

    Webb, Bobby Glen

    1991-01-01

    EFFECTS OF PRESCRIBED FIRE AND VARYING STAND BASAL AREA ON NITROGEN MINERALIZATION IN A LOBLOLLY PINE FOREST A Thesis by BOBBY GLEN WEBB Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment... of the requirements for the degree of MASTER OF SCIENCE August 1991 Major Subject: Forestry EFFECTS OF PRESCRIBED FIRE AND VARYING STAND BASAL AREA ON NITROGEN MINERALIZATION IN A LOBLOLLY PINE FOREST A Thesis by BOBBY GLEN WEBB Approved as to style...

  2. Passive decoy state quantum key distribution with practical light sources

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Bing Qi; Tobias Moroder

    2009-11-14

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. While active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty {\\it et al.}, Opt. Lett. {\\bf 34}, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy state setup with an infinite number of decoy settings. In this paper we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photo-detectors. In particular, we consider sources emitting thermal states, phase randomized WCP, and strong coherent light in combination with several types of photo-detectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photo-detectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret ket rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  3. Interpolation Approach to Hamiltonian-varying Quantum Systems and the Adiabatic Theorem

    E-Print Network [OSTI]

    Yu Pan; Zibo Miao; Nina H. Amini; Valery Ugrinovskii; Matthew R. James

    2015-03-11

    Quantum control could be implemented by varying the system Hamiltonian. According to adiabatic theorem, a slowly changing Hamiltonian can approximately keep the system at the ground state during the evolution if the initial state is a ground state. In this paper we consider this process as an interpolation between the initial and final Hamiltonians. We use the mean value of a single operator to measure the distance between the final state and the ideal ground state. This measure could be taken as the error of adiabatic approximation. We prove under certain conditions, this error can be precisely estimated for an arbitrarily given interpolating function. This error estimation could be used as guideline to induce adiabatic evolution. According to our calculation, the adiabatic approximation error is not proportional to the average speed of the variation of the system Hamiltonian and the inverse of the energy gaps in many cases. In particular, we apply this analysis to an example on which the applicability of the adiabatic theorem is questionable.

  4. Wet-spinnability and crosslinked fibre properties of two collagen polypeptides with varied molecular weight

    E-Print Network [OSTI]

    Giuseppe Tronci; Ramya Sri Kanuparti; M. Tarik Arafat; Jie Yin; David J. Wood; Stephen J. Russell

    2015-07-26

    The formation of naturally-derived materials with wet stable fibrous architectures is paramount in order to mimic the features of tissues at the molecular and microscopic scale. Here, we investigated the formation of wet-spun fibres based on collagen-derived polypeptides with comparable chemical composition and varied molecular weight. Gelatin and hydrolysed fish collagen (HFC) were selected as widely-available linear amino-acidic chains of high and low molecular weight, respectively, and functionalised in the wet-spun fibre state in order to preserve the material geometry in physiological conditions. Wet-spun fibre diameter and morphology were dramatically affected depending on the polypeptide molecular weight, wet-spinning solvent (i.e. 2,2,2-Trifluoroethanol and dimethyl sulfoxide) and coagulating medium (i.e. acetone and ethanol), resulting in either bulky or porous internal geometry. Dry-state tensile moduli were significantly enhanced in gelatin and HFC samples following covalent crosslinking with activated 1,3 phenylenediacetic acid (Ph) (E: 726 +/- 43 - 844 +/- 85 MPa), compared to samples crosslinked via intramolecular carbodiimide-mediated condensation reaction (E: 588 +/- 38 MPa). Resulting fibres displayed a dry diameter in the range of 238 +/- 18 - 355 +/- 28 micron and proved to be mechanically-stable (E: 230 kPa) following equilibration with PBS, whilst a nearly-complete degradation was observed after 5-day incubation in physiological conditions.

  5. Generalized Framework and Algorithms for Illustrative Visualization of Time-Varying Data on Unstructured Meshes

    SciTech Connect (OSTI)

    Alexander S. Rattner; Donna Post Guillen; Alark Joshi

    2012-12-01

    Photo- and physically-realistic techniques are often insufficient for visualization of simulation results, especially for 3D and time-varying datasets. Substantial research efforts have been dedicated to the development of non-photorealistic and illustration-inspired visualization techniques for compact and intuitive presentation of such complex datasets. While these efforts have yielded valuable visualization results, a great deal of work has been reproduced in studies as individual research groups often develop purpose-built platforms. Additionally, interoperability between illustrative visualization software is limited due to specialized processing and rendering architectures employed in different studies. In this investigation, a generalized framework for illustrative visualization is proposed, and implemented in marmotViz, a ParaView plugin, enabling its use on variety of computing platforms with various data file formats and mesh geometries. Detailed descriptions of the region-of-interest identification and feature-tracking algorithms incorporated into this tool are provided. Additionally, implementations of multiple illustrative effect algorithms are presented to demonstrate the use and flexibility of this framework. By providing a framework and useful underlying functionality, the marmotViz tool can act as a springboard for future research in the field of illustrative visualization.

  6. Daily Thermal Predictions of the AGR-1 Experiment with Gas Gaps Varying with Time

    SciTech Connect (OSTI)

    Grant Hawkes; James Sterbentz; John Maki; Binh Pham

    2012-06-01

    A new daily as-run thermal analysis was performed at the Idaho National Laboratory on the Advanced Gas Reactor (AGR) test experiment number one at the Advanced Test Reactor (ATR). This thermal analysis incorporates gas gaps changing with time during the irradiation experiment. The purpose of this analysis was to calculate the daily average temperatures of each compact to compare with experimental results. Post irradiation examination (PIE) measurements of the graphite holder and fuel compacts showed the gas gaps varying from the beginning of life. The control temperature gas gap and the fuel compact – graphite holder gas gaps were linearly changed from the original fabrication dimensions, to the end of irradiation measurements. A steady-state thermal analysis was performed for each daily calculation. These new thermal predictions more closely match the experimental data taken during the experiment than previous analyses. Results are presented comparing normalized compact average temperatures to normalized log(R/B) Kr-85m. The R/B term is the measured release rate divided by the predicted birth rate for the isotope Kr-85m. Correlations between these two normalized values are presented.

  7. Migration and growth of giant planets in self-gravitating disks with varied thermodynamics

    E-Print Network [OSTI]

    Laure Fouchet; Lucio Mayer

    2008-06-25

    We report on the results of novel global high-resolution three-dimensional simulations of disk-planet interaction which incorporate simultaneously realistic radiation physics and the self-gravity of the gas, as well as allowing the planet to move. We find that thermodynamics and radiative physics have a remarkable effect on both migration and accretion of Jupiter mass planets. In simulations with radiative transfer adopting flux-limited diffusion, inward migration can be decreased by about 30% relative to the isothermal case, while in adiabatic runs migration nearly shuts off after a few tens of orbits. Migration varies because the relative strength of the inner and outer spiral perturbations is affected by thermodynamics, thus changing the net torque acting on the planet. Mass accretion rates on the planet can be reduced by more than an order of magnitude going from isothermal to radiative transfer and adiabatic simulations. A circumplanetary disk always forms except in adiabatic runs. With radiative transfer the disk is sub-keplerian (Vrot/Vkep ~ 0.7) owing to significant pressure support. We discuss the effect of circumplanetary disk structure on the drift of embedded dust grains and planetesimals and thus on the formation of the rocky satellites of giant planets.

  8. Excitation of solitons by an external resonant wave with a slowly varying phase velocity

    SciTech Connect (OSTI)

    Aranson, I.; Meerson, B. [Hebrew Univ., Jerusalem (Israel). Racah Inst. of Physics; Tajima, Toshiki [Texas Univ., Austin, TX (United States)

    1992-02-01

    A novel mechanism is proposed for the excitation of solitons in nonlinear dispersive media. The mechanism employs an external pumping wave with a varying phase velocity, which provides a continuous resonant excitation of a nonlinear wave in the medium. Two different schemes of a continuous resonant growth (continuous phase-locking) of the induced nonlinear wave are suggested. The first of them requires a definite time dependence of the pumping wave phase velocity and is relatively sensitive to the initial wave phase. The second employs the dynamic autoresonance effect and is insensitive to the exact time dependence of the pumping wave phase velocity. It is demonstrated analytically and numerically, for a particular example of a driven Korteweg-de Vries (KdV) equation with periodic boundary conditions, that as the nonlinear wave grows, it transforms into a soliton, which continues growing and accelerating adiabatically. A fully nonlinear perturbation theory is developed for the driven KdV equation to follow the growing wave into the strongly nonlinear regime and describe the soliton formation.

  9. Heavy ion beam probe operation in time varying equilibria of improved confinement reversed field pinch discharges

    SciTech Connect (OSTI)

    Demers, D. R.; Chen, X.; Schoch, P. M. [Rensselaer Polytechnic Institute, Troy, New York 12180 (United States); Fimognari, P. J. [University of Wisconsin, Madison, Wisconsin 53706 (United States)

    2010-10-15

    Operation of a heavy ion beam probe (HIBP) on a reversed field pinch is unique from other toroidal applications because the magnetic field is more temporal and largely produced by plasma current. Improved confinement, produced through the transient application of a poloidal electric field which leads to a reduction of dynamo activity, exhibits gradual changes in equilibrium plasma quantities. A consequence of this is sweeping of the HIBP trajectories by the dynamic magnetic field, resulting in motion of the sample volume. In addition, the plasma potential evolves with the magnetic equilibrium. Measurement of the potential as a function of time is thus a combination of temporal changes of the equilibrium and motion of the sample volume. A frequent additional complication is a nonideal balance of ion current on the detectors resulting from changes in the beam trajectory (magnetic field) and energy (plasma potential). This necessitates use of data selection criteria. Nevertheless, the HIBP on the Madison Symmetric Torus has acquired measurements as a function of time throughout improved confinement. A technique developed to infer the potential in the improved confinement reversed field pinch from HIBP data in light of the time varying plasma equilibrium will be discussed.

  10. Break-Even Cost for Residential Solar Water Heating in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Cassard, H.; Denholm, P.; Ong, S.

    2011-02-01

    This paper examines the break-even cost for residential rooftop solar water heating (SWH) technology, defined as the point where the cost of the energy saved with a SWH system equals the cost of a conventional heating fuel purchased from the grid (either electricity or natural gas). We examine the break-even cost for the largest 1,000 electric and natural gas utilities serving residential customers in the United States as of 2008. Currently, the break-even cost of SWH in the United States varies by more than a factor of five for both electricity and natural gas, despite a much smaller variation in the amount of energy saved by the systems (a factor of approximately one and a half). The break-even price for natural gas is lower than that for electricity due to a lower fuel cost. We also consider the relationship between SWH price and solar fraction and examine the key drivers behind break-even costs. Overall, the key drivers of the break-even cost of SWH are a combination of fuel price, local incentives, and technical factors including the solar resource location, system size, and hot water draw.

  11. FORMATION OF GIANT PLANETS BY DISK INSTABILITY ON WIDE ORBITS AROUND PROTOSTARS WITH VARIED MASSES

    SciTech Connect (OSTI)

    Boss, Alan P.

    2011-04-10

    Doppler surveys have shown that more massive stars have significantly higher frequencies of giant planets inside {approx}3 AU than lower mass stars, consistent with giant planet formation by core accretion. Direct imaging searches have begun to discover significant numbers of giant planet candidates around stars with masses of {approx}1 M{sub sun} to {approx}2 M{sub sun} at orbital distances of {approx}20 AU to {approx}120 AU. Given the inability of core accretion to form giant planets at such large distances, gravitational instabilities of the gas disk leading to clump formation have been suggested as the more likely formation mechanism. Here, we present five new models of the evolution of disks with inner radii of 20 AU and outer radii of 60 AU, for central protostars with masses of 0.1, 0.5, 1.0, 1.5, and 2.0 M{sub sun}, in order to assess the likelihood of planet formation on wide orbits around stars with varied masses. The disk masses range from 0.028 M{sub sun} to 0.21 M{sub sun}, with initial Toomre Q stability values ranging from 1.1 in the inner disks to {approx}1.6 in the outer disks. These five models show that disk instability is capable of forming clumps on timescales of {approx}10{sup 3} yr that, if they survive for longer times, could form giant planets initially on orbits with semimajor axes of {approx}30 AU to {approx}70 AU and eccentricities of {approx}0 to {approx}0.35, with initial masses of {approx}1 M{sub Jup} to {approx}5 M{sub Jup}, around solar-type stars, with more protoplanets forming as the mass of the protostar (and protoplanetary disk) is increased. In particular, disk instability appears to be a likely formation mechanism for the HR 8799 gas giant planetary system.

  12. Effect of varying gate-drain distance on the RF power performance of pseudomorphic high electron mobility transistors

    E-Print Network [OSTI]

    Wong, Melinda F

    2005-01-01

    AIGaAs/lnGaAs Pseudomorphic High Electron Mobility Transistors (PHEMTs) are widely used in satellite communications, military and commercial radar, cellular telephones, and other RF power applications. One key figure of ...

  13. High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors

    E-Print Network [OSTI]

    Spellmeyer, Neal W.

    We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

  14. Blast furnace key to earth's birth P11 Balancing the body clock P14

    E-Print Network [OSTI]

    Liley, David

    Newage Blast furnace key to earth's birth P11 Balancing the body clock P14 Research readies to the stars Julian criBB 11 blast furnace holds key to earth's birth Julian criBB 12 agency audit raises

  15. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  16. The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks #

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks # Johann Großsch, Security. Keywords Wireless networking, security protocols, cryptography, key establishment, energy Inffeldgasse 16a, A--8010 Graz, Austria ABSTRACT Wireless sensor nodes generally face serious limitations

  17. A World Wide Web key to the grass genera of Texas 

    E-Print Network [OSTI]

    Dawson, John Edward

    2001-01-01

    An illustrated dichotomous key to the grass genera of Texas is presented in hypertext markup language (HTML) format. The key combines scanned images of inflorescences, digitized images of dissected spikelets, text descriptions ...

  18. ASTROPHYSICS Thesaurus of key words used in the annual subject indexes

    E-Print Network [OSTI]

    Xu, Ren-Xin

    ASTRONOMY AND ASTROPHYSICS Thesaurus of key words used in the annual subject indexes (valid from processing 03.20.2 Techniques: interferometric 03.20.3 Techniques: miscellaneous #12;2 Thesaurus of key words

  19. Large trees-key climate influencers-die first in drought

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Large trees-key climate influencers-die first in drought Large trees-key climate influencers-die first in drought A team of researchers studied forests worldwide, ranging from...

  20. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  1. Key issues of ultraviolet radiation of OH at high altitudes

    SciTech Connect (OSTI)

    Zhang, Yuhuai; Wan, Tian; Jiang, Jianzheng; Fan, Jing

    2014-12-09

    Ultraviolet (UV) emissions radiated by hydroxyl (OH) is one of the fundamental elements in the prediction of radiation signature of high-altitude and high-speed vehicle. In this work, the OH A{sup 2}?{sup +}?X{sup 2}? ultraviolet emission band behind the bow shock is computed under the experimental condition of the second bow-shock ultraviolet flight (BSUV-2). Four related key issues are discussed, namely, the source of hydrogen element in the high-altitude atmosphere, the formation mechanism of OH species, efficient computational algorithm of trace species in rarefied flows, and accurate calculation of OH emission spectra. Firstly, by analyzing the typical atmospheric model, the vertical distributions of the number densities of different species containing hydrogen element are given. According to the different dominating species containing hydrogen element, the atmosphere is divided into three zones, and the formation mechanism of OH species is analyzed in the different zones. The direct simulation Monte Carlo (DSMC) method and the Navier-Stokes equations are employed to compute the number densities of the different OH electronically and vibrationally excited states. Different to the previous work, the trace species separation (TSS) algorithm is applied twice in order to accurately calculate the densities of OH species and its excited states. Using a non-equilibrium radiation model, the OH ultraviolet emission spectra and intensity at different altitudes are computed, and good agreement is obtained with the flight measured data.

  2. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  3. Do myoepithelial cells hold the key for breast tumorprogression?

    SciTech Connect (OSTI)

    Polyak, Kornelia; Hu, Min

    2005-11-18

    Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

  4. Time-cost analysis of a quantum key distribution system clocked at 100 MHz

    E-Print Network [OSTI]

    Xiaofan Mo; Itzel Lucio Martinez; Philip Chan; Chris Healey; Steve Hosier; Wolfgang Tittel

    2011-05-18

    We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

  5. System and method for constructing filters for detecting signals whose frequency content varies with time

    DOE Patents [OSTI]

    Qian, Shie (Austin, TX); Dunham, Mark E. (Los Alamos, NM)

    1996-01-01

    A system and method for constructing a bank of filters which detect the presence of signals whose frequency content varies with time. The present invention includes a novel system and method for developing one or more time templates designed to match the received signals of interest and the bank of matched filters use the one or more time templates to detect the received signals. Each matched filter compares the received signal x(t) with a respective, unique time template that has been designed to approximate a form of the signals of interest. The robust time domain template is assumed to be of the order of w(t)=A(t)cos{2.pi..phi.(t)} and the present invention uses the trajectory of a joint time-frequency representation of x(t) as an approximation of the instantaneous frequency function {.phi.'(t). First, numerous data samples of the received signal x(t) are collected. A joint time frequency representation is then applied to represent the signal, preferably using the time frequency distribution series (also known as the Gabor spectrogram). The joint time-frequency transformation represents the analyzed signal energy at time t and frequency .function., P(t,f), which is a three-dimensional plot of time vs. frequency vs. signal energy. Then P(t,f) is reduced to a multivalued function f(t), a two dimensional plot of time vs. frequency, using a thresholding process. Curve fitting steps are then performed on the time/frequency plot, preferably using Levenberg-Marquardt curve fitting techniques, to derive a general instantaneous frequency function .phi.'(t) which best fits the multivalued function f(t), a trajectory of the joint time-frequency domain representation of x(t). Integrating .phi.'(t) along t yields .phi.(t), which is then inserted into the form of the time template equation. A suitable amplitude A(t) is also preferably determined. Once the time template has been determined, one or more filters are developed which each use a version or form of the time template.

  6. System and method for constructing filters for detecting signals whose frequency content varies with time

    DOE Patents [OSTI]

    Qian, S.; Dunham, M.E.

    1996-11-12

    A system and method are disclosed for constructing a bank of filters which detect the presence of signals whose frequency content varies with time. The present invention includes a novel system and method for developing one or more time templates designed to match the received signals of interest and the bank of matched filters use the one or more time templates to detect the received signals. Each matched filter compares the received signal x(t) with a respective, unique time template that has been designed to approximate a form of the signals of interest. The robust time domain template is assumed to be of the order of w(t)=A(t)cos(2{pi}{phi}(t)) and the present invention uses the trajectory of a joint time-frequency representation of x(t) as an approximation of the instantaneous frequency function {phi}{prime}(t). First, numerous data samples of the received signal x(t) are collected. A joint time frequency representation is then applied to represent the signal, preferably using the time frequency distribution series. The joint time-frequency transformation represents the analyzed signal energy at time t and frequency f, P(t,f), which is a three-dimensional plot of time vs. frequency vs. signal energy. Then P(t,f) is reduced to a multivalued function f(t), a two dimensional plot of time vs. frequency, using a thresholding process. Curve fitting steps are then performed on the time/frequency plot, preferably using Levenberg-Marquardt curve fitting techniques, to derive a general instantaneous frequency function {phi}{prime}(t) which best fits the multivalued function f(t). Integrating {phi}{prime}(t) along t yields {phi}{prime}(t), which is then inserted into the form of the time template equation. A suitable amplitude A(t) is also preferably determined. Once the time template has been determined, one or more filters are developed which each use a version or form of the time template. 7 figs.

  7. A Thesis for the Degree of Master An Efficient Tree-based Group Key

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master An Efficient Tree-based Group Key Agreement using Bilinear Map-based Group Key Agreement using Bilinear Map #12;An Efficient Tree-based Group Key Agreement using Bilinear in partial fulfillment of the require- ments for the degree of Master of Science in the School of Engineering

  8. A Thesis for the Degree of Master A New Group Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master A New Group Key Agreement Scheme based on Ternary Tree Sang-won Lee School of Engineering Information and Communications University 2003 #12;A New Group Key Agreement Scheme based on Ternary Tree #12;A New Group Key Agreement Scheme based on Ternary Tree Advisor

  9. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  10. Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2 , Jun Ao3 , and Jianhua Li1 1 School@263.net Abstract. Kallahalla et al. presented a RSA-based Forward Key Rotation mechanism in secure storage present a Forward Key Rotation storage scheme based on discrete logarithm and discuss its security

  11. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

    E-Print Network [OSTI]

    State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University Experimental for energy dissipation mechanism. State Key Laboratory of Disaster Reduction in Civil Engineering #12;· Scope on Horizontal connection. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

  12. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek1, , S presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers

  13. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek 1,# , S presents the first scalable, e#cient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2­KE/3­KE) protocols. We propose three di#erent compilers where

  14. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  15. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12;A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt1,buchmann}@cdc.informatik.tu-darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  16. TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen-way trapdoor function, and then propose a new multivariate public key cryptosystem called TOT, which can though C was broken, its high speed has been affirmed). Keywords: TOT; multivariate public key

  17. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12; A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt 1,buchmann}@cdc.informatik.tu­darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  18. A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the

    E-Print Network [OSTI]

    Zdun, Uwe

    A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise in (all) the new key technology areas, it was hard for the management to estimate which new technologies, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale

  19. A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner Hamburg in the ubiquitous and pervasive comput- ing setting is secure key exchange. The restrictions moti- vate-core in ¢¡¤£¦¥¨§ -CMOS technology are evaluated. 1. Introduction In ubiquitous and pervasive computing scenarios, key

  20. Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships Mohammad, ymu}@uow.edu.au Abstract. In this paper, we revisit security notions for dedicated-key hash functions notions for dedicated-key hash functions. The provision of this set of enhanced properties has been

  1. Effects of varying CoCrV seed layer deposition pressure on Ru crystallinity in perpendicular magnetic recording media

    SciTech Connect (OSTI)

    Joost, W. [Heraeus Materials Technology, Chandler, Arizona 85226 (United States); School of Materials, Arizona State University, Tempe, Arizona 85287 (United States); Das, A. [Heraeus Materials Technology, Chandler, Arizona 85226 (United States); Alford, T. L. [School of Materials, Arizona State University, Tempe, Arizona 85287 (United States)

    2009-10-01

    The effects of varying deposition parameters of a CoCrV seed layer under Ru on the structural and interfacial properties of both layers were studied. While sputtering power showed little effect on film structure, sputtering pressure during deposition of the seed layer had a significant effect on the structural properties of the seed layer. In particular, the grain morphology and crystallinity of the seed layer varied considerably with deposition pressure. Deposition of Ru using a constant recipe for all samples demonstrated the effect of varying seed layer deposition pressure on the Ru layer. The strain energy of the Ru film, a measurement of contraction due to the registry with the seed layer, was greatest at moderate seed layer sputtering pressures, while the Ru(0002) peak area was greatest at low sputtering pressures. The competing contributions of interfacial energy and strain energy describe this effect, with interfacial energy dominating at low sputtering pressures.

  2. Key establishment à la Merkle in a quantum world

    E-Print Network [OSTI]

    Gilles Brassard; Peter Hoyer; Kassem Kalach; Marc Kaplan; Sophie Laplante; Louis Salvail

    2015-02-13

    In 1974, Ralph Merkle proposed the first unclassified scheme for secure communications over insecure channels. When legitimate communicating parties are willing to spend an amount of computational effort proportional to some parameter N, an eavesdropper cannot break into their communication without spending a time proportional to N^2, which is quadratically more than the legitimate effort. Two of us showed in 2008 that Merkle's schemes are completely insecure against a quantum adversary, but that their security can be partially restored if the legitimate parties are also allowed to use quantum computation: the eavesdropper needed to spend a time proportional to N^{3/2} to break our earlier quantum scheme. Furthermore, all previous classical schemes could be broken completely by the onslaught of a quantum eavesdropper and we conjectured that this is unavoidable. We give now two novel key establishment schemes in the spirit of Merkle's. The first one can be broken by a quantum adversary who makes an effort proportional to N^{5/3}, which is the optimal attack against this scheme. Our second scheme is purely classical, yet it cannot be broken by a quantum eavesdropper who is only willing to expend an effort proportional to that of the legitimate parties. We then introduce two families of more elaborate protocols. The first family consists in quantum protocols whose security is arbitrarily close to quadratic in the query complexity model. The second is a family of classical protocols whose security against a quantum adversary is arbitrarily close to N^{3/2} in the same model.

  3. Control of multiscale systems with constraints. 1. Basic principles of the concept of evolution of systems with varying constraints

    E-Print Network [OSTI]

    S. Adamenko; V. Bolotov; V. Novikov

    2013-07-17

    Physical fundamentals of the self-organizing theory for the system with varying constraints are considered. A variation principle, specifically the principle of dynamic harmonization as a generalization of the Gauss-Hertz principle for the systems with varying internal structure is formulated. In compliance with this principle the system evolves through dynamics of the processes leading to harmonization of the internal multiscale structure of the system and its connections with external actions as a result of minimizing the dynamic harmonization function. Main principles of the shell model of self-organization under the action of the dominating entropic disturbance are formulated.

  4. Parametric Resonance Amplification of Neutrino Oscillations in Electromagnetic Wave with Varying Amplitude and "Castle Wall" Magnetic Field

    E-Print Network [OSTI]

    M. S. Dvornikov; A. I. Studenikin

    2001-07-10

    Within the Lorentz invariant formalizm for description of neutrino evolution in electromagnetic fields and matter we consider neutrino spin oscillations in the electromagnetic wave with varying amplitude and in "castle wall" magnetic field. It is shown for the first time that the parametric resonances of neutrino oscillations in such systems can occur.

  5. Distribution, Speciation, and Elemental Associations of Soil Organic Carbon under Varying Landscape Topographic Positions at the Molecular Scale

    E-Print Network [OSTI]

    Sparks, Donald L.

    Distribution, Speciation, and Elemental Associations of Soil Organic Carbon under Varying Landscape spectra and maps were collected. Results: C Distribution and Associations with the Major Elements in Soil Clay Particles Fig.1. Relative elemental distribution maps (9µm×6µm) of clay fractions from the A

  6. A mathematical model for batch and continuous thickening of flocculated suspensions in vessels with varying cross-section

    E-Print Network [OSTI]

    Karlsen, Kenneth Hvistendahl

    A mathematical model for batch and continuous thickening of flocculated suspensions in vessels of continuous thickening of flocculated suspensions in an ideal cylindrical thickener is extended to vessels having varying cross-section, including divergent or convergent conical vessels. The purpose

  7. Multivariate analysis and prediction of wind turbine response to varying wind field characteristics based on machine learning

    E-Print Network [OSTI]

    Stanford University

    Multivariate analysis and prediction of wind turbine response to varying wind field characteristics characteristics have a significant impact on the structural response and the lifespan of wind turbines. This paper presents a machine learning approach towards analyzing and predicting the response of wind turbine

  8. Effects of polyethylene mulch in a short-rotation, poplar plantation vary with weed-control strategies,

    E-Print Network [OSTI]

    Green, Scott

    Effects of polyethylene mulch in a short-rotation, poplar plantation vary with weed polyethylene mulch (poly mulch) across a range of site conditions, weed-control treatments and genotypes rights reserved. Keywords: Polyethylene mulch; Woody crops; Weed control Forest Ecology and Management

  9. Summary Pinus taeda L. stomata respond slowly to changes in irradiance. Because incident irradiance on a leaf varies

    E-Print Network [OSTI]

    Teskey, Robert O.

    Summary Pinus taeda L. stomata respond slowly to changes in irradiance. Because incident irradiance on a leaf varies constantly, the rate of change in stomatal conductance to fluc- tuating irradiance may have with very different irradiance patterns, assuming that rates of stomatal opening and closing were similar

  10. Fabricating amorphous silicon solar cells by varying the temperature _of the substrate during deposition of the amorphous silicon layer

    DOE Patents [OSTI]

    Carlson, David E. (Yardley, PA)

    1982-01-01

    An improved process for fabricating amorphous silicon solar cells in which the temperature of the substrate is varied during the deposition of the amorphous silicon layer is described. Solar cells manufactured in accordance with this process are shown to have increased efficiencies and fill factors when compared to solar cells manufactured with a constant substrate temperature during deposition of the amorphous silicon layer.

  11. Enrichment of plasma lipid subfractions with varying dietary levels of N-3 fatty acids in the canine model 

    E-Print Network [OSTI]

    Spencer, Angela Leah

    1999-01-01

    In an attempt to better understand how varying levels of dietary n-3 fatty acids affected enrichment of plasma lipid subfractions, the current study was undertaken. Adult dogs were fed one of two basal diets with the addition of beef tallow...

  12. Computational Science Technical Note CSTN-163 Transients in a Forest-Fire Simulation Model with Varying Combustion

    E-Print Network [OSTI]

    Hawick, Ken

    0 Computational Science Technical Note CSTN-163 Transients in a Forest-Fire Simulation Model with Varying Combustion Neighbourhoods and Watercourse Firebreaks K. A. Hawick 2012 Forest and bush fires-Schwabl Forest-fire model is investigated with various localised combustion neighbourhoods. The transient

  13. FAST SPACE-VARYING CONVOLUTION IN STRAY LIGHT REDUCTION, FAST MATRIX VECTOR MULTIPLICATION USING THE SPARSE MATRIX

    E-Print Network [OSTI]

    FAST SPACE-VARYING CONVOLUTION IN STRAY LIGHT REDUCTION, FAST MATRIX VECTOR MULTIPLICATION USING THE SPARSE MATRIX TRANSFORM, AND ACTIVATION DETECTION IN FMRI DATA ANALYSIS A Dissertation Submitted motivated me to work on the extremely interesting and impactful problem of fast matrix vector multiplication

  14. California's water futures: How water conservation and varying Delta exports affect water supply in the face of climate change

    E-Print Network [OSTI]

    Lund, Jay R.

    i California's water futures: How water conservation and varying Delta exports affect water supply implications of changes in urban water conservation, Delta export capacity, and a dry form of climate warming desalination, and expanded water recycling. Results indicate that, depending on climate and Delta export

  15. 1132 WWW.CROPS.ORG CROP SCIENCE, VOL. 52, MAYJUNE 2012 While varying regionally, root-feeding plant-parasitic

    E-Print Network [OSTI]

    Douches, David S.

    1132 WWW.CROPS.ORG CROP SCIENCE, VOL. 52, MAY­JUNE 2012 RESEARCH While varying regionally, root, Statistician, Department of Crop and Soil Sciences, Plant and Soil Science Building, Michigan State University.08.0409 © Crop Science Society of America | 5585 Guilford Rd., Madison, WI 53711 USA All rights reserved. No part

  16. The impact of size distribution assumptions in a bulk one-moment microphysics scheme on simulated surface precipitation and storm dynamics during a low-topped supercell case in Belgium

    SciTech Connect (OSTI)

    Van Weverberg, K.; Van Lipzig, N. P. M.; Delobbe, L.

    2011-04-01

    In this research the impact of modifying the size distribution assumptions of the precipitating hydrometeors in a bulk one-moment microphysics scheme on simulated surface precipitation and storm dynamics has been explored for long-lived low-topped supercells in Belgium. It was shown that weighting the largest precipitating ice species of the microphysics scheme to small graupel results in an increase of surface precipitation because of counteracting effects. On the one hand, the precipitation formation process slowed down, resulting in lower precipitation efficiency. On the other hand, latent heat release associated with freezing favored more intense storms. In contrast to previous studies finding decreased surface precipitation when graupel was present in the microphysics parameterization, storms were rather shallow in the authors simulations. This left little time for graupel sublimation. The impact of size distribution assumptions of snow was found to be small, but more realistic size distribution assumptions of rain led to the strongest effect on surface precipitation. Cold pools shrunk because of weaker rain evaporation at the cold pool boundaries, leading to a decreased surface rain area.

  17. Program Mission Campaigns are multi-year, multi-functional efforts involving, to varying degrees, every site in the nuclear

    E-Print Network [OSTI]

    degrees, every site in the nuclear weapons complex. They provide specialized scientific knowledge and technical support to the directed stockpile work on the nuclear weapons stockpile. Deliverables are defined/scheduled in each campaign plan and then coordinated with several key nuclear weapons complex directives, including

  18. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  19. Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using "Omics" Citation Details In-Document Search Title: Unveiling Microbial Carbon Cycling...

  20. Introduction Soil compaction is the key physical feature that can prevent sustainable woodland

    E-Print Network [OSTI]

    Introduction Soil compaction is the key physical feature that can prevent sustainable woodland risk of physical instability and windthrow due to underdeveloped root systems. This Best Practice